<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mark+Denihan</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mark+Denihan"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Mark_Denihan"/>
		<updated>2026-05-16T08:49:47Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=244150</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=244150"/>
				<updated>2018-10-11T15:03:27Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Setup Help */ Updated&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes more than seventy levels - across the entire spectrum of Web and mobile application security - within a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect entry point for users completely new to security, with levels increasing in difficulty at a manageable pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept, when first addressed in Shepherd, is presented using plain language, so it can be readily understood by beginners.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Localisation Support: ''' Security Shepherd material is available in multiple languages from a single instance. Students with alternative language preferences can compete in the same Shepherd instance as others without issue.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 OWASP Security Shepherd GitHub Downloads]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [January 2017] Shepherd Graduates to Flagship&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself or there are various public instances (eg: [https://community.ctf365.com/t/owasp-security-shepherd/357 CTF365])&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it from the [[https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 GitHub Release Page]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
[[File:Axway logo.png|none|thumb|243x243px]]&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
Use our [https://github.com/OWASP/SecurityShepherd/wiki Github Wiki page] for the best Setup Help going!&lt;br /&gt;
&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=244148</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=244148"/>
				<updated>2018-10-11T14:13:19Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Classifications */ Adding Axway to Sponsors List&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes more than seventy levels - across the entire spectrum of Web and mobile application security - within a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect entry point for users completely new to security, with levels increasing in difficulty at a manageable pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept, when first addressed in Shepherd, is presented using plain language, so it can be readily understood by beginners.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Localisation Support: ''' Security Shepherd material is available in multiple languages from a single instance. Students with alternative language preferences can compete in the same Shepherd instance as others without issue.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 OWASP Security Shepherd GitHub Downloads]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [January 2017] Shepherd Graduates to Flagship&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself or there are various public instances (eg: [https://community.ctf365.com/t/owasp-security-shepherd/357 CTF365])&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it from the [[https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 GitHub Release Page]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
[[File:Axway logo.png|none|thumb|243x243px]]&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v3.0 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hypervisor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Module Management-&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.4 to Version 3.0:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4toV3.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.4 war file with the new V3.0 war file.&lt;br /&gt;
* Run the moduleSchemas.sql script from the manual pack on your Security Shepherd mysql instance&lt;br /&gt;
* Install mongoDb and then run the mongoSchema.js file on that instance, using the default port for mongoDb&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v3.0 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To setup and install MonogoDB for the NoSQL Injection Level found in shepherd, follow the steps to install here: https://docs.mongodb.org/manual/tutorial/install-mongodb-on-windows/&lt;br /&gt;
* Use the MongoDB shell to execute the mongoSchema.js file: https://docs.mongodb.org/manual/reference/method/load/&lt;br /&gt;
&lt;br /&gt;
Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Axway_logo.png&amp;diff=244147</id>
		<title>File:Axway logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Axway_logo.png&amp;diff=244147"/>
				<updated>2018-10-11T14:11:52Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Axway Logo&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=225546</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=225546"/>
				<updated>2017-01-24T11:11:42Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Localisation Support: ''' Security Shepherd material is available in multiple languages from a single instance. Students with alternative language preferences can compete in the same Shepherd instance as others without issue.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 OWASP Security Shepherd GitHub Downloads]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [January 2017] Shepherd Graduates to Flagship&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself or there are various public instances (eg: [https://community.ctf365.com/t/owasp-security-shepherd/357 CTF365])&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it from the [[https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 GitHub Release Page]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v3.0 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hypervisor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Module Management-&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.4 to Version 3.0:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4toV3.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.4 war file with the new V3.0 war file.&lt;br /&gt;
* Run the moduleSchemas.sql script from the manual pack on your Security Shepherd mysql instance&lt;br /&gt;
* Install mongoDb and then run the mongoSchema.js file on that instance, using the default port for mongoDb&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v3.0 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To setup and install MonogoDB for the NoSQL Injection Level found in shepherd, follow the steps to install here: https://docs.mongodb.org/manual/tutorial/install-mongodb-on-windows/&lt;br /&gt;
* Use the MongoDB shell to execute the mongoSchema.js file: https://docs.mongodb.org/manual/reference/method/load/&lt;br /&gt;
&lt;br /&gt;
Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=224868</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=224868"/>
				<updated>2017-01-10T09:18:38Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Localisation Support: ''' Security Shepherd material is available in multiple languages from a single instance. Students with alternative language preferences can compete in the same Shepherd instance as others without issue.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 OWASP Security Shepherd GitHub Downloads]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [January 2017] Shepherd Graduates to Flagship&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it from the [[https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 GitHub Release Page]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v3.0 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hypervisor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Module Management-&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.4 to Version 3.0:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4toV3.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.4 war file with the new V3.0 war file.&lt;br /&gt;
* Run the moduleSchemas.sql script from the manual pack on your Security Shepherd mysql instance&lt;br /&gt;
* Install mongoDb and then run the mongoSchema.js file on that instance, using the default port for mongoDb&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v3.0 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To setup and install MonogoDB for the NoSQL Injection Level found in shepherd, follow the steps to install here: https://docs.mongodb.org/manual/tutorial/install-mongodb-on-windows/&lt;br /&gt;
* Use the MongoDB shell to execute the mongoSchema.js file: https://docs.mongodb.org/manual/reference/method/load/&lt;br /&gt;
&lt;br /&gt;
Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=224867</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=224867"/>
				<updated>2017-01-10T09:16:05Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Localisation Support: ''' Security Shepherd material is available in multiple languages from a single instance. Students with alternative language preferences can compete in the same Shepherd instance as others without issue.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 OWASP Security Shepherd GitHub Downloads]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [January 2017] Shepherd Graduates to Flagship&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it from the [[https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 GitHub Release Page]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v3.0 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hypervisor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Module Management-&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.4 to Version 3.0:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4toV3.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.4 war file with the new V3.0 war file.&lt;br /&gt;
* Run the moduleSchemas.sql script from the manual pack on your Security Shepherd mysql instance&lt;br /&gt;
* Install mongoDb and then run the mongoSchema.js file on that instance, using the default port for mongoDb&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v3.0 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To setup and install MonogoDB for the NoSQL Injection Level found in shepherd, follow the steps to install here: https://docs.mongodb.org/manual/tutorial/install-mongodb-on-windows/&lt;br /&gt;
* Use the MongoDB shell to execute the mongoSchema.js file: https://docs.mongodb.org/manual/reference/method/load/&lt;br /&gt;
&lt;br /&gt;
Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=224866</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=224866"/>
				<updated>2017-01-10T09:03:35Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Adding Flagship Status from successful graduation review: https://docs.google.com/document/d/1AZZ_GZR0-uF1qBZDQdgdV49IyEZYT_91qQMHRGszDLw/edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Localisation Support: ''' Security Shepherd material is available in multiple languages from a single instance. Students with alternative language preferences can compete in the same Shepherd instance as others without issue.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 OWASP Security Shepherd GitHub Downloads]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [January 2017] Shepherd Graduates to Flagship&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it from the [[https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 GitHub Release Page]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v3.0 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hypervisor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Module Management-&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.4 to Version 3.0:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4toV3.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.4 war file with the new V3.0 war file.&lt;br /&gt;
* Run the moduleSchemas.sql script from the manual pack on your Security Shepherd mysql instance&lt;br /&gt;
* Install mongoDb and then run the mongoSchema.js file on that instance, using the default port for mongoDb&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v3.0 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To setup and install MonogoDB for the NoSQL Injection Level found in shepherd, follow the steps to install here: https://docs.mongodb.org/manual/tutorial/install-mongodb-on-windows/&lt;br /&gt;
* Use the MongoDB shell to execute the mongoSchema.js file: https://docs.mongodb.org/manual/reference/method/load/&lt;br /&gt;
&lt;br /&gt;
Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=202616</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=202616"/>
				<updated>2015-10-24T13:27:36Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Replacing Download Links to GitHub Release Page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Localisation Support: ''' Security Shepherd material is available in multiple languages from a single instance. Students with alternative language preferences can compete in the same Shepherd instance as others without issue.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 OWASP Security Shepherd GitHub Downloads]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [October 2015] Shepherd v3.0 Released&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it from the [[https://github.com/OWASP/SecurityShepherd/releases/tag/v3.0 GitHub Release Page]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v3.0 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hypervisor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Module Management-&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.4 to Version 3.0:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4toV3.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.4 war file with the new V3.0 war file.&lt;br /&gt;
* Run the moduleSchemas.sql script from the manual pack on your Security Shepherd mysql instance&lt;br /&gt;
* Install mongoDb and then run the mongoSchema.js file on that instance, using the default port for mongoDb&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v3.0 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To setup and install MonogoDB for the NoSQL Injection Level found in shepherd, follow the steps to install here: https://docs.mongodb.org/manual/tutorial/install-mongodb-on-windows/&lt;br /&gt;
* Use the MongoDB shell to execute the mongoSchema.js file: https://docs.mongodb.org/manual/reference/method/load/&lt;br /&gt;
&lt;br /&gt;
Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=202571</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=202571"/>
				<updated>2015-10-23T17:30:47Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Setup Help */  Updating to V3&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Localisation Support: ''' Security Shepherd material is available in multiple languages from a single instance. Students with alternative language preferences can compete in the same Shepherd instance as others without issue.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [October 2015] Shepherd v3.0 Released&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v3.0 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hypervisor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Module Management-&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.4 to Version 3.0:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4toV3.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.4 war file with the new V3.0 war file.&lt;br /&gt;
* Run the moduleSchemas.sql script from the manual pack on your Security Shepherd mysql instance&lt;br /&gt;
* Install mongoDb and then run the mongoSchema.js file on that instance, using the default port for mongoDb&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v3.0 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To setup and install MonogoDB for the NoSQL Injection Level found in shepherd, follow the steps to install here: https://docs.mongodb.org/manual/tutorial/install-mongodb-on-windows/&lt;br /&gt;
* Use the MongoDB shell to execute the mongoSchema.js file: https://docs.mongodb.org/manual/reference/method/load/&lt;br /&gt;
&lt;br /&gt;
Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Shepherd-CTF-Level-One.JPG&amp;diff=202569</id>
		<title>File:Shepherd-CTF-Level-One.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Shepherd-CTF-Level-One.JPG&amp;diff=202569"/>
				<updated>2015-10-23T17:25:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Mark Denihan uploaded a new version of &amp;amp;quot;File:Shepherd-CTF-Level-One.JPG&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Screen shot of the first level in the OWASP Security Shepherd project when deployed as a CTF game&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Shepherd-Injection-Lesson.JPG&amp;diff=202568</id>
		<title>File:Shepherd-Injection-Lesson.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Shepherd-Injection-Lesson.JPG&amp;diff=202568"/>
				<updated>2015-10-23T17:24:41Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Mark Denihan uploaded a new version of &amp;amp;quot;File:Shepherd-Injection-Lesson.JPG&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Screen shot of the OWASP Security Shepherd SQL Injection Lesson&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=202567</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=202567"/>
