<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rcbarnett</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rcbarnett"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rcbarnett"/>
		<updated>2026-05-19T12:38:03Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project_Archived_Projects&amp;diff=235546</id>
		<title>Category:OWASP Project Archived Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project_Archived_Projects&amp;diff=235546"/>
				<updated>2017-11-17T13:44:21Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Archived /Low Activity Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Inactive/Archived/ Low Activity Projects==&lt;br /&gt;
&lt;br /&gt;
====Archived /Low Activity Projects====&lt;br /&gt;
&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the projects below (inactive), please contact us and let us know of your interest. &lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP_File Format Validation Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
* [[OWASP_Mantra_OS|OWASP Mantra OS]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
* [[https://www.owasp.org/index.php/WebGoatPHP | WebGoatPHP]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] &lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] &lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]]&lt;br /&gt;
* [[OWASP_Joomla_Vulnerability_Scanner_Project|OWASP Joomla Vulnerability Scanner Project]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
* [[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
* [[OWASP_Knowledge_Graph|OWASP_Knowledge_Graph]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_Click_Me_Project|OWASP Click Me Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
* [[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
* [[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
* [[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
* [[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]&lt;br /&gt;
* [[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
* [[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
* [[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
* [[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
* [[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]]11/25/2015&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
* [[:Category:OWASP_Orizon_Project|OWASP Orizon Project]] &lt;br /&gt;
* [[OWASP_PHP_Portscanner_Project|OWASP PHP Portscaner Project]]&lt;br /&gt;
* [[OWASP_Androick_Project|OWASP Androïck Project]]&lt;br /&gt;
* [[OWASP_EJSF_Project|OWASP EJSF Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Access_Control_Rules_Tester_Project OWASP Access Control Rules Tester Project]&lt;br /&gt;
* [[OWASP_URL_Checker|OWASP URL Checker]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Metrics_Project OWASP Application Security Metrics Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AppSec_FAQ_Project OWASP AppSec FAQ Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Asdr OWASP ASDR Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Backend_Security_Project OWASP Backend Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls OWASP Best Practices: Use of Web Application Firewalls]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CAL9000_Project OWASP CAL9000 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CLASP_Project OWASP CLASP Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Code_Crawler OWASP CodeCrawler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Content_Validation_using_Java_Annotations_Project OWASP Content Validation using Java Annotations Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project OWASP DirBuster Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Encoding_Project OWASP Encoding Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Google_Hacking_Project OWASP Google Hacking Project]&lt;br /&gt;
*[[OWASP_Game_Security_Framework_Project|OWASP Game Security Framework Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project OWASP Insecure Web App Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Interceptor_Project OWASP Interceptor Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_JSP_Testing_Tool_Project OWASP JSP Testing Tool Project]&lt;br /&gt;
* [[OWASP_Java_XML_Templates_Project|OWASP Java XML Templates Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_LiveCD_Education_Project OWASP LiveCD Education Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Logging_Project OWASP Logging Guide]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_NetBouncer_Project OWASP NetBouncer Project]&lt;br /&gt;
* [[OWASP_NAXSI_Project|OWASP NAXSI Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp OWASP OpenPGP Extensions for HTTP - Enigform and mod_openpgp Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_OpenSign_Server_Project OWASP OpenSign Server Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project OWASP Pantera Web Assessment Studio Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_PHP_Project OWASP PHP Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/ORG_%28OWASP_Report_Generator%29 OWASP Report Generator]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_SASAP_Project OWASP Scholastic Application Security Assessment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Analysis_of_Core_J2EE_Design_Patterns_Project OWASP Security Analysis of Core J2EE Design Patterns Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Spending_Benchmarks OWASP Security Spending Benchmarks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SiteGenerator OWASP Site Generator Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Skavenger_Project OWASP Skavenger Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Source_Code_Flaws_Top_10_Project OWASP Source Code Flaws Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Sprajax_Project OWASP Sprajax Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Sqlibench_Project OWASP Sqlibench Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Teachable_Static_Analysis_Workbench_Project OWASP Teachable Static Analysis Workbench Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Tiger OWASP Tiger]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Tools_Project OWASP Tools Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_Uniform_Reporting_Guidelines OWASP Uniform Reporting Guidelines]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_WeBekci_Project OWASP Webekci Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/JBroFuzz JBroFuzz]&lt;br /&gt;
* [https://owasp.org/index.php/Category:OWASP_SWAAT_Project OWASP SWAAT Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Web_Application_Framework_Manifesto OWASP Secure Web Application Framework Manifesto]&lt;br /&gt;
* [https://www.owasp.org/index.php/Scrubbr OWASP Scrubbr]&lt;br /&gt;
* [[OWASP_Scada_Security_Project|OWASP Scada Security Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes OWASP JavaScript Sandboxes Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hatkit_Datafiddler_Project OWASP Hatkit Datafiddler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hatkit_Proxy_Project OWASP Hatkit Proxy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Fiddler_Addons_for_Security_Testing_Project OWASP Fiddler Addons for Security Testing Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Forward_Exploit_Tool_Project OWASP Forward Exploit Tool Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database OWASP Fuzzing Code Database]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Cloud_‐_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Browser_Testing_System_Project OWASP Web Browser Testing System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Webscarab OWASP WebScarab Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Webslayer_Project OWASP Webslayer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_WSFuzzer_Project OWASP WSFuzzer Project]&lt;br /&gt;