				<updated>2015-10-23T16:48:18Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Adding news and Features&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Localisation Support: ''' Security Shepherd material is available in multiple languages from a single instance. Students with alternative language preferences can compete in the same Shepherd instance as others without issue.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [October 2015] Shepherd v3.0 Released&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=202176</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=202176"/>
				<updated>2015-10-16T07:34:26Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Videos */ Adding Admin Function Walkthroghs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|0jTWVLSGbPk}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|sb8KQV6morY}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201715</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201715"/>
				<updated>2015-10-05T20:38:12Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: *Adding Roadmap*&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
== Security Shepherd Road Map ==&lt;br /&gt;
Security Shepherd wants to be as highly usable as we can achieve. Our primary objective is currently to achieve full language localisation support for the entire application. Currently we have covered the main pages users would interact with. We actively need volunteers to take part in the translation process. If you are interested in getting involved please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/How-to-Create-a-Web-Shepherd-Level How to Add a New Language to Security Shepherd].&lt;br /&gt;
&lt;br /&gt;
Our long term goals are to cover as many web and mobile application security risks as possible. If you are interested in getting involved in adding levels to Security Shepherd, please check out our [http://bit.ly/securityShepherdGithub GitHub] Wiki describing [https://github.com/OWASP/SecurityShepherd/wiki/Adding-a-new-Language-to-Shepherd How to Make a Security Shepherd Level]. For the Latest and Greatest short term goals. Please see the [https://github.com/OWASP/SecurityShepherd/issues issues page in our GitHub].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201625</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201625"/>
				<updated>2015-10-05T07:54:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Natalia Lopez&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201624</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201624"/>
				<updated>2015-10-05T07:52:33Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q Where can I access Security Shepherd?&lt;br /&gt;
: A You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q Where can I download Security Shepherd?&lt;br /&gt;
: A You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
; Q How can I run Shepherd on my network safely?&lt;br /&gt;
: A just boot up the VM, install it manually or with Docker. The Security Shepherd application cannot be exploited to compromise the security of its environment. Make sure you patch your VM regularly to prevent intrusion to the host machine though.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201507</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201507"/>
				<updated>2015-10-02T09:32:05Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Videos */ Adding Mobile VM Setup Video&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q3 Where can I download Security Shepherd?&lt;br /&gt;
: A3 You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|yppMkJRp4pk}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201235</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201235"/>
				<updated>2015-09-28T16:33:18Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q3 Where can I download Security Shepherd?&lt;br /&gt;
: A3 You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Lei Shao&lt;br /&gt;
* Aidan Knowles&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|-brsnYrksAI}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201234</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201234"/>
				<updated>2015-09-28T16:31:41Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Recent News and Events */ Adding AppSec USA Lines&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [September 2015] Shepherd Lightning Training @ AppSecUSA 2015&lt;br /&gt;
* [September 2015] Shepherd @ AppSecUSA 2015 Project Summit&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q3 Where can I download Security Shepherd?&lt;br /&gt;
: A3 You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|-brsnYrksAI}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201233</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201233"/>
				<updated>2015-09-28T16:29:22Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Videos */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q3 Where can I download Security Shepherd?&lt;br /&gt;
: A3 You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|-brsnYrksAI}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201232</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=201232"/>
				<updated>2015-09-28T16:28:48Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Videos */ Adding AppSec Videos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q3 Where can I download Security Shepherd?&lt;br /&gt;
: A3 You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&lt;br /&gt;
|}&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|ZgqAXdwNeCI}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|brsnYrksAI}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=200488</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=200488"/>
				<updated>2015-09-13T15:55:24Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Adding a couple of Videos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q3 Where can I download Security Shepherd?&lt;br /&gt;
: A3 You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
=Videos=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|8mlY4ob757s}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|uWk0NOSpyQc}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196878</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196878"/>
				<updated>2015-07-02T09:26:10Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Reordering Content&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
'''Wide Topic Coverage: ''' Shepherd includes over seventy levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
&lt;br /&gt;
'''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
&lt;br /&gt;
'''Layman Write Ups: ''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
&lt;br /&gt;
'''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack &lt;br /&gt;
vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
&lt;br /&gt;
'''Scalability: ''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
&lt;br /&gt;
'''Highly Customisable: ''' Shepherd enables admins to set what levels are available to their users and in what way they are presented (Open, CTF and Tournament Layouts)&lt;br /&gt;
&lt;br /&gt;
'''Perfect for Classrooms: ''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
&lt;br /&gt;
'''Scoreboard: ''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
&lt;br /&gt;
'''User Management: ''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
&lt;br /&gt;
'''Robust Service: ''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
&lt;br /&gt;
'''Configurable Feedback: ''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
&lt;br /&gt;
'''Granular Logging: ''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q3 Where can I download Security Shepherd?&lt;br /&gt;
: A3 You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=196596</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=196596"/>
				<updated>2015-06-26T17:10:03Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Documentation [In Progress-Results by February/March 2015] */ Sorting Alphabetically&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project have been evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Ninjas_AppSec_Training_Program OWASP Security Ninjas Appsec Training]&lt;br /&gt;
* [[OWASP_Security_Shepherd|OWASP Security Shepherd]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
* [[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
'''Code [Low Activity]'''&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
* [[OWASP_Joomla_Vulnerability_Scanner_Project]]&lt;br /&gt;
&lt;br /&gt;
'''Documentation [Low Activity]'''&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====Code: Low Activity=====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]]&lt;br /&gt;
&lt;br /&gt;
====Research====&lt;br /&gt;
* [[OWASP_WASC_Distributed_Web_Honeypots_Project|OWASP WASC Distributed Web Honeypots Project]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed last: May 2015]====&lt;br /&gt;
* [[OWASP_Wordpress_Vulnerability_Scanner_Project | OWASP Wordpress Vulnerability Scanner]]&lt;br /&gt;
* [[OWASP_Threat_Dragon | OWASP Threat Dragon]]&lt;br /&gt;
* [[OWASP_Security_Knowledge_Framework#tab=Main | Security Knowledge Framework]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]]&lt;br /&gt;
* [[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] &lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] &lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] &lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: May 2015]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
* [[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
&lt;br /&gt;
==Educational Initiatives==&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
Some recommendations on how to start a documentation project&lt;br /&gt;
[[https://www.owasp.org/index.php/File:Document_Guide_(1).png| Document Guide Project]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Request (Bangladesh)]:For Information Security Project contact with OWASP Bangladesh Project Leader [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
'''Code Projects''': OWASP code projects are very important for the cyber security solutions. Because these projects are used to find out the application security problems and try to solve those problems. Best code project is [[OWASP System Vulnerable Code Project]] and best project leader is [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=196595</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=196595"/>
				<updated>2015-06-26T17:05:55Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Tools [Reviewed February 2015] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project have been evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Ninjas_AppSec_Training_Program OWASP Security Ninjas Appsec Training]&lt;br /&gt;
* [[OWASP_Security_Shepherd|OWASP Security Shepherd]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
'''Code [Low Activity]'''&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
* [[OWASP_Joomla_Vulnerability_Scanner_Project]]&lt;br /&gt;
&lt;br /&gt;
'''Documentation [Low Activity]'''&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====Code: Low Activity=====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]]&lt;br /&gt;
&lt;br /&gt;
====Research====&lt;br /&gt;
* [[OWASP_WASC_Distributed_Web_Honeypots_Project|OWASP WASC Distributed Web Honeypots Project]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed last: May 2015]====&lt;br /&gt;
* [[OWASP_Wordpress_Vulnerability_Scanner_Project | OWASP Wordpress Vulnerability Scanner]]&lt;br /&gt;
* [[OWASP_Threat_Dragon | OWASP Threat Dragon]]&lt;br /&gt;
* [[OWASP_Security_Knowledge_Framework#tab=Main | Security Knowledge Framework]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]]&lt;br /&gt;
* [[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] &lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] &lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] &lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: May 2015]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
* [[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
&lt;br /&gt;
==Educational Initiatives==&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
Some recommendations on how to start a documentation project&lt;br /&gt;
[[https://www.owasp.org/index.php/File:Document_Guide_(1).png| Document Guide Project]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Request (Bangladesh)]:For Information Security Project contact with OWASP Bangladesh Project Leader [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
'''Code Projects''': OWASP code projects are very important for the cyber security solutions. Because these projects are used to find out the application security problems and try to solve those problems. Best code project is [[OWASP System Vulnerable Code Project]] and best project leader is [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=196594</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=196594"/>
				<updated>2015-06-26T17:05:26Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Tools [Reviewed February 2015] */ Sorting Alphabetically&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project have been evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Ninjas_AppSec_Training_Program OWASP Security Ninjas Appsec Training]&lt;br /&gt;
* [[OWASP_Security_Shepherd|OWASP Security Shepherd]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
'''Code [Low Activity]'''&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
* [[OWASP_Joomla_Vulnerability_Scanner_Project]]&lt;br /&gt;
&lt;br /&gt;
'''Documentation [Low Activity]'''&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====Code: Low Activity=====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]]&lt;br /&gt;
&lt;br /&gt;
====Research====&lt;br /&gt;
* [[OWASP_WASC_Distributed_Web_Honeypots_Project|OWASP WASC Distributed Web Honeypots Project]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed last: May 2015]====&lt;br /&gt;
* [[OWASP_Wordpress_Vulnerability_Scanner_Project | OWASP Wordpress Vulnerability Scanner]]&lt;br /&gt;
* [[OWASP_Threat_Dragon | OWASP Threat Dragon]]&lt;br /&gt;
* [[OWASP_Security_Knowledge_Framework#tab=Main | Security Knowledge Framework]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]]&lt;br /&gt;
* [[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] &lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] &lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] &lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: May 2015]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
* [[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
&lt;br /&gt;
==Educational Initiatives==&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
Some recommendations on how to start a documentation project&lt;br /&gt;
[[https://www.owasp.org/index.php/File:Document_Guide_(1).png| Document Guide Project]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Request (Bangladesh)]:For Information Security Project contact with OWASP Bangladesh Project Leader [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
'''Code Projects''': OWASP code projects are very important for the cyber security solutions. Because these projects are used to find out the application security problems and try to solve those problems. Best code project is [[OWASP System Vulnerable Code Project]] and best project leader is [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196593</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196593"/>
				<updated>2015-06-26T16:47:05Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
* '''Wide Topic Coverage: ''' Shepherd includes over sixty levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
* '''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
* '''Layman Write Ups:''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
* '''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
* '''Scalability:''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
* '''Highly Customisable:''' Shepherd enables admins to set what levels are available to their users and in what way they are presentended (Open, CTF and Tournament Layouts)&lt;br /&gt;
* '''Perfect for Classrooms:''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
* '''Scoreboard:''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
* '''User Management:''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
* '''Robust Service:''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
* '''Configurable Feedback:''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
* '''Granular Logging:''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Follow [[https://github.com/OWASP/SecurityShepherd/wiki/How-To-Reskin-Shepherd this guide]]!&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
; Q3 Where can I download Security Shepherd?&lt;br /&gt;
: A3 You can download it on [[https://sourceforge.net/projects/owaspshepherd/files/ Source Forge]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196592</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196592"/>
				<updated>2015-06-26T16:34:00Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Setup Help */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
* '''Wide Topic Coverage: ''' Shepherd includes over sixty levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
* '''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
* '''Layman Write Ups:''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
* '''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
* '''Scalability:''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
* '''Highly Customisable:''' Shepherd enables admins to set what levels are available to their users and in what way they are presentended (Open, CTF and Tournament Layouts)&lt;br /&gt;