* [http://owasp.com/index.php/Category:OWASP_Security_Assurance_Testing_of_Virtual_Worlds_Project OWASP Security Assurance Testing of Virtual Worlds Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WAF_Project OWASP WAF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VFW_Project OWASP VFW Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SIMBA_Project OWASP SIMBA Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ONYX OWASP ONYX]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_Uncertain_Form_Submit_Prevention OWASP Java Uncertain Form Submit Prevention]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ecuador OWASP Ecuador]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ESOP_Framework OWASP ESOP Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Alchemist_Project OWASP Alchemist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_the_Flag_Competition_Project OWASP Secure the Flag Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Browser_Security_ACID_Tests_Project OWASP Browser Security ACID Test Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AJAX_Crawling_Tool OWASP AJAX Crawling Tool]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Threat_Modelling_Project OWASP Threat Modeling Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Crossword_of_the_Month OWASP Crossword of the Month]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Password_Project OWASP Secure Password Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Myth_Breakers_Project OWASP Myth Breakers Project]&lt;br /&gt;
* [http://owasp.com/index.php/OWASP_Project_Partnership_Model OWASP Project Partnership Model]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Browser_Security_Project OWASP Browser Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_for_Managers OWASP Application Security Program for Managers]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Favicon_Database_Project OWASP Favicon Database Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_JDIs_Project OWASP Security JDIs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Hash_Repository OWASP File Hash Repository]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Crowdtesting OWASP Crowdtesting]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Skills_Assessment OWASP Application Security Skills Assessment]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Common_Numbering_Project OWASP Common Numbering Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WhatTheFuzz_Project#tab=Project_About OWASP WhatTheFuzz Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Tools_for_Developers_Project OWASP Security Tools for Developers Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Proxy OWASP Proxy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AW00T OWASP AW00t]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Framework_Security_Project OWASP Framework Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Desktop_Goat_and_Top_5_Project OWASP Desktop Goat and Top 5 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OVAL_Content_Project OWASP OVAL Content Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Software_Security_Assurance_Process OWASP Software Security Assurance Process]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Fuzzing_Framework_Project OWASP Application Fuzzing Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Good_Component_Practices_Project OWASP Good Component Practices Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_1-Liner OWASP 1-Liner]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Java_Project OWASP Java Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Accessibility_Project#tab=Project_About OWASP Web Application Security Accessibility Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OctoMS OWASP OctoMS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_J2EE_Secure_Development_Curriculum OWASP Java/J2EE Secure Development Curriculum]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Droid_Fusion OWASP Droid Fusion]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iSABEL_Proxy_Server OWASP iSABEL Proxy Server]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WS_Amplification_DoS_Project OWASP WS-Amplification DoS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Windows_Binary_Executable_Files_Security_Checks_Project OWASP Windows Binary Executable Files Security Checks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Wordpress_Security_Checklist_Project OWASP Wordpress Security Checklist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Simple_Host_Base_Incidence_Detection_System_Project OWASP Simple Host Base Incidence Detection System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Unmaskme_Project OWASP Unmaskme Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HA_Vulnerability_Scanner_Project OWASP HA Vulnerability Scanner Project]&lt;br /&gt;
* [[OWASP_Hive_Project|OWASP Hive Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Pygoat_Project OWASP Pygoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Labeling_System_Project OWASP Security Labeling System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_IoTs_Project OWASP IoTs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_STeBB_Project OWASP STeBB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ultimatum_Project OWASP Ultimatum Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/ESAPI_Swingset OWASP ESAPI Swingset Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VaultDB_Project OWASP VaultDB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Mutillidae OWASP Mutillidae Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Yasca_Project OWASP Yasca Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Requirements_Project OWASP Application Security Requirements Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CBT_Project OWASP Computer Based Training Project (OWASP CBT Project)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Exams_Project OWASP Exams Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passw3rd_Project OWASP Passw3rd Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_XSSER OWASP XSSER]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Assessment_Standards_Project OWASP Application Security Assessment Standards Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Baseline_Project OWASP Security Baseline Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OpenStack_Security_Project OWASP OpenStack Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_S.T.I.N.G_Project OWASP S.T.I.N.G Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWASP CSRFTester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Awareness_Top_10_E-learning_Project OWASP Application Security Awareness Top 10 E-learning Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Quick_Reference_Guide_Project OWASP Web Application Security Quick Reference Guide Project]&lt;br /&gt;
* [[Opa|OWASP OPA]]&lt;br /&gt;
* [[OWASP_Focus|OWASP Focus]]&lt;br /&gt;
* [[OWASP_Path_Traverser|OWASP Path Traverser]]&lt;br /&gt;
* [[OWASP_Watiqay|OWASP Watiqay]]&lt;br /&gt;
* [[OWASP_Academy_Portal_Project|OWASP Academy Portal Project]]&lt;br /&gt;
* [[OWASP_SamuraiWTF_Project|OWASP SamuraiWTF]] &lt;br /&gt;
* [[OWASP_SafeNuGet_Project|OWASP SafeNuGet Project]]&lt;br /&gt;
* [[OWASP_Rails_Goat_Project|OWASP Rails Goat Project]]&lt;br /&gt;
* [[OWASP_Research_Book_Project|OWASP Research Book Project]]&lt;br /&gt;
* [[OWASP_WebSandBox_Project|OWASP WebSandBox Project]]&lt;br /&gt;
* [[OWASP_Financial_Information_Exchange_Security_Project|OWASP Financial Information Exchange Security Project]]&lt;br /&gt;
* [[OWASP_Skanda_SSRF_Exploitation_Framework|OWASP Skanda - SSRF Exploitation Framework]]&lt;br /&gt;
* [[OWASP_JAWS_Project|OWASP JAWS Project]]&lt;br /&gt;
* [[OWASP_Secure_Headers_Project|OWASP Secure Headers Project]]&lt;br /&gt;
* [[OWASP_Barbarus|OWASP Barbarus]]&lt;br /&gt;
*[[OWASP_LAPSE_Project|OWASP LAPSE Project]]&lt;br /&gt;
*[[OWASP_Press|OWASP Press]]&lt;br /&gt;
====Research====&lt;br /&gt;
* [[OWASP_WASC_Distributed_Web_Honeypots_Project|OWASP WASC Distributed Web Honeypots Project]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=235545</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=235545"/>
				<updated>2017-11-17T13:42:42Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: Moving project status to Archived due to low activity&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
(The Projects pages are constantly being updated.  Some pages may contain outdated information.  You can help OWASP to keep these pages current by visiting [[:Category:FIXME|FixME]])  Please contact Claudia Aviles Casanovas with questions using the [https://www.tfaforms.com/308703 Contact Us form]&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has ''''''over ''''''93'''''' active projects'''''', and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]''' &lt;br /&gt;
- 2016 Project handbook updates are in progress, [https://www.tfaforms.com/308703 Contact US] to join the collaboration team and improve the process&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience.&lt;br /&gt;
&lt;br /&gt;
=== Fund Details ===&lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/a/owasp.org/spreadsheets/d/1dqpSk0uPCpB4z3e93hESFgYsBMsbSkUuZh2L91WVuYk/edit?usp=sharing Project Transactions - US (Amount shown in USD)]&lt;br /&gt;
* [https://docs.google.com/a/owasp.org/spreadsheets/d/1RgJVtBZtUEWyusXIW0AdAyKzNOEUiHGRX2blGWtgCFA/edit?usp=sharing Project Transactions - EU (Amount shown in Euros)]&lt;br /&gt;
&lt;br /&gt;
=== Please see additional OWASP PROJECT FUNDING for 2016 ===&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Board_Votes&lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [https://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(The Projects pages are constantly being updated.  Some pages may contain outdated information.  You can help OWASP to keep these pages current by visiting [[:Category:FIXME|FixME]])  Please contact Claudia Aviles Casanovas with questions using the [https://www.tfaforms.com/308703 contact us form]&lt;br /&gt;
&lt;br /&gt;
==Quick Guide to Projects==&lt;br /&gt;
&lt;br /&gt;
===Quick Guide for Developers===&lt;br /&gt;
&lt;br /&gt;
This is a Quick Guide for Developers new to OWASP projects:&lt;br /&gt;
&lt;br /&gt;
Infographic containing Hyperlinks to projects:&lt;br /&gt;
https://magic.piktochart.com/output/6400107-untitled-infographic&lt;br /&gt;
&lt;br /&gt;
Downloadable Images:&lt;br /&gt;
[[File:Owasp_Dev_Guide.pdf ]]&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[LAB_Projects_Code_Analysis_Report|More info here]] the following projects are considered to be flagship candidate projects. These project have been evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Health Check January 2017]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Shepherd|OWASP Security Shepherd]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Code [Health Check January 2017]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Health Check January 2017] ====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed Janaury 2017]====&lt;br /&gt;
* [[O-Saft|O-Saft]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]*[[Review Needed]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]*[[Review Needed]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_Security_Ninjas_AppSec_Training_Program|OWASP Security Ninjas Appsec Training Program]]*[[Review Needed]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Knowledge_Framework#tab=Main | OWASP Security Knowledge Framework]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_DefectDojo_Project|OWASP DefectDojo Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [Health Check January 2017]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]*[[Review Needed]]&lt;br /&gt;
* [[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_CISO_Survey|OWASP CISO Survey]] [[File:Thumbsup.png|15px]]*[[Review Needed]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]][[File:Thumbsup.png|15px]] *[[Review Needed]]&lt;br /&gt;
* [[OWASP_Cornucopia|OWASP Cornucopia]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Guide Project]][[File:Thumbsup.png|15px]]*[[Review Needed]]&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]*[[Review Needed]]&lt;br /&gt;
* [[OWASP_Snakes_and_Ladders|OWASP Snakes and Ladders Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP Automated Threats to Web Applications]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests - Health Check February 2016====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed January 2017====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]*[[Review Needed]]&lt;br /&gt;
* [[OWASP_Python_Security_Project|OWASP Python Security Project]]*[[Review Needed]]&lt;br /&gt;
* [[OWASP_Security_Logging_Project|OWASP Security Logging Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed January 2017]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[Projects/OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Mth3l3m3nt_Framework_Project|OWASP Mth3l3m3nt Framework Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[CSRFProtector_Project|OWASP CSRFProtector Project]][[needs review]]&lt;br /&gt;
* [[WebGoatPHP|OWASP WebGoat PHP Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Secure_Headers_Project|OWASP Secure Headers Project]]*[[Review Needed]]&lt;br /&gt;
* [[OWASP_Vicnum_Project | OWASP Vicnum Projct]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_DeepViolet_TLS/SSL_Scanner|OWASP DeepViolet TLS/SSL_Scanner]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Off_the_record_4_Java_Project|OWASP Off the record 4 Java Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Learning_Gateway_Project|OWASP Learning Gateway Project]] [[NEW!]]&lt;br /&gt;
&lt;br /&gt;
====Research====&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed last: January 2017]====&lt;br /&gt;
* [[Benchmark|OWASP Benchmark]][[File:Thumbsup.png|15px]] &lt;br /&gt;
* [[OWASP_Wordpress_Vulnerability_Scanner_Project | OWASP Wordpress Vulnerability Scanner]]*[[Review Needed]]&lt;br /&gt;
* [[OWASP_Threat_Dragon | OWASP Threat Dragon]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]]*[[Review Needed]]&lt;br /&gt;
* [[OWASP_Droid10_Project|OWASP Droid]][[File:Thumbsup.png|15px]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] *[[Review Needed]]&lt;br /&gt;
* [[OWASP_ZSC_Tool_Project|OWASP ZSC Tool Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Web_Malware_Scanner_Project|OWASP_Web Malware Scanner Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Basic_Expression_%26_Lexicon_Variation_Algorithms_(BELVA)_Project| OWASP Basic Expression Lexicon Variation Algorithms (Belva) Project]]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_VBScan_Project| OWASP VBScan]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_AppSec_Pipeline|OWASP Appsec Pipeline]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Juice_Shop_Project|OWASP Juice Shop Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Bug_Logging_Tool|OWASP Bug Logging Tool]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Tool_Project|OWASP iGoat Tool Project]]&lt;br /&gt;
*[[OWASP_Risk_Rating_Management|OWASP Risk Rating Management]]&lt;br /&gt;
*[[OWASP_DevSlop_Project|OWASP DevSlop Project]] [[New!]]&lt;br /&gt;
*[[OWASP_SecurityRAT_Project|OWASP SecurityRAT Project]] [[New!]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: May 2015 - Health Check January 2017]====&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]][[File:Thumbsup.png|15px]]*&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]][[File:Thumbsup.png|15px]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWSP_Application_Security_Program_Quick_Start_Guide_Project]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP Knowledge Based Authentication Performance Metrics Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP RFP Criteria]]*[[Review Needed]]&lt;br /&gt;
*[[OWASP_Web_Mapper_Project|OWASP Web Mapper Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Top_10_fuer_Entwickler|OWASP 10 Fuer Entwickler]]*[[Review Needed]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project |WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_Software_Development_Lifecycle_Project]]&lt;br /&gt;
*[[OWASP_Mobile_Security_Testing_Guide|OWASP Mobile Security Testing Guide]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Anti-Ransomware_Guide_Project|OWASP Ransomeware Guide Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Cyber_Defense_Matrix|OWASP Cyber Defense Matrix]]&lt;br /&gt;
*[[OWASP_Top_5_Machine_Learning_Risks|OWASP Top 5 Machine Learning Risks]] [[New]]&lt;br /&gt;
*[[OWASP_Security_Operations_Center_(SOC)_Framework_Project|OWASP Security Operations Center SOC Framework Project]][[New]]&lt;br /&gt;
&lt;br /&gt;
==Educational Initiatives==&lt;br /&gt;
====Health Check February 2017====&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Online_Academy#tab=Main | OWASP Online Academy]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
== Low Activity Projects ==&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
======Low Activity (LABS)[Reviewed July 2015] Health Check February 2016======&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
'''Code [Low Activity]'''  Health Check February 2016&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
'''Tools Health Check February 2016'''&lt;br /&gt;
*[[:Category:OWASP_WebScarab_Project|WebScarab]][[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
'''Documentation [Low Activity]'''  '''Health Check February 2016'''&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]][[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