* '''Perfect for Classrooms:''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
* '''Scoreboard:''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
* '''User Management:''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
* '''Robust Service:''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
* '''Configurable Feedback:''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
* '''Granular Logging:''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateCoreSchemaV2.4.sql Upgrade Core Schema Script]]&lt;br /&gt;
* Download and run this SQL file on your DB server: [[https://github.com/OWASP/SecurityShepherd/raw/master/SecurityShepherdCore/setupFiles/updateModuleSchemasV2.4.sql Upgrade Module Schemas Script]]&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196591</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196591"/>
				<updated>2015-06-26T16:22:17Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Setup Help */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
* '''Wide Topic Coverage: ''' Shepherd includes over sixty levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
* '''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
* '''Layman Write Ups:''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
* '''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
* '''Scalability:''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
* '''Highly Customisable:''' Shepherd enables admins to set what levels are available to their users and in what way they are presentended (Open, CTF and Tournament Layouts)&lt;br /&gt;
* '''Perfect for Classrooms:''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
* '''Scoreboard:''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
* '''User Management:''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
* '''Robust Service:''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
* '''Configurable Feedback:''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
* '''Granular Logging:''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===How to Upgrade Version 2.3 to Version 2.4:===&lt;br /&gt;
You have a current instance of Security Shepherd V2.3, and you want to upgrade it to 2.4 without loosing any data? No Problem. Follow these steps to upgrade;&lt;br /&gt;
&lt;br /&gt;
* Download and run this SQL file on your DB server: Upgrade Core Schema Script&lt;br /&gt;
* Download and run this SQL file on your DB server: Upgrade Module Schemas Script&lt;br /&gt;
* Download the 2.4 Manual Pack, and replace your V2.3 war file with the new V2.4 war file.&lt;br /&gt;
&lt;br /&gt;
All settings will be set to default after completing these steps and new levels will be marked as open.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196575</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=196575"/>
				<updated>2015-06-25T15:56:48Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Updates for 2.4 Release&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
* '''Wide Topic Coverage: ''' Shepherd includes over sixty levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
* '''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
* '''Layman Write Ups:''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
* '''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
* '''Scalability:''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
* '''Highly Customisable:''' Shepherd enables admins to set what levels are available to their users and in what way they are presentended (Open, CTF and Tournament Layouts)&lt;br /&gt;
* '''Perfect for Classrooms:''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
* '''Scoreboard:''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
* '''User Management:''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
* '''Robust Service:''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
* '''Configurable Feedback:''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
* '''Granular Logging:''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A5|Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Data_Validation|Poor Data Validation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [July 2015] Shepherd v2.4 Released&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their websites and follow them on Twitter. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:Manicode-logo.png]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Paul McCann&lt;br /&gt;
* John Clarke&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.4 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Update the VM Network Adapters to suit what you have available. (Bridged Adapter for Network Availability, Host-Only for local access only and NAT for just outbound access) The VM by default has 2 Network adapters, one NAT and a Host-Only.&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address of the network adapter that is not configured for NAT. Make note of this&lt;br /&gt;
* On your host machine, open https://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Go to Admin -&amp;gt; Configuration -&amp;gt; Change Module Layout to change the way levels are presented. Default is CTF Mode (One at a time)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.4 Manual Pack (Windows):===&lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using CowSaysMoo as the default password to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p )&lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source coreSchema.sql&lt;br /&gt;
source moduleSchemas.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in the ROOT directory in the temp folder, modify the /WEB-INF/coreDatabase.properties and /WEB-INF/database.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT folder in your temp directory, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password (Can't be 'password' again)&lt;br /&gt;
* Make sure JAVA_HOME is set;&lt;br /&gt;
* Right click My Computer and select Properties.&lt;br /&gt;
* On the Advanced tab, select Environment Variables, and then edit JAVA_HOME to point to where the JDK software is located, e.g C:\Program Files\Java\jdk1.8.0_45.&lt;br /&gt;
* To setup SSL for port 443 (HTTPS) firstly generate the self signed certificate&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;%JAVA_HOME%\bin\keytool&amp;quot; -genkey -alias tomcat -keyalg RSA&lt;br /&gt;
&lt;br /&gt;
* The following is an example of filling out the details for the cert. You can choose your own.&lt;br /&gt;
&lt;br /&gt;
Enter keystore password:  passw0rd&lt;br /&gt;
Re-enter new password: password&lt;br /&gt;
What is your first and last name?&lt;br /&gt;
  [Unknown]:  Paul Stone&lt;br /&gt;
What is the name of your organizational unit?&lt;br /&gt;
  [Unknown]:  Security Shepherd&lt;br /&gt;
What is the name of your organization?&lt;br /&gt;
  [Unknown]:  OWASP&lt;br /&gt;
What is the name of your City or Locality?&lt;br /&gt;
  [Unknown]:  Baile Átha Cliath&lt;br /&gt;
What is the name of your State or Province?&lt;br /&gt;
  [Unknown]:  Laighin&lt;br /&gt;
What is the two-letter country code for this unit?&lt;br /&gt;
  [Unknown]:  IE&lt;br /&gt;
Is CN=Paul Stone, OU=Security Shepherd, O=OWASP, L=Baile Átha Cliath, ST=Laighin, C=IE correct?&lt;br /&gt;
  [no]:  yes&lt;br /&gt;
&lt;br /&gt;
Enter key password for (RETURN if same as keystore password):  &amp;lt;RETURN&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* This will create a file under C:\Users\YOUR_USERNAME.keystore&lt;br /&gt;
* Now Update the C:\INSTALL_LOCATION\tomcat7\conf\server.xml file manually. Make a note of the password to the cert you generated and enter it under the 'keystorePass'. Change the listener port to the following:&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;80&amp;quot; protocol=&amp;quot;HTTP/1.1&amp;quot; connectionTimeout=&amp;quot;20000&amp;quot; URIEncoding=&amp;quot;UTF-8&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;Connector address=&amp;quot;0.0.0.0&amp;quot; port=&amp;quot;443&amp;quot; protocol=&amp;quot;org.apache.coyote.http11.Http11NioProtocol&amp;quot; SSLEnabled=&amp;quot;true&amp;quot; maxThreads=&amp;quot;150&amp;quot; scheme=&amp;quot;https&amp;quot; secure=&amp;quot;true&amp;quot; clientAuth=&amp;quot;false&amp;quot; sslProtocol=&amp;quot;TLS&amp;quot; keystoreFile=&amp;quot;C:\Users\YOUR_USERNAME\.keystore&amp;quot;  keystorePass=&amp;quot;passw0rd&amp;quot; keyAlias=&amp;quot;tomcat&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* To Redirect traffic to 443 (HTTPS)add the following to C:\INSTALL_LOCATION\tomcat7\conf\web.xml&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;security-constraint&amp;gt;&amp;lt;web-resource-collection&amp;gt;&amp;lt;web-resource-name&amp;gt;Entire Application&amp;lt;/web-resource-name&amp;gt;&amp;lt;url-pattern&amp;gt;/*&amp;lt;/url-pattern&amp;gt;&amp;lt;/web-resource-collection&amp;gt;&amp;lt;user-data-constraint&amp;gt;&amp;lt;transport-guarantee&amp;gt;CONFIDENTIAL&amp;lt;/transport-guarantee&amp;gt;&amp;lt;/user-data-constraint&amp;gt;&amp;lt;/security-constraint&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Time to Play!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Manicode-logo.png&amp;diff=196574</id>
		<title>File:Manicode-logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Manicode-logo.png&amp;diff=196574"/>
				<updated>2015-06-25T15:48:35Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Security_Shepherd/Roadmap&amp;diff=195411</id>
		<title>Projects/OWASP Security Shepherd/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Security_Shepherd/Roadmap&amp;diff=195411"/>
				<updated>2015-05-28T07:19:19Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The current objectives of the Security Shepherd project are;&lt;br /&gt;
&lt;br /&gt;
To create more levels to provide a wider coverage of vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Extend admin UI configuration options&lt;br /&gt;
&lt;br /&gt;
Expand Mobile Risk Examples to iOS and Windows Mobile&lt;br /&gt;
&lt;br /&gt;
Improve Documentation&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195410</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195410"/>
				<updated>2015-05-28T07:13:02Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
* '''Wide Topic Coverage: ''' Shepherd includes over sixty levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
* '''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
* '''Layman Write Ups:''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
* '''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
* '''Scalability:''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
* '''Highly Customisable:''' Shepherd enables admins to set what levels are available to their users and in what way they are presentended (Open, CTF and Tournament Layouts)&lt;br /&gt;
* '''Perfect for Classrooms:''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
* '''Scoreboard:''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
* '''User Management:''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
* '''Robust Service:''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
* '''Configurable Feedback:''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
* '''Granular Logging:''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=195254</id>
		<title>OWASP Vulnerable Web Applications Directory Project/Pages/Offline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=195254"/>
				<updated>2015-05-26T13:14:43Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Adding Security Shepherd to List&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download]&lt;br /&gt;
| Simon Bennetts &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download]&lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download]&lt;br /&gt;
| Secure Ideas&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Faux_Bank_Project  Faux Bank ]&lt;br /&gt;
| ASP&lt;br /&gt;
| [https://github.com/thatcoderguy/OWASP-Faux-Bank-ClassicASP download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download]&lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Hackademic/hackademic download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [http://bkimminich.github.io/juice-shop Juice Shop ]&lt;br /&gt;
| Node, Express, Angular&lt;br /&gt;
| [https://github.com/bkimminich/juice-shop download] [https://registry.hub.docker.com/u/bkimminich/juice-shop docker image]&lt;br /&gt;
| Björn Kimminich&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://owasp.codeplex.com/ .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://owasp.codeplex.com/SourceControl/list/changesets# download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download]&lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Security_Shepherd#tab=Main Security Shepherd]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/owaspshepherd/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository]&lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://kanishkashowto.com/2014/06/30/vulnerawa-vulnerable-website/ Vulnerawa ]&lt;br /&gt;
|&lt;br /&gt;
| [http://sourceforge.net/projects/vulnerawa/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wavsep/ Wavsep - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/wavsep/downloads/list download] [https://code.google.com/p/wavsep/downloads/list docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://owasp.codeplex.com/ WebGoat.NET]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://owasp.codeplex.com/SourceControl/list/changesets# download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195245</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195245"/>
				<updated>2015-05-26T10:11:01Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
* '''Wide Topic Coverage: ''' Shepherd includes over sixty levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
* '''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
* '''Layman Write Ups:''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
* '''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
* '''Scalability:''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
* '''Highly Customisable:''' Shepherd enables admins to set what levels are available to their users and in what way they are presentended (Open, CTF and Tournament Layouts)&lt;br /&gt;
* '''Perfect for Classrooms:''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
* '''Scoreboard:''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
* '''User Management:''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
* '''Robust Service:''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
* '''Configurable Feedback:''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
* '''Granular Logging:''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Inventory&amp;diff=195105</id>
		<title>OWASP Project Inventory</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Inventory&amp;diff=195105"/>
				<updated>2015-05-21T09:11:47Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Tools [Reviewed February 2015] */  Adding Security Shepherd&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:Owasp_banner_web_pro.jpg|800px| link=https://www.owasp.org/index.php/Category:OWASP_Project]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Incubator Projects  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed September 2014]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_EJSF_Project|OWASP EJSF Project]]&lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Androick_Project|OWASP Androïck Project]]&lt;br /&gt;
*[[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
*[[OWASP_PHP_Portscanner_Project|OWASP PHP Portscaner Project]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[:Category:OWASP_Orizon_Project|OWASP Orizon Project]]&lt;br /&gt;
*[[OWASP_WASC_Distributed_Web_Honeypots_Project|OWASP WASC Distributed Web Honeypots Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP_URL_Checker|OWASP URL Checker]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed September 2014-In progress]====&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]] [[File:Thumbsup.png|15px]] &lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt;&lt;br /&gt;
&amp;lt;!-- There be dragons here --&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Labs Projects  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Security_Shepherd|OWASP Security Shepherd]] &lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
= Flagship Projects  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
= Archived Projects  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Archived Projects ==&lt;br /&gt;
&lt;br /&gt;
OWASP Archived Projects are inactive Labs projects. If you are interested in pursuing any of the projects below, please contact us and let us know of your interest.  &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WebSandBox_Project OWASP WebSandBox Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Focus OWASP Focus]&lt;br /&gt;