'''Added New Project on February 2016'''&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_Project_Archived_Projects]]&lt;br /&gt;
&lt;br /&gt;
= Former Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
(The Projects pages are constantly being updated.  Some pages may contain outdated information.  You can help OWASP to keep these pages current by visiting [[:Category:FIXME|FixME]])  Please contact Claudia Aviles Casanovas with questions using the [https://www.tfaforms.com/308703 contact us form]&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/a/owasp.org/spreadsheets/d/13QM6yCqpirNuURbBdB5YZ_30mfQGbLjzBTGx0CTSNWw/edit?usp=sharing|OWASP Open Source Project Resources &amp;amp; Services]&lt;br /&gt;
&lt;br /&gt;
Please note that some services are 100% free and some have nominal cost.&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [[Project_Ideas_Board#From_Idea_to_Project_Incubator|Project Ideas Board]]. This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena. Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
Some recommendations on how to start a documentation project&lt;br /&gt;
[[:File:Document_Guide_(1).png| Document Guide Project]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== '''Creating a New Project''' ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
&lt;br /&gt;
'''[https://www.tfaforms.com/263506 Please submit a new project application here].''''''&lt;br /&gt;
&lt;br /&gt;
'''2016 OWASP Project Process'''&lt;br /&gt;
&lt;br /&gt;
'''Existing WORKFLOW''' [https://docs.google.com/viewer?a=v&amp;amp;pid=forums&amp;amp;srcid=MDM4NTc0NDY0NjkwMzEwMTMzMzkBMDIxODM3MDc5ODA4OTMxNjAzNjkBSFlWTDZaTE5Ed0FKATAuMQFvd2FzcC5vcmcBdjI Incubator Project Flow]&lt;br /&gt;
&lt;br /&gt;
'''Step 1:''' &lt;br /&gt;
New Project Leader submits New Project Request Form it is logged in the system and an alert is sent  to the Project Coordinator &lt;br /&gt;
&lt;br /&gt;
'''Step 2:'''&lt;br /&gt;
New Project Request is received and reviewed by Project Coordinator for complete information .It must contain the following information to qualify as an acceptable submission:&lt;br /&gt;
You will need to gather the following information together for your application:&lt;br /&gt;
&lt;br /&gt;
*Project Name,&lt;br /&gt;
*Project purpose / overview,&lt;br /&gt;
*Project Roadmap,&lt;br /&gt;
*Project links (if any) to external sites,&lt;br /&gt;
*[[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
*Project Leader name,&lt;br /&gt;
*Project Leader email address,&lt;br /&gt;
*Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
*Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
*Project Main Links (if any).&lt;br /&gt;
*==&amp;gt;For Documentation: A table of Contents&lt;br /&gt;
*==&amp;gt;For Code: A prototype hosted in an open source repository of your choice. &lt;br /&gt;
&lt;br /&gt;
'''Step 3:''' &lt;br /&gt;
If all information is completed following the minimum criteria for Projects (Code/Tool/documentation), The Project Coordinator notifies the Project Leader that the request has been accepted, and at the same time notifies the Review team that a new project has been submitted, including all the information requested in the project criteria &lt;br /&gt;
&lt;br /&gt;
'''Step 4:''' &lt;br /&gt;
Project Coordinator proceeds to create a new Wiki page for the project including all the information sent by the project leader. project coordinator uses one of these project wiki template:&lt;br /&gt;
*For Docs: https://www.owasp.org/index.php/OWASP_Documentation_Project_Template&lt;br /&gt;
*For Code: https://www.owasp.org/index.php/OWASP_Code_Project_Template&lt;br /&gt;
*For Tool:  https://www.owasp.org/index.php/OWASP_Tool_Project_Template&lt;br /&gt;
Also Project coordinator creates a mailing list for the project leader and sets him as admin&lt;br /&gt;
&lt;br /&gt;
'''Step 5:''' &lt;br /&gt;
Project Coordinator notifies project leader and Review team about the created wiki page, providing the link to the wiki page.&lt;br /&gt;
*Review team might provide comments for further improvement of the wiki page if necessary&lt;br /&gt;
*Project leader should request a wiki account to be able to update his own wiki page afterwards if he has not one yet&lt;br /&gt;
&lt;br /&gt;
'''Step 6:''' &lt;br /&gt;
Project coordinator updates the Wiki project inventory, Dashboard and open hub with the information regarding the new created project&lt;br /&gt;
&lt;br /&gt;
'''Step 7:''' &lt;br /&gt;
Project is set in the agenda by the Project Coordinator for monitoring over the next 3 months to check how has been developing.&lt;br /&gt;
&lt;br /&gt;
'''Step 8:'''&lt;br /&gt;
Every 3 months, project coordinator monitors the activity on the wiki page for new updates and on the Openhub for commits and level of activity . Findings are then reported on the Dashboard as comments and CC through email to the review team&lt;br /&gt;
&lt;br /&gt;
'''Step 9:''' &lt;br /&gt;
if the project has not been updated and has no activities after six months of creation, project coordinator sends an email to the project leader requesting an update and status to see how has been developing, CC: project review team regarding the lack of activity .Findings are then updated on the dashboard. &lt;br /&gt;
&lt;br /&gt;
'''Step 10:'''&lt;br /&gt;
Over the next 6 months the project is monitored again for activity. If no updates have occurred since its inception after 12 months, project is then set as inactive and project leader and review team is notified about the status.&lt;br /&gt;
Project coordinators updates :&lt;br /&gt;
* Wiki page of the project is labeled as 'inactive' (inactive banner)&lt;br /&gt;
*The Project is set under the 'inactive category'&lt;br /&gt;
*Dashboard is updated with comments and set as inactive&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Reference Material'''&lt;br /&gt;
&lt;br /&gt;
[https://www.openhub.net/orgs/OWASP Openhub]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1lO8UoQgIFET3MC5v2OVVdtkTe1IbWiJLMnINx6Hm2jE/edit?ts=56a159b7#gid=0 Dashboard]&lt;br /&gt;
&lt;br /&gt;
[[Project_Reviews_Guideline|Project Review Guidelines]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.github.io/ProjectReviews/index.html GITHUB OWASP] &lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/presentation/d/1tGdmgzDGjoHVtHZbV9dqGR2XQVlT8TR1cet-4r0C8RY/edit?ts=56a16be2#slide=id.gee0716e2f_0_1 Projects Slides]&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [https://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [https://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [https://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [https://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [https://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
= Participating in a Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== Joining a Project... ==&lt;br /&gt;
&lt;br /&gt;
OWASP projects are community driven and most projects are open for anyone motivated to join. &lt;br /&gt;
&lt;br /&gt;
The first step is to find a project you are interested to be part of. The list of all projects can be found in the {{#switchtablink:Project_Inventory|Project Inventory}}. Further steps then depend on the status of the project you selected.&lt;br /&gt;
&lt;br /&gt;
If the project is active, the best way is to join the mailing list and get in touch with the people actively participating. Other ways would be contacting the project leader team or just starting to participate by testing the software, writing blogs or documentation, report issues via tracker or even propose code modifications. In general, the more you show your interest and motivation, the easier it is to find yourself as a member of the team.&lt;br /&gt;
&lt;br /&gt;
Some projects are of low activity or even inactive. In this case there is no possibility to join an existing team, but it would rather be a re-boot. If you feel eager to do this, please contact the general OWASP administrators. It is however important that you are sure about the commitment you are about to make. &lt;br /&gt;
&lt;br /&gt;
Some things are important: &lt;br /&gt;
&lt;br /&gt;
- Don’t be shy. If you wish to be part of the OWASP initiative, you will find a task that suits your experience and your level of possible time investment. &lt;br /&gt;
&lt;br /&gt;
- Baby steps are easier than huge commitments. Just start helping with small tasks and get known by the project team. You will grow into the project in a natural way.&lt;br /&gt;
&lt;br /&gt;
Please read more about the general project workflow on the {{#switchtablink:Starting_a_New_Project|Starting a New Project}} page.&lt;br /&gt;
&lt;br /&gt;
== Archives ==&lt;br /&gt;
&lt;br /&gt;
[[Projects_Reboot_2012_Homepage|Archive of the 'Project Reboot 2012' page]]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
'''Code Projects''': OWASP code projects are very important for the cyber security solutions. Because these projects are used to find out the application security problems and try to solve those problems.&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[:File:Qualitative_and_Quantitative_Content_Audit.pdf|Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [[About_The_Open_Web_Application_Security_Project#Code_of_Ethics|OWASP About page]]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [https://www.tfaforms.com/308703  Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Current Project Review Guidelines =&lt;br /&gt;
&amp;lt;font size=3pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PROJECT REVIEWS RESTART November 2016&lt;br /&gt;
&lt;br /&gt;
Steps for Project Graduation Review:&lt;br /&gt;
 &lt;br /&gt;
Process Starts when Project Leader Requests a Graduation Review this is done through a [https://www.tfaforms.com/308703| contact us form].&lt;br /&gt;
&lt;br /&gt;
Project Coordinator send link to the the Project Review Form for the Project Leader to provide the assessment.&lt;br /&gt;
&lt;br /&gt;
Senior Techinical Coordinator reviews the assessment received and works with the Project Leader if there are any questions. Once reviewed the assessment is passed to the Project Coordinator..&lt;br /&gt;
&lt;br /&gt;
Project Coordinator Reviews the request and adds to the Volunteer Job Board for outreach to the community - http://owasp.force.com/volunteers/GW_Volunteers__Volunteerhttps://www.tfaforms.com/393806sJobListing&lt;br /&gt;
Once volunteer signs up and chooses a project review then the Project Coordinator sends the link to the Volunteer with instructions to the google doc for the Project Review (Sample DOC)&lt;br /&gt;
&lt;br /&gt;
There will need to be at least two reviewers for each Project Review along with the Senior Technical Coordinator to finalize the results. &lt;br /&gt;
&lt;br /&gt;
Senior Technical Coordinator could process a review if the there is lack of reviewers.&lt;br /&gt;
&lt;br /&gt;
Senior Technical Coordinator/Volunteers has about 2-4 weeks to complete the Project Review . &lt;br /&gt;
&lt;br /&gt;
Senior Technical/ Volunteer works with the Project Leader on any  information or questions.&lt;br /&gt;
&lt;br /&gt;
The time to complete can be extended to up to a an additional week.&lt;br /&gt;
&lt;br /&gt;
Senior Technical Coordinator provides recommendations.&lt;br /&gt;
&lt;br /&gt;
Project Coordinator sends Project Review to the community for feedback. &lt;br /&gt;
&lt;br /&gt;
Community Leaders can also process a review if they choose to disagree with the review.&lt;br /&gt;
&lt;br /&gt;
Project Graduation is announced by Connector and other social media &lt;br /&gt;
&lt;br /&gt;
Current OWASP Project Review Guidelines Link below:&lt;br /&gt;
[[Project Reviews Guideline]]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=209466</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=209466"/>
				<updated>2016-02-22T21:16:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Open HUB==&lt;br /&gt;
https://www.openhub.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Rcbarnett|Ryan Barnett]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== Who Leads the ModSecurity Project? ==&lt;br /&gt;
ModSecurity is supported by Trustwave's SpiderLabs Team [https://www.trustwave.com/spiderLabs.php] and includes the following team members:&lt;br /&gt;
*Ryan Barnett - ModSecurity Project Lead and OWASP ModSecurity Core Rule Set Project Lead&lt;br /&gt;
*Felipe Zimmerle Costa - ModSecurity Lead Developer&lt;br /&gt;
&lt;br /&gt;
Suggestions for enhancements of this document are always welcome. Please email them to the Mod-Security-Users mailing list [http://lists.sourceforge.net/lists/listinfo/mod-security-users].&lt;br /&gt;
&lt;br /&gt;
== Background and Support ==&lt;br /&gt;
&lt;br /&gt;
=== What exactly is ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
ModSecurity™is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks before they reach web applications. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Where do I get more help on ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The ModSecurity website is the definitive location for all information - http://www.modsecurity.org/help.html. &lt;br /&gt;
&lt;br /&gt;
==== Open Source/Free Help ====&lt;br /&gt;
*ModSecurity Users Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-users&lt;br /&gt;
*ModSecurity Developers Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-developers&lt;br /&gt;
*OWASP ModSecurity Core Rules Mail-list (OWASP) - https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set &lt;br /&gt;
*You can also join the #modsecurity channel on irc.freenode.net.&lt;br /&gt;
==== Commercial Help ====&lt;br /&gt;
*Commercial Support through Trustwave's Technical Assistance Center (TAC) - https://www3.trustwave.com/modsecurity-rules-support.php&lt;br /&gt;
*Professional Services offer by Trustwave SpiderLabs Research Team&lt;br /&gt;
*ModSecurity Training&lt;br /&gt;
&lt;br /&gt;
=== Do I need to sign up for the Mod-User Mail-list before I can send emails? ===&lt;br /&gt;
&lt;br /&gt;
Yes, only subscribers are able to post messages. As mentioned in the previous section, you will need to visit the mail-list website to register.&lt;br /&gt;
&lt;br /&gt;
=== Is there anything that I should do prior to sending emails to the mail-list? ===&lt;br /&gt;
&lt;br /&gt;
Yes. There is a good chance that the issue you are facing has already been discussed and, most likely, a fix has already been presented. You can review the mail-list archive online at the ModSecurity project site on SourceForge. You can also use the Search interface available for topic threads that are archived to the various mirror sites. For example, if you had a question about Exceptions and ModSecurity, you could use the following search to find past mail-list threads on this topic. If you can not find an answer to your question after doing some research, you should then send an email to the mod-security-users mail-list.&lt;br /&gt;
&lt;br /&gt;
=== Will I always get an immediate answer to my question on the open source mod-security-users mail-list? ===&lt;br /&gt;
&lt;br /&gt;
The open source mod-security-users mail-list is &amp;quot;best effort&amp;quot; support meaning that we will aspire to respond to emails as quickly as possible however the actual response time may vary depending on factors such as time of day, time of week and complexity of the question. If your email is sent on the week-end or if your question involves setting up test systems, unique configurations or interactions with a custom application then it may take some time to respond.&lt;br /&gt;
&lt;br /&gt;
=== If I don't get an immediate response, should I send an email to the Trustwave Technical Support email address? ===&lt;br /&gt;
&lt;br /&gt;
No. The Trustwave Technical Support email address is for commercial ModSecurity customers only.&lt;br /&gt;
&lt;br /&gt;
=== Where can I find books about Web Application Firewalls and ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity Handbook ====&lt;br /&gt;
ModSecurity Handbook is &amp;quot;The definitive guide to the popular open source web application firewall&amp;quot;, written by Ivan Ristic (original author of ModSecurity). The book is available from Feisty Duck in hard copy or with immediate access to the digital version which is continually updated.&lt;br /&gt;
&lt;br /&gt;
==== Web Application Defender's Cookbook: Battling Hackers and Defending Users ====&lt;br /&gt;
The Web Application Defender's Cookbook: Battling Hackers and Protecting Users is a book written by the ModSecurity Project Lead and OWASP ModSecurity Project Lead Ryan Barnett. The book outlines critical defensive techniques to protect web applications and includes example ModSecurity rules/scripts.&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity 2.5 ====&lt;br /&gt;
ModSecurity 2.5 is &amp;quot;A complete guide to using ModSecurity&amp;quot;, written by Magnus Mischel. The book is available from Packt Publishing in both hard copy and digital forms.&lt;br /&gt;
&lt;br /&gt;
==== Apache Security ====&lt;br /&gt;