* [https://www.owasp.org/index.php/Opa OWASP OPA]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Quick_Reference_Guide_Project OWASP Web Application Security Quick Reference Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Awareness_Top_10_E-learning_Project OWASP Application Security Awareness Top 10 E-learning Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWASP CSRFTester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_S.T.I.N.G_Project OWASP S.T.I.N.G Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Assessment_Standards_Project OWASP Application Security Assessment Standards Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_XSSER OWASP XSSER]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passw3rd_Project OWASP Passw3rd Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CBT_Project OWASP Computer Based Training Project (OWASP CBT Project)]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Requirements_Project OWASP Application Security Requirements Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ultimatum_Project OWASP Ultimatum Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_STeBB_Project OWASP STeBB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Labeling_System_Project OWASP Security Labeling System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Pygoat_Project OWASP Pygoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HA_Vulnerability_Scanner_Project OWASP HA Vulnerability Scanner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Unmaskme_Project OWASP Unmaskme Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Simple_Host_Base_Incidence_Detection_System_Project OWASP Simple Host Base Incidence Detection System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Wordpress_Security_Checklist_Project OWASP Wordpress Security Checklist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Windows_Binary_Executable_Files_Security_Checks_Project OWASP Windows Binary Executable Files Security Checks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WS_Amplification_DoS_Project OWASP WS-Amplification DoS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iSABEL_Proxy_Server OWASP iSABEL Proxy Server]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Droid_Fusion OWASP Droid Fusion]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_J2EE_Secure_Development_Curriculum OWASP Java/J2EE Secure Development Curriculum]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OctoMS OWASP OctoMS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Accessibility_Project#tab=Project_About OWASP Web Application Security Accessibility Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Java_Project OWASP Java Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_1-Liner OWASP 1-Liner]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Good_Component_Practices_Project OWASP Good Component Practices Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Access_Control_Rules_Tester_Project OWASP Access Control Rules Tester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Metrics_Project OWASP Application Security Metrics Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AppSec_FAQ_Project OWASP AppSec FAQ Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Asdr OWASP ASDR Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Backend_Security_Project OWASP Backend Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls OWASP Best Practices: Use of Web Application Firewalls]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CAL9000_Project OWASP CAL9000 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CLASP_Project OWASP CLASP Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Code_Crawler OWASP CodeCrawler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Content_Validation_using_Java_Annotations_Project OWASP Content Validation using Java Annotations Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project OWASP DirBuster Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Encoding_Project OWASP Encoding Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Google_Hacking_Project OWASP Google Hacking Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project OWASP Insecure Web App Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Interceptor_Project OWASP Interceptor Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_JSP_Testing_Tool_Project OWASP JSP Testing Tool Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_LiveCD_Education_Project OWASP LiveCD Education Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Logging_Project OWASP Logging Guide]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_NetBouncer_Project OWASP NetBouncer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp OWASP OpenPGP Extensions for HTTP - Enigform and mod_openpgp Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_OpenSign_Server_Project OWASP OpenSign Server Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project OWASP Pantera Web Assessment Studio Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_PHP_Project OWASP PHP Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/ORG_%28OWASP_Report_Generator%29 OWASP Report Generator]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_SASAP_Project OWASP Scholastic Application Security Assessment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Analysis_of_Core_J2EE_Design_Patterns_Project OWASP Security Analysis of Core J2EE Design Patterns Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Spending_Benchmarks OWASP Security Spending Benchmarks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SiteGenerator OWASP Site Generator Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Skavenger_Project OWASP Skavenger Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Source_Code_Flaws_Top_10_Project OWASP Source Code Flaws Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Sprajax_Project OWASP Sprajax Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Sqlibench_Project OWASP Sqlibench Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Teachable_Static_Analysis_Workbench_Project OWASP Teachable Static Analysis Workbench Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Tiger OWASP Tiger]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Tools_Project OWASP Tools Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_Uniform_Reporting_Guidelines OWASP Uniform Reporting Guidelines]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_WeBekci_Project OWASP Webekci Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/JBroFuzz JBroFuzz]&lt;br /&gt;
* [https://owasp.org/index.php/Category:OWASP_SWAAT_Project OWASP SWAAT Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Web_Application_Framework_Manifesto OWASP Secure Web Application Framework Manifesto]&lt;br /&gt;
* [https://www.owasp.org/index.php/Scrubbr OWASP Scrubbr]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes OWASP JavaScript Sandboxes Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project OWASP Joomla Vulnerability Scanner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hatkit_Datafiddler_Project OWASP Hatkit Datafiddler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hatkit_Proxy_Project OWASP Hatkit Proxy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Fiddler_Addons_for_Security_Testing_Project OWASP Fiddler Addons for Security Testing Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Forward_Exploit_Tool_Project OWASP Forward Exploit Tool Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database OWASP Fuzzing Code Database]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Cloud_‐_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Browser_Testing_System_Project OWASP Web Browser Testing System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Webscarab OWASP WebScarab Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Webslayer_Project OWASP Webslayer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_WSFuzzer_Project OWASP WSFuzzer Project]&lt;br /&gt;
* [http://owasp.com/index.php/Category:OWASP_Security_Assurance_Testing_of_Virtual_Worlds_Project OWASP Security Assurance Testing of Virtual Worlds Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WAF_Project OWASP WAF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VFW_Project OWASP VFW Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SIMBA_Project OWASP SIMBA Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ONYX OWASP ONYX]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_Uncertain_Form_Submit_Prevention OWASP Java Uncertain Form Submit Prevention]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ecuador OWASP Ecuador]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ESOP_Framework OWASP ESOP Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Alchemist_Project OWASP Alchemist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_the_Flag_Competition_Project OWASP Secure the Flag Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Browser_Security_ACID_Tests_Project OWASP Browser Security ACID Test Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AJAX_Crawling_Tool OWASP AJAX Crawling Tool]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Threat_Modelling_Project OWASP Threat Modeling Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Crossword_of_the_Month OWASP Crossword of the Month]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Password_Project OWASP Secure Password Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Myth_Breakers_Project OWASP Myth Breakers Project]&lt;br /&gt;
* [http://owasp.com/index.php/OWASP_Project_Partnership_Model OWASP Project Partnership Model]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Browser_Security_Project OWASP Browser Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_for_Managers OWASP Application Security Program for Managers]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Favicon_Database_Project OWASP Favicon Database Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_JDIs_Project OWASP Security JDIs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Hash_Repository OWASP File Hash Repository]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Skills_Assessment OWASP Application Security Skills Assessment]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Common_Numbering_Project OWASP Common Numbering Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WhatTheFuzz_Project#tab=Project_About OWASP WhatTheFuzz Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Tools_for_Developers_Project OWASP Security Tools for Developers Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Proxy OWASP Proxy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Desktop_Goat_and_Top_5_Project OWASP Desktop Goat and Top 5 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AW00T OWASP AW00t]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Framework_Security_Project OWASP Framework Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Crowdtesting OWASP Crowdtesting]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OVAL_Content_Project OWASP OVAL Content Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Software_Security_Assurance_Process OWASP Software Security Assurance Process]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Fuzzing_Framework_Project OWASP Application Fuzzing Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_IoTs_Project OWASP IoTs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/ESAPI_Swingset OWASP ESAPI Swingset Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VaultDB_Project OWASP VaultDB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Mutillidae OWASP Mutillidae Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Yasca_Project OWASP Yasca Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Exams_Project OWASP Exams Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Baseline_Project OWASP Security Baseline Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OpenStack_Security_Project OWASP OpenStack Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Format_Validation_Project OWASP File Format Validation Project]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Project Types =&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFGuard_Project OWASPCSRF Guard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Opa OWASP OPA]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_Encoder_Project OWASP Java Encoder Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passfault OWASP Passfault]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OctoMS OWASP OctoMS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JSON_Sanitizer OWASP JSON Sanitizer]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Research_and_Development_Framework OWASP Security Research and Development Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_1-Liner OWASP 1-Liner]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Focus OWASP Focus]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHPRBAC_Project OWASP PHPRBAC Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_EJSF_Project OWASP EJSF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Barbarus OWASP Barbarus]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iMAS_iOS_Mobile_Application_Security_Project OWASP iMAS - iOS Mobile Application Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_RBAC_Project OWASP RBAC Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHP_Security_Project OWASP PHP Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Simple_Host_Base_Incidence_Detection_System_Project OWASP Simple Host Base Incidence Detection System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Format_Validation_Project OWASP File Format Validation Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JAWS_Project OWASP JAWS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project OWASP Node.js Goat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ISO_IEC_27034_Application_Security_Controls_Project OWASP ISO/IEC 27034 Application Security Controls Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ultimatum_Project OWASP Ultimatum Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hardened_Phalcon_Project OWASP Hardened Phalcon Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Faux_Bank_Project OWASP Faux Bank Project]&lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
* [https://www.owasp.org/index.php?title=OWASP_Web_Testing_Environment_Project OWASP Web Testing Environment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Webgoat OWASP WebGoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project OWASP Broken Web Applications Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWAsP CSRFTester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_EnDe OWASP EnDe Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool OWASP HTTP Post Tool]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_XML_Templates_Project OWASP Java XML Templates Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mantra_-_Security_Framework OWASP Mantra Security Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Mutillidae OWASP Mutillidae Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_O2_Platform OWASP O2 Platform]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Vicnum_Project OWASP Vicnum Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Yasca_Project OWASP Yasca Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_NAXSI_Project OWASP NAXSI Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passw3rd_Project OWASP Passw3rd Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Hash_Repository OWASP File Hash Repository]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_WebGoat.NET OWASP WebGoat.NET]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Path_Traverser OWASP Path Traverser]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWASP_Watiqay OWASP Watiqay]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_Security_Shepherd/Roadmap OWASP Security Shepherd]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework OWASP Xenotix XSS Exploit Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mantra_OS OWASP Mantra OS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_XSSER OWASP XSSER]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Academy_Portal_Project OWASP Academy Portal Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ASIDE_Project OWASP ASIDE Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iGoat_Project OWASP iGoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SamuraiWTF_Project OWASP SamuraiWTF]&lt;br /&gt;
* [https://www.owasp.org/index.php/O-Saft O-Saft]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OpenStack_Security_Project OWASP OpenStack Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Bricks OWASP Bricks]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hive_Project OWASP Hive Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Droid_Fusion OWASP Droid Fusion]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iSABEL_Proxy_Server OWASP iSABEL Proxy Server]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project OWASP Rails Goat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Bywaf_Project OWASP Bywaf Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_S.T.I.N.G_Project OWASP S.T.I.N.G Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VaultDB_Project OWASP VaultDB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WS_Amplification_DoS_Project OWASP WS-Amplification DoS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project OWASP Mutillidae 2 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Skanda_SSRF_Exploitation_Framework OWASP Skanda - SSRF Exploitation Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP SeraphimDroid Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Unmaskme_Project OWASP Unmaskme Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Androick_Project OWASP Androïck Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SafeNuGet_Project OWASP SafeNuGet Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WebSandBox_Project OWASP WebSandBox Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HA_Vulnerability_Scanner_Project OWASP HA Vulnerability Scanner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Dependency_Track_Project OWASP Dependency Track Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHP_Portscanner_Project OWASP PHP Portscaner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer OWASP Java HTML Sanitizer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Pygoat_Project OWASP Pygoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Python_Security_Project OWASP Python Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Knocking_Project OWASP Web Knocking Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Financial_Information_Exchange_Security_Project OWASP Financial Information Exchange Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_STeBB_Project OWASP STeBB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_NINJA_PingU_Project OWASP NINJA PingU Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Encoder_Comparison_Reference_Project OWASP Encoder Comparison Reference Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_PHP_Security_Training_Project OWASP PHP Security Training Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/Projects/OWASP_iOSForensic OWASP iOSForensic]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Project_Metrics OWASP Project Metrics]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Store_Sheep_Project OWASP Store Sheep Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_SonarQube_Project OWASP SonarQube Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_URL_Checker OWASP URL Checker]&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project OWASP Code Review Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Codes_of_Conduct OWASP Codes of Conduct]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Guide_Project OWASP Development Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model OWASP Software Assurance Maturity Model(SAMM)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top Ten Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series OWASP AppSec Tutorial Series]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project OWASP AppSensor Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CTF_Project OWASP CTF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Legal_Project OWASP Legal Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Podcast OWASP Podcast Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Virtual_Patching_Best_Practices Virtual Patching Best Practices]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Data_Exchange_Format_Project OWASP Data Exchange Format Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Cheat_Sheets OWASP Cheat Sheets Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Proactive_Controls OWASP Proactive Controls]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_J2EE_Secure_Development_Curriculum OWASP Java/J2EE Secure Development Curriculum]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Baseline_Project OWASP Security Baseline Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Accessibility_Project#tab=Project_About OWASP Web Application Security Accessibility Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Requirements_Project OWASP Application Security Requirements Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Assessment_Standards_Project OWASP Application Security Assessment Standards Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CBT_Project OWASP Computer Based Training Project (OWASP CBT Project)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Enterprise_Application_Security_Project OWASP Enterprise Application Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Exams_Project OWASP Exams Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_GoatDroid_Project OWASP GoatDroid Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_RFP-Criteria OWASP Request For Proposal]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_University_Challenge OWASP University Challenge]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hacking_Lab OWASP Hacking-Lab]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Awareness_Top_10_E-learning_Project OWASP Application Security Awareness Top 10 E-learning Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Periodic_Table_of_Vulnerabilities OWASP Periodic Table of Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]&lt;br /&gt;
* [https://www.owasp.org/index.php/ESAPI_Swingset OWASP ESAPI Swingset Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Press OWASP Press]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_CISO_Survey OWASP CISO Survey]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Guide_For_CISOs_Project OWASP Application Security Guide For CISOs]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Scada_Security_Project OWASP Scada Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Application_Design_Project OWASP Secure Application Design Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10_Fuer_Entwickler_Project OWASP Top 10 Fuer Entwickler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10_Privacy_Risks_Project OWASP Top 10 Privacy Risks]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Quick_Reference_Guide_Project OWASP Web Application Security Quick Reference Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Windows_Binary_Executable_Files_Security_Checks_Project OWASP Windows Binary Executable Files Security Checks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Wordpress_Security_Checklist_Project OWASP Wordpress Security Checklist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project OWASP Supporting Legacy Web Applications in the Current Environment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Principles_Project OWASP Security Principles Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ruby_on_Rails_and_friends_Security_Guide OWASP Ruby on Rails and friends Security Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Media_Project OWASP Media Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Global_Chapter_Meetings_Project OWASP Global Chapter Meetings Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project OWASP Vulnerable Web Applications Directory Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project OWASP Game Security Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Labeling_System_Project OWASP Security Labeling System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_IoTs_Project OWASP IoTs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Insecure_Web_Components_Project OWASP Insecure Web Components Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project OWASP Reverse Engineering and Code Modification Prevention Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Student_Chapters_Program OWASP Student Chapters Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Education_Project OWASP Education Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Speakers_Project OWASP Speakers Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project OWASP Internet of Things Top Ten Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_.NET_Project OWASP .NET Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Research_Book_Project OWASP Research Book Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Open_Cyber_Security_Framework_Project OWASP Open Cyber Security Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_Trumps_for_Projects OWASP Top Trumps for Projects]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Inventory&amp;diff=195104</id>
		<title>OWASP Project Inventory</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Inventory&amp;diff=195104"/>
				<updated>2015-05-21T09:11:17Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Tools [Reviewed September 2014] */  Removing Security Shepherd from Incubators&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:Owasp_banner_web_pro.jpg|800px| link=https://www.owasp.org/index.php/Category:OWASP_Project]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Incubator Projects  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed September 2014]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_EJSF_Project|OWASP EJSF Project]]&lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Androick_Project|OWASP Androïck Project]]&lt;br /&gt;
*[[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
*[[OWASP_PHP_Portscanner_Project|OWASP PHP Portscaner Project]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[:Category:OWASP_Orizon_Project|OWASP Orizon Project]]&lt;br /&gt;
*[[OWASP_WASC_Distributed_Web_Honeypots_Project|OWASP WASC Distributed Web Honeypots Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP_URL_Checker|OWASP URL Checker]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed September 2014-In progress]====&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]] [[File:Thumbsup.png|15px]] &lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt;&lt;br /&gt;
&amp;lt;!-- There be dragons here --&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Labs Projects  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
= Flagship Projects  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
= Archived Projects  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Archived Projects ==&lt;br /&gt;
&lt;br /&gt;
OWASP Archived Projects are inactive Labs projects. If you are interested in pursuing any of the projects below, please contact us and let us know of your interest.  &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WebSandBox_Project OWASP WebSandBox Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Focus OWASP Focus]&lt;br /&gt;
* [https://www.owasp.org/index.php/Opa OWASP OPA]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Quick_Reference_Guide_Project OWASP Web Application Security Quick Reference Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Awareness_Top_10_E-learning_Project OWASP Application Security Awareness Top 10 E-learning Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWASP CSRFTester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_S.T.I.N.G_Project OWASP S.T.I.N.G Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Assessment_Standards_Project OWASP Application Security Assessment Standards Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_XSSER OWASP XSSER]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passw3rd_Project OWASP Passw3rd Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CBT_Project OWASP Computer Based Training Project (OWASP CBT Project)]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Requirements_Project OWASP Application Security Requirements Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ultimatum_Project OWASP Ultimatum Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_STeBB_Project OWASP STeBB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Labeling_System_Project OWASP Security Labeling System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Pygoat_Project OWASP Pygoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HA_Vulnerability_Scanner_Project OWASP HA Vulnerability Scanner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Unmaskme_Project OWASP Unmaskme Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Simple_Host_Base_Incidence_Detection_System_Project OWASP Simple Host Base Incidence Detection System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Wordpress_Security_Checklist_Project OWASP Wordpress Security Checklist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Windows_Binary_Executable_Files_Security_Checks_Project OWASP Windows Binary Executable Files Security Checks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WS_Amplification_DoS_Project OWASP WS-Amplification DoS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iSABEL_Proxy_Server OWASP iSABEL Proxy Server]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Droid_Fusion OWASP Droid Fusion]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_J2EE_Secure_Development_Curriculum OWASP Java/J2EE Secure Development Curriculum]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OctoMS OWASP OctoMS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Accessibility_Project#tab=Project_About OWASP Web Application Security Accessibility Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Java_Project OWASP Java Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_1-Liner OWASP 1-Liner]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Good_Component_Practices_Project OWASP Good Component Practices Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Access_Control_Rules_Tester_Project OWASP Access Control Rules Tester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Metrics_Project OWASP Application Security Metrics Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AppSec_FAQ_Project OWASP AppSec FAQ Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Asdr OWASP ASDR Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Backend_Security_Project OWASP Backend Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls OWASP Best Practices: Use of Web Application Firewalls]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CAL9000_Project OWASP CAL9000 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CLASP_Project OWASP CLASP Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Code_Crawler OWASP CodeCrawler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Content_Validation_using_Java_Annotations_Project OWASP Content Validation using Java Annotations Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project OWASP DirBuster Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Encoding_Project OWASP Encoding Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Google_Hacking_Project OWASP Google Hacking Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project OWASP Insecure Web App Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Interceptor_Project OWASP Interceptor Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_JSP_Testing_Tool_Project OWASP JSP Testing Tool Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_LiveCD_Education_Project OWASP LiveCD Education Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Logging_Project OWASP Logging Guide]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_NetBouncer_Project OWASP NetBouncer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp OWASP OpenPGP Extensions for HTTP - Enigform and mod_openpgp Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_OpenSign_Server_Project OWASP OpenSign Server Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project OWASP Pantera Web Assessment Studio Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_PHP_Project OWASP PHP Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/ORG_%28OWASP_Report_Generator%29 OWASP Report Generator]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_SASAP_Project OWASP Scholastic Application Security Assessment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Analysis_of_Core_J2EE_Design_Patterns_Project OWASP Security Analysis of Core J2EE Design Patterns Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Spending_Benchmarks OWASP Security Spending Benchmarks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SiteGenerator OWASP Site Generator Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Skavenger_Project OWASP Skavenger Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Source_Code_Flaws_Top_10_Project OWASP Source Code Flaws Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Sprajax_Project OWASP Sprajax Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Sqlibench_Project OWASP Sqlibench Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Teachable_Static_Analysis_Workbench_Project OWASP Teachable Static Analysis Workbench Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Tiger OWASP Tiger]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Tools_Project OWASP Tools Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_Uniform_Reporting_Guidelines OWASP Uniform Reporting Guidelines]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_WeBekci_Project OWASP Webekci Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/JBroFuzz JBroFuzz]&lt;br /&gt;
* [https://owasp.org/index.php/Category:OWASP_SWAAT_Project OWASP SWAAT Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Web_Application_Framework_Manifesto OWASP Secure Web Application Framework Manifesto]&lt;br /&gt;
* [https://www.owasp.org/index.php/Scrubbr OWASP Scrubbr]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes OWASP JavaScript Sandboxes Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project OWASP Joomla Vulnerability Scanner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hatkit_Datafiddler_Project OWASP Hatkit Datafiddler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hatkit_Proxy_Project OWASP Hatkit Proxy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Fiddler_Addons_for_Security_Testing_Project OWASP Fiddler Addons for Security Testing Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Forward_Exploit_Tool_Project OWASP Forward Exploit Tool Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database OWASP Fuzzing Code Database]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Cloud_‐_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Browser_Testing_System_Project OWASP Web Browser Testing System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Webscarab OWASP WebScarab Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Webslayer_Project OWASP Webslayer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_WSFuzzer_Project OWASP WSFuzzer Project]&lt;br /&gt;