Apache Security is a comprehensive Apache Security resource, written by Ivan Ristic for O'Reilly. Two chapters (Apache Installation and Configuration and PHP) are available as free download, as are the Apache security tools created for the book.&lt;br /&gt;
&lt;br /&gt;
==== Preventing Web Attacks with Apache ====&lt;br /&gt;
Preventing Web Attacks with Apache. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against.&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
=== What type(s) of security models does ModSecurity support? ===&lt;br /&gt;
&lt;br /&gt;
There is a common misconception that ModSecurity can only be used for negative policy enforcement. This is not the case. ModSecurity does not have any default security model &amp;quot;out-of-the-box.&amp;quot; It is up to the user to implement appropriate rules to achieve the desired security model. That being said, these are the security models which are most often employed:&lt;br /&gt;
&lt;br /&gt;
*Negative Security Model - looks for known bad, malicious requests. This method is effective at blocking a large number of automated attacks, however it is not the best approach for identifying new attack vectors. Using too many negative rules may also negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
*Positive Security Model - When positive security model is deployed, only requests that are known to be valid are accepted, with everything else rejected. This approach works best with applications that are heavily used but rarely updated.&lt;br /&gt;
&lt;br /&gt;
*Virtual Patching - Its rule language makes ModSecurity an ideal external patching tool. External patching is all about reducing the window of opportunity. Time needed to patch application vulnerabilities often runs to weeks in many organizations. With ModSecurity, applications can be patched from the outside, without touching the application source code (and even without any access to it), making your systems secure until a proper patch is produced.&lt;br /&gt;
&lt;br /&gt;
*Extrusion Detection Model - ModSecurity can also monitor outbound data and identify and block information disclosure issues such as leaking detailed error messages or Social Security Numbers or Credit Card Numbers.&lt;br /&gt;
&lt;br /&gt;
=== What's new in ModSecurity and why should I upgrade if I am already using ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
There are many significant changes and enhancements in ModSecurity 2.5 over the 1.x branch, including:&lt;br /&gt;
&lt;br /&gt;
In order to use the OWASP ModSecurity Core Rules, you must use the 2.x version of ModSecurity as it takes advantage of specific features not available in previous versions.&lt;br /&gt;
&lt;br /&gt;
Five processing phases (where there were only two in 1.9.x). These are: request headers, request body, response headers, response body, and logging. Those users who wanted to do things at the earliest possible moment can do them now.&lt;br /&gt;
&lt;br /&gt;
Per-rule transformation options (previously normalization was implicit and hard-coded). Many new transformation functions were added.&lt;br /&gt;
&lt;br /&gt;
Transaction variables. This can be used to store pieces of data, create a transaction anomaly score, and so on.&lt;br /&gt;
&lt;br /&gt;
Data persistence (can be configured any way you want although most people will want to use this feature to track IP addresses, application sessions, and application users).&lt;br /&gt;
&lt;br /&gt;
Support for anomaly scoring and basic event correlation (counters can be automatically decreased over time; variables can be expired).&lt;br /&gt;
&lt;br /&gt;
Support for web applications and session IDs.&lt;br /&gt;
&lt;br /&gt;
Regular Expression back-references (allows one to create custom variables using transaction content).&lt;br /&gt;
&lt;br /&gt;
There are now many functions that can be applied to the variables (where previously one could only use regular expressions).&lt;br /&gt;
&lt;br /&gt;
XML support (parsing, validation, XPath).&lt;br /&gt;
&lt;br /&gt;
For more information, it is suggested that you review the SecurityFocus interview that Ivan Ristic gave on ModSecurity 2.0 as it outlines these new features in more detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I migrate my rules from the ModSecurity 1.x format into the 2.x format? ===&lt;br /&gt;
&lt;br /&gt;
Due to the many changes in the ModSecurity 2.0 rules language, you can not directly use existing rulesets. You will need to translate the functionality of any custom rules into the new rules language. A migration matrix is available here [http://www.modsecurity.org/documentation/ModSecurity-Migration-Matrix.pdf] that will assist with this process.&lt;br /&gt;
&lt;br /&gt;
=== How do I install ModSecurity 2.0? ===&lt;br /&gt;
&lt;br /&gt;
The installation procedures for installing ModSecurity 2.5 has changed from previous versions. It now includes a configure script that should help to identify all local settings. After running configure, you then run the make and make install commands. You no longer use apxs directly.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in embedded-mode, what does that mean exactly? ===&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;embedded&amp;quot; simply refers to the fact that ModSecurity, running as an Apache module, is running inside the webserver process. Most WAFs function as totally separate hosts and sit in front of the web servers. Running in embedded-mode has some advantages and disadvantages that should be considered:&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Easy to add to an existing Apache server.&lt;br /&gt;
&lt;br /&gt;
Not a point of failure with respect to traffic.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
ModSecurity can only protect the local web server.&lt;br /&gt;
&lt;br /&gt;
ModSecurity will consume local resources such as CPU and RAM.&lt;br /&gt;
&lt;br /&gt;
Management of log files and configurations can become difficult if you have multiple installations.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in reverse proxy-mode, how does that differ from embedded-mode? ===&lt;br /&gt;
&lt;br /&gt;
The only difference with this deployment vs. an embedded one is that Apache itself is configured to function as a reverse proxy.&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Single point of access – functions as a choke point so you consolidate applying security settings and makes management easier.&lt;br /&gt;
&lt;br /&gt;
Network topology is hidden from the outside world - so it will be more difficult for attackers to enumerate your web platforms.&lt;br /&gt;
&lt;br /&gt;
Increased performance – if SSL accelerators/caching used.&lt;br /&gt;
&lt;br /&gt;
You can implement vulnerability filters to protect and vulnerable web server or application on the back-end (IIS, Netscape, ASP, PHP, etc...). See related section on Virtual Patching.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
A potential traffic bottleneck if the reverse proxy can not handle the network load.&lt;br /&gt;
&lt;br /&gt;
A potential point of failure - if the reverse proxy goes down it may cause a denial of service to the web applications that are behind it.&lt;br /&gt;
&lt;br /&gt;
Requires changes to the network.&lt;br /&gt;
&lt;br /&gt;
== Configuring ModSecurity ==&lt;br /&gt;
&lt;br /&gt;
=== Should I initially set the SecRuleEngine to On? ===&lt;br /&gt;
&lt;br /&gt;
No. Every Ruleset can have false positive in new environments and any new installation should initially use the log only Ruleset version or if no such version is available, set ModSecurity to Detection only using the SecRuleEngine DetectionOnly command. After running ModSecurity in a detection only mode for a while review the evens generated and decide if any modification to the rule set should be made before moving to protection mode.&lt;br /&gt;
&lt;br /&gt;
=== How do I get ModSecurity to inspect request and response bodies? ===&lt;br /&gt;
&lt;br /&gt;
You need to set the the following two directives:&lt;br /&gt;
&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
&lt;br /&gt;
SecResponseBodyAccess On&lt;br /&gt;
&lt;br /&gt;
=== How can I verify exactly how ModSecurity is processing rules and requests? ===&lt;br /&gt;
&lt;br /&gt;
You need to enable the debug log with SecDebugLog and increase the log level with SecDebugLogLevel. It you set the debug log level to 9, it will tell you exactly what tasks it is completing along with what data it is acting upon. Do be aware that while the increased debug log level does help from a troubleshooting perspective, it does negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== Can I use the Core Rules with ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