* [http://owasp.com/index.php/Category:OWASP_Security_Assurance_Testing_of_Virtual_Worlds_Project OWASP Security Assurance Testing of Virtual Worlds Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WAF_Project OWASP WAF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VFW_Project OWASP VFW Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SIMBA_Project OWASP SIMBA Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ONYX OWASP ONYX]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_Uncertain_Form_Submit_Prevention OWASP Java Uncertain Form Submit Prevention]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ecuador OWASP Ecuador]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ESOP_Framework OWASP ESOP Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Alchemist_Project OWASP Alchemist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_the_Flag_Competition_Project OWASP Secure the Flag Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Browser_Security_ACID_Tests_Project OWASP Browser Security ACID Test Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AJAX_Crawling_Tool OWASP AJAX Crawling Tool]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Threat_Modelling_Project OWASP Threat Modeling Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Crossword_of_the_Month OWASP Crossword of the Month]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Password_Project OWASP Secure Password Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Myth_Breakers_Project OWASP Myth Breakers Project]&lt;br /&gt;
* [http://owasp.com/index.php/OWASP_Project_Partnership_Model OWASP Project Partnership Model]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Browser_Security_Project OWASP Browser Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_for_Managers OWASP Application Security Program for Managers]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Favicon_Database_Project OWASP Favicon Database Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_JDIs_Project OWASP Security JDIs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Hash_Repository OWASP File Hash Repository]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Skills_Assessment OWASP Application Security Skills Assessment]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Common_Numbering_Project OWASP Common Numbering Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WhatTheFuzz_Project#tab=Project_About OWASP WhatTheFuzz Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Tools_for_Developers_Project OWASP Security Tools for Developers Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Proxy OWASP Proxy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Desktop_Goat_and_Top_5_Project OWASP Desktop Goat and Top 5 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AW00T OWASP AW00t]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Framework_Security_Project OWASP Framework Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Crowdtesting OWASP Crowdtesting]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OVAL_Content_Project OWASP OVAL Content Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Software_Security_Assurance_Process OWASP Software Security Assurance Process]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Fuzzing_Framework_Project OWASP Application Fuzzing Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_IoTs_Project OWASP IoTs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/ESAPI_Swingset OWASP ESAPI Swingset Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VaultDB_Project OWASP VaultDB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Mutillidae OWASP Mutillidae Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Yasca_Project OWASP Yasca Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Exams_Project OWASP Exams Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Baseline_Project OWASP Security Baseline Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OpenStack_Security_Project OWASP OpenStack Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Format_Validation_Project OWASP File Format Validation Project]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Project Types =&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFGuard_Project OWASPCSRF Guard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Opa OWASP OPA]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_Encoder_Project OWASP Java Encoder Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passfault OWASP Passfault]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OctoMS OWASP OctoMS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JSON_Sanitizer OWASP JSON Sanitizer]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Research_and_Development_Framework OWASP Security Research and Development Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_1-Liner OWASP 1-Liner]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Focus OWASP Focus]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHPRBAC_Project OWASP PHPRBAC Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_EJSF_Project OWASP EJSF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Barbarus OWASP Barbarus]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iMAS_iOS_Mobile_Application_Security_Project OWASP iMAS - iOS Mobile Application Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_RBAC_Project OWASP RBAC Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHP_Security_Project OWASP PHP Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Simple_Host_Base_Incidence_Detection_System_Project OWASP Simple Host Base Incidence Detection System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Format_Validation_Project OWASP File Format Validation Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JAWS_Project OWASP JAWS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project OWASP Node.js Goat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ISO_IEC_27034_Application_Security_Controls_Project OWASP ISO/IEC 27034 Application Security Controls Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ultimatum_Project OWASP Ultimatum Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hardened_Phalcon_Project OWASP Hardened Phalcon Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Faux_Bank_Project OWASP Faux Bank Project]&lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
* [https://www.owasp.org/index.php?title=OWASP_Web_Testing_Environment_Project OWASP Web Testing Environment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Webgoat OWASP WebGoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project OWASP Broken Web Applications Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWAsP CSRFTester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_EnDe OWASP EnDe Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool OWASP HTTP Post Tool]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_XML_Templates_Project OWASP Java XML Templates Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mantra_-_Security_Framework OWASP Mantra Security Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Mutillidae OWASP Mutillidae Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_O2_Platform OWASP O2 Platform]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Vicnum_Project OWASP Vicnum Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Yasca_Project OWASP Yasca Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_NAXSI_Project OWASP NAXSI Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passw3rd_Project OWASP Passw3rd Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Hash_Repository OWASP File Hash Repository]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_WebGoat.NET OWASP WebGoat.NET]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Path_Traverser OWASP Path Traverser]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWASP_Watiqay OWASP Watiqay]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_Security_Shepherd/Roadmap OWASP Security Shepherd]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework OWASP Xenotix XSS Exploit Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mantra_OS OWASP Mantra OS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_XSSER OWASP XSSER]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Academy_Portal_Project OWASP Academy Portal Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ASIDE_Project OWASP ASIDE Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iGoat_Project OWASP iGoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SamuraiWTF_Project OWASP SamuraiWTF]&lt;br /&gt;
* [https://www.owasp.org/index.php/O-Saft O-Saft]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OpenStack_Security_Project OWASP OpenStack Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Bricks OWASP Bricks]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hive_Project OWASP Hive Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Droid_Fusion OWASP Droid Fusion]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iSABEL_Proxy_Server OWASP iSABEL Proxy Server]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project OWASP Rails Goat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Bywaf_Project OWASP Bywaf Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_S.T.I.N.G_Project OWASP S.T.I.N.G Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VaultDB_Project OWASP VaultDB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WS_Amplification_DoS_Project OWASP WS-Amplification DoS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project OWASP Mutillidae 2 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Skanda_SSRF_Exploitation_Framework OWASP Skanda - SSRF Exploitation Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP SeraphimDroid Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Unmaskme_Project OWASP Unmaskme Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Androick_Project OWASP Androïck Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SafeNuGet_Project OWASP SafeNuGet Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WebSandBox_Project OWASP WebSandBox Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HA_Vulnerability_Scanner_Project OWASP HA Vulnerability Scanner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Dependency_Track_Project OWASP Dependency Track Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHP_Portscanner_Project OWASP PHP Portscaner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer OWASP Java HTML Sanitizer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Pygoat_Project OWASP Pygoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Python_Security_Project OWASP Python Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Knocking_Project OWASP Web Knocking Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Financial_Information_Exchange_Security_Project OWASP Financial Information Exchange Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_STeBB_Project OWASP STeBB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_NINJA_PingU_Project OWASP NINJA PingU Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Encoder_Comparison_Reference_Project OWASP Encoder Comparison Reference Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_PHP_Security_Training_Project OWASP PHP Security Training Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/Projects/OWASP_iOSForensic OWASP iOSForensic]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Project_Metrics OWASP Project Metrics]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Store_Sheep_Project OWASP Store Sheep Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_SonarQube_Project OWASP SonarQube Project]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_URL_Checker OWASP URL Checker]&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project OWASP Code Review Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Codes_of_Conduct OWASP Codes of Conduct]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Guide_Project OWASP Development Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model OWASP Software Assurance Maturity Model(SAMM)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top Ten Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series OWASP AppSec Tutorial Series]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project OWASP AppSensor Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CTF_Project OWASP CTF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Legal_Project OWASP Legal Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Podcast OWASP Podcast Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Virtual_Patching_Best_Practices Virtual Patching Best Practices]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Data_Exchange_Format_Project OWASP Data Exchange Format Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Cheat_Sheets OWASP Cheat Sheets Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Proactive_Controls OWASP Proactive Controls]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_J2EE_Secure_Development_Curriculum OWASP Java/J2EE Secure Development Curriculum]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Baseline_Project OWASP Security Baseline Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Accessibility_Project#tab=Project_About OWASP Web Application Security Accessibility Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Requirements_Project OWASP Application Security Requirements Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Assessment_Standards_Project OWASP Application Security Assessment Standards Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CBT_Project OWASP Computer Based Training Project (OWASP CBT Project)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Enterprise_Application_Security_Project OWASP Enterprise Application Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Exams_Project OWASP Exams Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_GoatDroid_Project OWASP GoatDroid Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_RFP-Criteria OWASP Request For Proposal]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_University_Challenge OWASP University Challenge]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hacking_Lab OWASP Hacking-Lab]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Awareness_Top_10_E-learning_Project OWASP Application Security Awareness Top 10 E-learning Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Periodic_Table_of_Vulnerabilities OWASP Periodic Table of Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]&lt;br /&gt;
* [https://www.owasp.org/index.php/ESAPI_Swingset OWASP ESAPI Swingset Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Press OWASP Press]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_CISO_Survey OWASP CISO Survey]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Guide_For_CISOs_Project OWASP Application Security Guide For CISOs]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Scada_Security_Project OWASP Scada Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Application_Design_Project OWASP Secure Application Design Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10_Fuer_Entwickler_Project OWASP Top 10 Fuer Entwickler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10_Privacy_Risks_Project OWASP Top 10 Privacy Risks]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Quick_Reference_Guide_Project OWASP Web Application Security Quick Reference Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Windows_Binary_Executable_Files_Security_Checks_Project OWASP Windows Binary Executable Files Security Checks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Wordpress_Security_Checklist_Project OWASP Wordpress Security Checklist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project OWASP Supporting Legacy Web Applications in the Current Environment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Principles_Project OWASP Security Principles Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ruby_on_Rails_and_friends_Security_Guide OWASP Ruby on Rails and friends Security Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Media_Project OWASP Media Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Global_Chapter_Meetings_Project OWASP Global Chapter Meetings Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project OWASP Vulnerable Web Applications Directory Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project OWASP Game Security Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Labeling_System_Project OWASP Security Labeling System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_IoTs_Project OWASP IoTs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Insecure_Web_Components_Project OWASP Insecure Web Components Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project OWASP Reverse Engineering and Code Modification Prevention Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Student_Chapters_Program OWASP Student Chapters Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Education_Project OWASP Education Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Speakers_Project OWASP Speakers Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project OWASP Internet of Things Top Ten Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_.NET_Project OWASP .NET Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Research_Book_Project OWASP Research Book Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Open_Cyber_Security_Framework_Project OWASP Open Cyber Security Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_Trumps_for_Projects OWASP Top Trumps for Projects]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195079</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195079"/>
				<updated>2015-05-20T13:54:19Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Recent News and Events */ Fixing Date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
* '''Wide Topic Coverage: ''' Shepherd includes over sixty levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
* '''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
* '''Layman Write Ups:''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
* '''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
* '''Scalability:''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
* '''Highly Customisable:''' Shepherd enables admins to set what levels are available to their users and in what way they are presentended (Open, CTF and Tournament Layouts)&lt;br /&gt;
* '''Perfect for Classrooms:''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
* '''Scoreboard:''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
* '''User Management:''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
* '''Robust Service:''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
* '''Configurable Feedback:''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
* '''Granular Logging:''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2014] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195038</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195038"/>
				<updated>2015-05-19T23:10:06Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
* '''Wide Topic Coverage: ''' Shepherd includes over sixty levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
* '''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
* '''Layman Write Ups:''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
* '''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
* '''Scalability:''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
* '''Highly Customisable:''' Shepherd enables admins to set what levels are available to their users and in what way they are presentended (Open, CTF and Tournament Layouts)&lt;br /&gt;
* '''Perfect for Classrooms:''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
* '''Scoreboard:''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
* '''User Management:''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
* '''Robust Service:''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
* '''Configurable Feedback:''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
* '''Granular Logging:''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2015] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195037</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195037"/>
				<updated>2015-05-19T23:08:24Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Adding &amp;quot;Why Use Shepherd&amp;quot; Section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
== Why use Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
* '''Wide Topic Coverage: ''' Shepherd includes over sixty levels across the entire spectrum of Web and Mobile application security under a single project.&lt;br /&gt;
* '''Gentle Learning Curve: ''' Shepherd is a perfect for users completely new to security with levels increases in difficulty at a pleasant pace.&lt;br /&gt;
* '''Layman Write Ups:''' Each security concept when first presented in Shepherd, is done so in layman terms so that anyone can beginner can absorb them.&lt;br /&gt;
* '''Real World Examples: ''' The security risks in Shepherd are real vulnerabilities that have had their exploit impact dampened to protect the application, users and environment. There are no simulated security risks which require an expected, specific attack vector in order to pass a level. Attack vectors when used on Shepherd are how they would behave in the real world.&lt;br /&gt;
* '''Scalability:''' Shepherd can be used locally by a single user or easily as a server for a high amount of users. &lt;br /&gt;
* '''Highly Customisable:''' Shepherd enables admins to set what levels are available to their users and in what way they are presentended (Open, CTF and Tournament Layouts)&lt;br /&gt;
* '''Perfect for Classrooms:''' Shepherd gives its players user specific solution keys to prevent students from sharing keys, rather than going through the steps required to complete a level. &lt;br /&gt;
* '''Scoreboard:''' Security Shepherd has a configurable scoreboard to encourage a competitive learning environment. Users that complete levels first, second and third get medals on their scoreboard entry and bonus points to keep things entertaining on the scoreboard. &lt;br /&gt;
* '''User Management:''' Security Shepherd admins can create users, create admins, suspend, unsuspend, add bonus points or take penalty points away user accounts with the admin user management controls. Admins can also segment their students into specific class groups. Admins can view the progress a class has made to identify struggling participants. An admin can even close public registration and manually create users if they wish for a private experience.&lt;br /&gt;
* '''Robust Service:''' Shepherd has been used to run online CTFs such as the OWASP Global CTF and OWASP LATAM Tour CTF 2015, both surpassing 200 active users and running with no downtime, bar planned maintenance periods. &lt;br /&gt;
* '''Configurable Feedback:''' An administrator can enable a feedback process, which must be completed by users before a level is marked as complete. This is used both to facilitate project improvements based on feedback submitted and for system administrators to collect &amp;quot;Reports of Understanding&amp;quot; from their students.&lt;br /&gt;
* '''Granular Logging:''' The logs reported by Security Shepherd are highly detailed and descriptive, but not screen blinding. If a user is misbehaving, you will know. &lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2015] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195023</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195023"/>
				<updated>2015-05-19T15:28:25Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project|OWASP Webgoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2015] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195022</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195022"/>
				<updated>2015-05-19T15:27:34Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project OWASP WebGoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2015] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195020</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195020"/>
				<updated>2015-05-19T15:22:28Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Phrasing&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and helps them exploit a text book version of the issue. Challenges include poor security mitigations to vulnerabilities which have left room for users to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Shepherd's security risks are delivered through hardened real vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2015] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195018</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195018"/>
				<updated>2015-05-19T15:10:05Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* Topic Coverage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take any user, from AppSec novice to experienced engineer, and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and help them exploit a text book version of the issue. Challenges include poor security mitigations to the security risk which have left room for user's to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd's security risks are delivered through hardened real security vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web and mobile application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2015] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195017</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=195017"/>
				<updated>2015-05-19T15:09:29Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Wiki Restruture&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Lab_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Shepherd==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take any user, from AppSec novice to experienced engineer, and sharpen their penetration testing skillset to security expert status.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished by presenting security risk concepts to users in lessons followed by challenges. A lesson provides a user with help in layman terms about a specific security risk, and help them exploit a text book version of the issue. Challenges include poor security mitigations to the security risk which have left room for user's to exploit.&lt;br /&gt;
&lt;br /&gt;
Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd's security risks are delivered through hardened real security vulnerabilities that can not be abused to compromise the application or its environment. Shepherd does not simulate security risks so that all and any attack vectors will work, ensuring a real world response. &lt;br /&gt;
&lt;br /&gt;
Security Shepherd is highly configurable. System administrators can tune the project experience to present specific security risk topics or even specific Security Shepherd modules. The array of user and module configuration available allows Shepherd to be used by a single local user, by many in a competitive classroom environment or by hundreds in an online hacking competition. &lt;br /&gt;
&lt;br /&gt;
==Layout Options==&lt;br /&gt;
&lt;br /&gt;
An administrator user of Security Shepherd can change the layout in which the levels are presented to players. There are three options:&lt;br /&gt;
&lt;br /&gt;
'''CTF Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the CTF mode, a user can only access one uncompleted module at a time. The first module presented to the user is the easiest in Security Shepherd, which has not been marked as closed by the administrator. The levels increase slowly in difficulty and jump from one topic to another. This layout is the recommended setting when using Security Shepherd for a competitive training scenario.&lt;br /&gt;
&lt;br /&gt;
'''Open Floor'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Open Floor mode, a user can access any level that is marked as open by the admin. Modules are sorted into their Security Risk Categories, and the lessons are presented first. This layout is ideal for users wishing to explore security risks. &lt;br /&gt;
&lt;br /&gt;
'''Tournament Mode'''&lt;br /&gt;
&lt;br /&gt;
When Shepherd has been deployed in the Tournament Mode, a user can access any level that is marked as open by the admin. Modules are sorted into difficulty bands, from least to most difficult. This layout is ideal when Shepherd is being utilised as an open application security competition.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:350px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Security Shepherd? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd provides:&lt;br /&gt;
&lt;br /&gt;
* Teaching Tool for All Application Security&lt;br /&gt;
* Web Application Pen Testing Training&lt;br /&gt;
* Mobile Application Pen Testing Training&lt;br /&gt;
* Safe Playground to Practise AppSec Techniques&lt;br /&gt;
* Real Security Risk Examples&lt;br /&gt;
&lt;br /&gt;
==Topic Coverage==&lt;br /&gt;
The Security Shepherd project covers the following web application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2013-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2013-A2|Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2013-A3|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2013-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2013-A6|Sensitive Data Exposure]]&lt;br /&gt;
*[[Top_10_2013-A7|Missing Function Level Access Control]]&lt;br /&gt;
*[[Top_10_2013-A8|Cross Site Request Forgery]]&lt;br /&gt;
*[[Top 10 2013-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M5|Poor Authentication and Authorisation]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_WebGoat_Project]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The Security Shepherd project is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of  merchantability or fitness for a particular purpose.  See the GNU General Public License for more details. See http://www.gnu.org/licenses/ .&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:250px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://sourceforge.net/projects/owaspshepherd/files/ OWASP Security Shepherd SourceForge]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=-brsnYrksAI AppSecEU 2014 Video]&lt;br /&gt;
&lt;br /&gt;
[http://2014.appsec.eu/wp-content/uploads/2014/07/Sean.Duggan-OWASP-Security-Shepherd-Mobile-Web-Security-Awareness-and-Education.pdf AppSecEU 2014 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
Mark Denihan - mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
Sean Duggan  - sean.duggan@owasp.org &lt;br /&gt;
&lt;br /&gt;
== Recent News and Events ==&lt;br /&gt;
* [May 2015] Security Shepherd @ AppSecEU 2015 Project Summit&lt;br /&gt;
* [May 2015] Shepherd v2.3 Released&lt;br /&gt;
* [April 2015] Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
* [December 2015] Shepherd V2.2 Released&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-labs-trans-85.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1 Can I Re-Skin Shepherd and then Train People With it?&lt;br /&gt;
: A1 Yes! Shepherd plans to include this in-app in version 2.4&lt;br /&gt;
&lt;br /&gt;
; Q2 Where can I access Security Shepherd?&lt;br /&gt;
: A2 You can Download it and run it yourself, ask your lecturer to, and we tend to have a public environment available at https://owasp.securityshepherd.eu/ . It operates on a Research Network in ITB's Security Research Lab, so it can be in a state of flux.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
OWASP Security Shepherd is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Mark Denihan&lt;br /&gt;
* Sean Duggan&lt;br /&gt;
* Ciaran Napier&lt;br /&gt;
* Jason Flood&lt;br /&gt;
* Patrick Hanily&lt;br /&gt;
* Peter Dolan&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please contact Mark.denihan@owasp.org&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org. The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education. Check out the project [http://bit.ly/securityShepherdGithub GitHub] and find some issues that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
==Other==&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to DIT for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2015] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
&lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
=Setup Help=&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
=Screenshots=&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|left|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|left|Competitive Learning Environment]] [[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|left|Easy configuration to suit every use]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=195003</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=195003"/>
				<updated>2015-05-19T11:17:16Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Removing OWASP Security Shepherd from Incubators&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project have been evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_WebGoat_Project|WebGoat]]&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Security_Shepherd|OWASP Security Shepherd]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project| OWASP Code Pulse]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
'''Code [Low Activity]'''&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
* [[OWASP_Joomla_Vulnerability_Scanner_Project]]&lt;br /&gt;
&lt;br /&gt;
'''Documentation [Low Activity]'''&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====Code: Low Activity=====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]]&lt;br /&gt;
&lt;br /&gt;
====Research====&lt;br /&gt;
* [[OWASP_WASC_Distributed_Web_Honeypots_Project|OWASP WASC Distributed Web Honeypots Project]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]]&lt;br /&gt;
* [[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] &lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] &lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] &lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: May 2015]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
* [[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
&lt;br /&gt;
==Educational Initiatives==&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
Some recommendations on how to start a documentation project&lt;br /&gt;
[[https://www.owasp.org/index.php/File:Document_Guide_(1).png| Document Guide Project]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Request (Bangladesh)]:For Information Security Project contact with OWASP Bangladesh Project Leader [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
'''Code Projects''': OWASP code projects are very important for the cyber security solutions. Because these projects are used to find out the application security problems and try to solve those problems. Best code project is [[OWASP System Vulnerable Code Project]] and best project leader is [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=195002</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=195002"/>
				<updated>2015-05-19T11:16:28Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Adding OWASP Security Shepherd to Labs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project have been evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_WebGoat_Project|WebGoat]]&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Security_Shepherd|OWASP Security Shepherd]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project| OWASP Code Pulse]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
'''Code [Low Activity]'''&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
* [[OWASP_Joomla_Vulnerability_Scanner_Project]]&lt;br /&gt;
&lt;br /&gt;
'''Documentation [Low Activity]'''&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====Code: Low Activity=====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]]&lt;br /&gt;
&lt;br /&gt;
====Research====&lt;br /&gt;
* [[OWASP_WASC_Distributed_Web_Honeypots_Project|OWASP WASC Distributed Web Honeypots Project]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]]&lt;br /&gt;