Unfortunately, no. The Core Rules takes advantage of the ModSecurity 2.0 rules language and is therefore not backward compatible.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== Are there rule differences for identify missing/empty variables between ModSecurity 1.x and 2.x? ===&lt;br /&gt;
&lt;br /&gt;
Yes there are. Many of these differences are outlined in the Migration Matrix document listed previously. Another common rule difference issue that arises is when you want to create white-listed ModSecurity rulesets which enforce that certain headers/variables are both present and not empty. In ModSecurity 1.x, you could create one rule that handles this while in ModSecurity 2.x you would need to write a chained rule.&lt;br /&gt;
&lt;br /&gt;
On the surface, you might think &amp;quot;The 1.x rules way is better since you only need 1 rule...&amp;quot; however you need to realize that anytime you have rules or directives that implicitly enforce certain capabilities, you run the risk of having false positives as it could match things that you didn't want them to. For instance, what if you have a situation where certain web clients (such as mobile devices) legitimately include some headers, however they are empty? Do you want to automatically block these clients? With the ModSecurity 1.x Rule Language, you would have to remove the entire rule. With the ModSecurity 2.x Rule Language, however, you are able to create rules to more accurately apply the logic that you desire.&lt;br /&gt;
&lt;br /&gt;
Please refer to the following blog post for more information.&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Chaim_Sanders|Chaim Sanders]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Brian_Rectanus|Brian Rectanus]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
Nick Galbreath&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|left|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
== v3.0 Detection Concepts ==&lt;br /&gt;
This page documents the goals/ideas for the next major version of the CRS.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Detection Logic/Flow Concepts ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=209453</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=209453"/>
				<updated>2016-02-22T21:02:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Open HUB==&lt;br /&gt;
https://www.openhub.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== Who Leads the ModSecurity Project? ==&lt;br /&gt;
ModSecurity is supported by Trustwave's SpiderLabs Team [https://www.trustwave.com/spiderLabs.php] and includes the following team members:&lt;br /&gt;
*Ryan Barnett - ModSecurity Project Lead and OWASP ModSecurity Core Rule Set Project Lead&lt;br /&gt;
*Felipe Zimmerle Costa - ModSecurity Lead Developer&lt;br /&gt;
&lt;br /&gt;
Suggestions for enhancements of this document are always welcome. Please email them to the Mod-Security-Users mailing list [http://lists.sourceforge.net/lists/listinfo/mod-security-users].&lt;br /&gt;
&lt;br /&gt;
== Background and Support ==&lt;br /&gt;
&lt;br /&gt;
=== What exactly is ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
ModSecurity™is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks before they reach web applications. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Where do I get more help on ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The ModSecurity website is the definitive location for all information - http://www.modsecurity.org/help.html. &lt;br /&gt;
&lt;br /&gt;
==== Open Source/Free Help ====&lt;br /&gt;
*ModSecurity Users Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-users&lt;br /&gt;
*ModSecurity Developers Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-developers&lt;br /&gt;
*OWASP ModSecurity Core Rules Mail-list (OWASP) - https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set &lt;br /&gt;
*You can also join the #modsecurity channel on irc.freenode.net.&lt;br /&gt;
==== Commercial Help ====&lt;br /&gt;
*Commercial Support through Trustwave's Technical Assistance Center (TAC) - https://www3.trustwave.com/modsecurity-rules-support.php&lt;br /&gt;
*Professional Services offer by Trustwave SpiderLabs Research Team&lt;br /&gt;
*ModSecurity Training&lt;br /&gt;
&lt;br /&gt;
=== Do I need to sign up for the Mod-User Mail-list before I can send emails? ===&lt;br /&gt;
&lt;br /&gt;
Yes, only subscribers are able to post messages. As mentioned in the previous section, you will need to visit the mail-list website to register.&lt;br /&gt;
&lt;br /&gt;
=== Is there anything that I should do prior to sending emails to the mail-list? ===&lt;br /&gt;
&lt;br /&gt;
Yes. There is a good chance that the issue you are facing has already been discussed and, most likely, a fix has already been presented. You can review the mail-list archive online at the ModSecurity project site on SourceForge. You can also use the Search interface available for topic threads that are archived to the various mirror sites. For example, if you had a question about Exceptions and ModSecurity, you could use the following search to find past mail-list threads on this topic. If you can not find an answer to your question after doing some research, you should then send an email to the mod-security-users mail-list.&lt;br /&gt;
&lt;br /&gt;
=== Will I always get an immediate answer to my question on the open source mod-security-users mail-list? ===&lt;br /&gt;
&lt;br /&gt;
The open source mod-security-users mail-list is &amp;quot;best effort&amp;quot; support meaning that we will aspire to respond to emails as quickly as possible however the actual response time may vary depending on factors such as time of day, time of week and complexity of the question. If your email is sent on the week-end or if your question involves setting up test systems, unique configurations or interactions with a custom application then it may take some time to respond.&lt;br /&gt;
&lt;br /&gt;
=== If I don't get an immediate response, should I send an email to the Trustwave Technical Support email address? ===&lt;br /&gt;
&lt;br /&gt;
No. The Trustwave Technical Support email address is for commercial ModSecurity customers only.&lt;br /&gt;
&lt;br /&gt;
=== Where can I find books about Web Application Firewalls and ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity Handbook ====&lt;br /&gt;
ModSecurity Handbook is &amp;quot;The definitive guide to the popular open source web application firewall&amp;quot;, written by Ivan Ristic (original author of ModSecurity). The book is available from Feisty Duck in hard copy or with immediate access to the digital version which is continually updated.&lt;br /&gt;
&lt;br /&gt;
==== Web Application Defender's Cookbook: Battling Hackers and Defending Users ====&lt;br /&gt;
The Web Application Defender's Cookbook: Battling Hackers and Protecting Users is a book written by the ModSecurity Project Lead and OWASP ModSecurity Project Lead Ryan Barnett. The book outlines critical defensive techniques to protect web applications and includes example ModSecurity rules/scripts.&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity 2.5 ====&lt;br /&gt;
ModSecurity 2.5 is &amp;quot;A complete guide to using ModSecurity&amp;quot;, written by Magnus Mischel. The book is available from Packt Publishing in both hard copy and digital forms.&lt;br /&gt;
&lt;br /&gt;
==== Apache Security ====&lt;br /&gt;
Apache Security is a comprehensive Apache Security resource, written by Ivan Ristic for O'Reilly. Two chapters (Apache Installation and Configuration and PHP) are available as free download, as are the Apache security tools created for the book.&lt;br /&gt;
&lt;br /&gt;
==== Preventing Web Attacks with Apache ====&lt;br /&gt;
Preventing Web Attacks with Apache. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against.&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
=== What type(s) of security models does ModSecurity support? ===&lt;br /&gt;
&lt;br /&gt;
There is a common misconception that ModSecurity can only be used for negative policy enforcement. This is not the case. ModSecurity does not have any default security model &amp;quot;out-of-the-box.&amp;quot; It is up to the user to implement appropriate rules to achieve the desired security model. That being said, these are the security models which are most often employed:&lt;br /&gt;
&lt;br /&gt;