* [[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Security_Shepherd|OWASP Security Shepherd]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] &lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] &lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] &lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: May 2015]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
* [[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
&lt;br /&gt;
==Educational Initiatives==&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
Some recommendations on how to start a documentation project&lt;br /&gt;
[[https://www.owasp.org/index.php/File:Document_Guide_(1).png| Document Guide Project]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Request (Bangladesh)]:For Information Security Project contact with OWASP Bangladesh Project Leader [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
'''Code Projects''': OWASP code projects are very important for the cyber security solutions. Because these projects are used to find out the application security problems and try to solve those problems. Best code project is [[OWASP System Vulnerable Code Project]] and best project leader is [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Summit_2015/Project_Participation&amp;diff=194890</id>
		<title>OWASP Project Summit 2015/Project Participation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Summit_2015/Project_Participation&amp;diff=194890"/>
				<updated>2015-05-15T16:02:43Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: /* OWASP Sheperd */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Projects Participating==&lt;br /&gt;
&lt;br /&gt;
===OWASP ZAP===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project&lt;br /&gt;
&lt;br /&gt;
===OWASP OWTF===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
===OWASP Cornucopia===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Cornucopia&lt;br /&gt;
&lt;br /&gt;
===OWASP AppSensor===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
&lt;br /&gt;
===OWASP ASVS ===&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project&lt;br /&gt;
&lt;br /&gt;
===OWASP Code Review ===&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project&lt;br /&gt;
&lt;br /&gt;
===OWASP Hackademics===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project&lt;br /&gt;
&lt;br /&gt;
===OWASP Snakes and Ladders ===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders&lt;br /&gt;
&lt;br /&gt;
===OWASP Knowledge Based Authentication Performance Metrics ===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threats to Web Applications===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications&lt;br /&gt;
&lt;br /&gt;
===OWASP Codes of Conduct===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Codes_of_Conduct&lt;br /&gt;
&lt;br /&gt;
===OWASP Security Shepherd===&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
===OWASP Open SAMM===&lt;br /&gt;
https://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=194879</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=194879"/>
				<updated>2015-05-15T12:45:36Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: Updating Project Status Banner&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|right|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|right|Competitive Learning Environment]]&lt;br /&gt;
'''Security Shepherd''' is a computer based training application for web and mobile application security vulnerabilities. This project strives to herd the lost sheep of the technological world back to the safe and sound ways of secure practices. Security Shepherd can be deployed as a CTF (Capture the Flag) game or as an open floor educational server.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|right|Easy configuration to suit every use]]&lt;br /&gt;
Security Shepherd has been implemented with the aim of fostering and improving security awareness among a varied skill-set demographic. This project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished through lesson and challenge techniques. A lesson provides a user with a lot of help in completing that module, where a challenge puts what the user learned in the lesson to use. Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd's vulnerabilities are not simulated, and are instead delivered through hardened real security vulnerabilities that can not be abused to compromise the application or its environment. Many of these levels include insufficient protections to these vulnerabilities, such as black list filters and poor security configuration.&lt;br /&gt;
&lt;br /&gt;
===CTF Mode===&lt;br /&gt;
Security Shepherd can be morphed into a CTF server by an administrator with the click of a button. This presents users with one module at a time. They must complete their current level before they can continue. Administrators can also set a &amp;quot;Module Block&amp;quot; that prevents users from progressing past a certain level. It is also possible to run a CTF in a Tournament mode where a user can complete any module in any order they wish. When either of these modes are enabled, the scoreboard is then available. The scoreboard updates automatically and reflects the bonus points users achieve by completing a module first, second or third.&lt;br /&gt;
&lt;br /&gt;
===User Management===&lt;br /&gt;
Security Shepherd includes a user friendly method of creating many users at a time for administrators, as well as an optional open registry system. Users' activities are logged allowing an administrator to gather real time data on who is connected to Security Shepherd and what their module progress is. This data can be mined to gather information on who was online, at what time and how much time has been actively spent on a challenge.&lt;br /&gt;
&lt;br /&gt;
===Topic Coverage===&lt;br /&gt;
The Security Shepherd project covers the following web application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2010-A3|Broken Authetication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A5|Cross Site Rrequest Forgery]]&lt;br /&gt;
*[[Top_10_2010-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2010-A7|Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Top_10_2010-A9|Insufficient Transport Layer Security]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download the Security Shepherd VM or Manual Installation Pack from [https://sourceforge.net/projects/owaspshepherd/files/ Source Forge].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
Security Shepherd has been designed with expansion in mind. The application's underlying architecture is composed of a secure core application and database server that depicts how the application runs. There is also an exposed application and database service that runs all of the server side vulnerability examples. If these services are compromised, the core service can continue to run unaffected.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd is written in Java and is compiled in a web application archive (WAR) and therefore can be run on any platform with a Java virtual machine and a web application server like Tomcat. To eliminate tedious environment configuration; there is a Security Shepherd Virtual Machine. This environment includes Tomcat/MySQL servers pre-loaded with Security Shepherd. For those that prefer the path of higher resistance or want to build a dedicated Security Shepherd server, a manual pack is available for download as well.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org.&lt;br /&gt;
&lt;br /&gt;
The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education.&lt;br /&gt;
Check out the project [https://www.owasp.org/index.php/Projects/OWASP_Security_Shepherd/Roadmap roadmap] and find some tasks that you can help with right away..&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
== Events with Security Shepherd ==&lt;br /&gt;
[[Image:Shepherd-CTF-In-Play.JPG|thumb|300px|right|Over 60 people playing the CTF at [[HackDub2012]]]]&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd application has been tried and tested across a number of Beta runs in venues like Facebook and the IRISScon CTF. Since these events Security Shepherd has been knocking on security doors trying to be recognized as the new platform for web application security training. &lt;br /&gt;
&lt;br /&gt;
* Security Shepherd was used as the [[HackDub2012|OWASP Dublin Hackathon 2012]]&lt;br /&gt;
* Security Shepherd's platform was used be used to manage the [[AppSecIreland2012| OWASP Ireland AppSec 2012]] CTF in September 2012&lt;br /&gt;
* Security Shepherd's platform was used to administer the Traditional Style CTF at the IRISS security conference in October 2012 and 2013&lt;br /&gt;
* Security Shepherd's platform was used to deliver the Traditional Style CTF at the 2013 SOURCE Conference CTF in Facebook&lt;br /&gt;
* Security Shepherd's platform was used to govern the EU Tour 2013 and LATAM Tour 2013 Online CTF's&lt;br /&gt;
* Security Shepherd's platform was used to conduct the 2013 OWASP Global CTF&lt;br /&gt;
* Security Shepherd was used as the 2014 OWASP application security summer school CTF at the Faculty of Organization and Informatics in Varaždin&lt;br /&gt;
* Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project was founded and is ran by Mark Denihan. The mobile wing of Security Shepherd is lead by Sean Duggan. If you wish to contribute to the OWASP Security Shepherd project please contact at mark.denihan@owasp.org, as help in any regard of the application is very much appreciated.  Security Shepherd distributions are currently maintained on [http://bit.ly/shepherdSourceForge SourceForge]. The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the Security Shepherd [https://lists.owasp.org/mailman/listinfo/owasp_security_shepherd mailing list].&lt;br /&gt;
&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to [http://www.dit.ie DIT] for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2014] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]][[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|Security Shepherd Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=194878</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=194878"/>
				<updated>2015-05-15T12:43:51Z</updated>
		
		<summary type="html">&lt;p&gt;Mark Denihan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|right|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|right|Competitive Learning Environment]]&lt;br /&gt;
'''Security Shepherd''' is a computer based training application for web and mobile application security vulnerabilities. This project strives to herd the lost sheep of the technological world back to the safe and sound ways of secure practices. Security Shepherd can be deployed as a CTF (Capture the Flag) game or as an open floor educational server.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|right|Easy configuration to suit every use]]&lt;br /&gt;
Security Shepherd has been implemented with the aim of fostering and improving security awareness among a varied skill-set demographic. This project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished through lesson and challenge techniques. A lesson provides a user with a lot of help in completing that module, where a challenge puts what the user learned in the lesson to use. Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd's vulnerabilities are not simulated, and are instead delivered through hardened real security vulnerabilities that can not be abused to compromise the application or its environment. Many of these levels include insufficient protections to these vulnerabilities, such as black list filters and poor security configuration.&lt;br /&gt;
&lt;br /&gt;
===CTF Mode===&lt;br /&gt;
Security Shepherd can be morphed into a CTF server by an administrator with the click of a button. This presents users with one module at a time. They must complete their current level before they can continue. Administrators can also set a &amp;quot;Module Block&amp;quot; that prevents users from progressing past a certain level. It is also possible to run a CTF in a Tournament mode where a user can complete any module in any order they wish. When either of these modes are enabled, the scoreboard is then available. The scoreboard updates automatically and reflects the bonus points users achieve by completing a module first, second or third.&lt;br /&gt;
&lt;br /&gt;
===User Management===&lt;br /&gt;
Security Shepherd includes a user friendly method of creating many users at a time for administrators, as well as an optional open registry system. Users' activities are logged allowing an administrator to gather real time data on who is connected to Security Shepherd and what their module progress is. This data can be mined to gather information on who was online, at what time and how much time has been actively spent on a challenge.&lt;br /&gt;
&lt;br /&gt;
===Topic Coverage===&lt;br /&gt;
The Security Shepherd project covers the following web application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2010-A3|Broken Authetication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A5|Cross Site Rrequest Forgery]]&lt;br /&gt;
*[[Top_10_2010-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2010-A7|Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Top_10_2010-A9|Insufficient Transport Layer Security]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download the Security Shepherd VM or Manual Installation Pack from [https://sourceforge.net/projects/owaspshepherd/files/ Source Forge].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
Security Shepherd has been designed with expansion in mind. The application's underlying architecture is composed of a secure core application and database server that depicts how the application runs. There is also an exposed application and database service that runs all of the server side vulnerability examples. If these services are compromised, the core service can continue to run unaffected.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd is written in Java and is compiled in a web application archive (WAR) and therefore can be run on any platform with a Java virtual machine and a web application server like Tomcat. To eliminate tedious environment configuration; there is a Security Shepherd Virtual Machine. This environment includes Tomcat/MySQL servers pre-loaded with Security Shepherd. For those that prefer the path of higher resistance or want to build a dedicated Security Shepherd server, a manual pack is available for download as well.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter (or a Host-Only adapter if you don't want anyone else to connect)&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.3 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR file from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the ROOT directory found in the temp folder, modify the /WEB-INF/coreDatabase.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org.&lt;br /&gt;
&lt;br /&gt;
The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education.&lt;br /&gt;
Check out the project [https://www.owasp.org/index.php/Projects/OWASP_Security_Shepherd/Roadmap roadmap] and find some tasks that you can help with right away..&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
== Events with Security Shepherd ==&lt;br /&gt;
[[Image:Shepherd-CTF-In-Play.JPG|thumb|300px|right|Over 60 people playing the CTF at [[HackDub2012]]]]&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd application has been tried and tested across a number of Beta runs in venues like Facebook and the IRISScon CTF. Since these events Security Shepherd has been knocking on security doors trying to be recognized as the new platform for web application security training. &lt;br /&gt;
&lt;br /&gt;
* Security Shepherd was used as the [[HackDub2012|OWASP Dublin Hackathon 2012]]&lt;br /&gt;
* Security Shepherd's platform was used be used to manage the [[AppSecIreland2012| OWASP Ireland AppSec 2012]] CTF in September 2012&lt;br /&gt;
* Security Shepherd's platform was used to administer the Traditional Style CTF at the IRISS security conference in October 2012 and 2013&lt;br /&gt;
* Security Shepherd's platform was used to deliver the Traditional Style CTF at the 2013 SOURCE Conference CTF in Facebook&lt;br /&gt;
* Security Shepherd's platform was used to govern the EU Tour 2013 and LATAM Tour 2013 Online CTF's&lt;br /&gt;
* Security Shepherd's platform was used to conduct the 2013 OWASP Global CTF&lt;br /&gt;
* Security Shepherd was used as the 2014 OWASP application security summer school CTF at the Faculty of Organization and Informatics in Varaždin&lt;br /&gt;
* Security Shepherd's platform was used to run the LATAM Tour 2015 Online CTF&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project was founded and is ran by Mark Denihan. The mobile wing of Security Shepherd is lead by Sean Duggan. If you wish to contribute to the OWASP Security Shepherd project please contact at mark.denihan@owasp.org, as help in any regard of the application is very much appreciated.  Security Shepherd distributions are currently maintained on [http://bit.ly/shepherdSourceForge SourceForge]. The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the Security Shepherd [https://lists.owasp.org/mailman/listinfo/owasp_security_shepherd mailing list].&lt;br /&gt;
&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to [http://www.dit.ie DIT] for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2014] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]][[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|Security Shepherd Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Mark Denihan</name></author>	</entry>

	</feed>