*Negative Security Model - looks for known bad, malicious requests. This method is effective at blocking a large number of automated attacks, however it is not the best approach for identifying new attack vectors. Using too many negative rules may also negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
*Positive Security Model - When positive security model is deployed, only requests that are known to be valid are accepted, with everything else rejected. This approach works best with applications that are heavily used but rarely updated.&lt;br /&gt;
&lt;br /&gt;
*Virtual Patching - Its rule language makes ModSecurity an ideal external patching tool. External patching is all about reducing the window of opportunity. Time needed to patch application vulnerabilities often runs to weeks in many organizations. With ModSecurity, applications can be patched from the outside, without touching the application source code (and even without any access to it), making your systems secure until a proper patch is produced.&lt;br /&gt;
&lt;br /&gt;
*Extrusion Detection Model - ModSecurity can also monitor outbound data and identify and block information disclosure issues such as leaking detailed error messages or Social Security Numbers or Credit Card Numbers.&lt;br /&gt;
&lt;br /&gt;
=== What's new in ModSecurity and why should I upgrade if I am already using ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
There are many significant changes and enhancements in ModSecurity 2.5 over the 1.x branch, including:&lt;br /&gt;
&lt;br /&gt;
In order to use the OWASP ModSecurity Core Rules, you must use the 2.x version of ModSecurity as it takes advantage of specific features not available in previous versions.&lt;br /&gt;
&lt;br /&gt;
Five processing phases (where there were only two in 1.9.x). These are: request headers, request body, response headers, response body, and logging. Those users who wanted to do things at the earliest possible moment can do them now.&lt;br /&gt;
&lt;br /&gt;
Per-rule transformation options (previously normalization was implicit and hard-coded). Many new transformation functions were added.&lt;br /&gt;
&lt;br /&gt;
Transaction variables. This can be used to store pieces of data, create a transaction anomaly score, and so on.&lt;br /&gt;
&lt;br /&gt;
Data persistence (can be configured any way you want although most people will want to use this feature to track IP addresses, application sessions, and application users).&lt;br /&gt;
&lt;br /&gt;
Support for anomaly scoring and basic event correlation (counters can be automatically decreased over time; variables can be expired).&lt;br /&gt;
&lt;br /&gt;
Support for web applications and session IDs.&lt;br /&gt;
&lt;br /&gt;
Regular Expression back-references (allows one to create custom variables using transaction content).&lt;br /&gt;
&lt;br /&gt;
There are now many functions that can be applied to the variables (where previously one could only use regular expressions).&lt;br /&gt;
&lt;br /&gt;
XML support (parsing, validation, XPath).&lt;br /&gt;
&lt;br /&gt;
For more information, it is suggested that you review the SecurityFocus interview that Ivan Ristic gave on ModSecurity 2.0 as it outlines these new features in more detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I migrate my rules from the ModSecurity 1.x format into the 2.x format? ===&lt;br /&gt;
&lt;br /&gt;
Due to the many changes in the ModSecurity 2.0 rules language, you can not directly use existing rulesets. You will need to translate the functionality of any custom rules into the new rules language. A migration matrix is available here [http://www.modsecurity.org/documentation/ModSecurity-Migration-Matrix.pdf] that will assist with this process.&lt;br /&gt;
&lt;br /&gt;
=== How do I install ModSecurity 2.0? ===&lt;br /&gt;
&lt;br /&gt;
The installation procedures for installing ModSecurity 2.5 has changed from previous versions. It now includes a configure script that should help to identify all local settings. After running configure, you then run the make and make install commands. You no longer use apxs directly.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in embedded-mode, what does that mean exactly? ===&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;embedded&amp;quot; simply refers to the fact that ModSecurity, running as an Apache module, is running inside the webserver process. Most WAFs function as totally separate hosts and sit in front of the web servers. Running in embedded-mode has some advantages and disadvantages that should be considered:&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Easy to add to an existing Apache server.&lt;br /&gt;
&lt;br /&gt;
Not a point of failure with respect to traffic.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
ModSecurity can only protect the local web server.&lt;br /&gt;
&lt;br /&gt;
ModSecurity will consume local resources such as CPU and RAM.&lt;br /&gt;
&lt;br /&gt;
Management of log files and configurations can become difficult if you have multiple installations.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in reverse proxy-mode, how does that differ from embedded-mode? ===&lt;br /&gt;
&lt;br /&gt;
The only difference with this deployment vs. an embedded one is that Apache itself is configured to function as a reverse proxy.&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Single point of access – functions as a choke point so you consolidate applying security settings and makes management easier.&lt;br /&gt;
&lt;br /&gt;
Network topology is hidden from the outside world - so it will be more difficult for attackers to enumerate your web platforms.&lt;br /&gt;
&lt;br /&gt;
Increased performance – if SSL accelerators/caching used.&lt;br /&gt;
&lt;br /&gt;
You can implement vulnerability filters to protect and vulnerable web server or application on the back-end (IIS, Netscape, ASP, PHP, etc...). See related section on Virtual Patching.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
A potential traffic bottleneck if the reverse proxy can not handle the network load.&lt;br /&gt;
&lt;br /&gt;
A potential point of failure - if the reverse proxy goes down it may cause a denial of service to the web applications that are behind it.&lt;br /&gt;
&lt;br /&gt;
Requires changes to the network.&lt;br /&gt;
&lt;br /&gt;
== Configuring ModSecurity ==&lt;br /&gt;
&lt;br /&gt;
=== Should I initially set the SecRuleEngine to On? ===&lt;br /&gt;
&lt;br /&gt;
No. Every Ruleset can have false positive in new environments and any new installation should initially use the log only Ruleset version or if no such version is available, set ModSecurity to Detection only using the SecRuleEngine DetectionOnly command. After running ModSecurity in a detection only mode for a while review the evens generated and decide if any modification to the rule set should be made before moving to protection mode.&lt;br /&gt;
&lt;br /&gt;
=== How do I get ModSecurity to inspect request and response bodies? ===&lt;br /&gt;
&lt;br /&gt;
You need to set the the following two directives:&lt;br /&gt;
&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
&lt;br /&gt;
SecResponseBodyAccess On&lt;br /&gt;
&lt;br /&gt;
=== How can I verify exactly how ModSecurity is processing rules and requests? ===&lt;br /&gt;
&lt;br /&gt;
You need to enable the debug log with SecDebugLog and increase the log level with SecDebugLogLevel. It you set the debug log level to 9, it will tell you exactly what tasks it is completing along with what data it is acting upon. Do be aware that while the increased debug log level does help from a troubleshooting perspective, it does negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== Can I use the Core Rules with ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
Unfortunately, no. The Core Rules takes advantage of the ModSecurity 2.0 rules language and is therefore not backward compatible.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== Are there rule differences for identify missing/empty variables between ModSecurity 1.x and 2.x? ===&lt;br /&gt;
&lt;br /&gt;
Yes there are. Many of these differences are outlined in the Migration Matrix document listed previously. Another common rule difference issue that arises is when you want to create white-listed ModSecurity rulesets which enforce that certain headers/variables are both present and not empty. In ModSecurity 1.x, you could create one rule that handles this while in ModSecurity 2.x you would need to write a chained rule.&lt;br /&gt;
&lt;br /&gt;
On the surface, you might think &amp;quot;The 1.x rules way is better since you only need 1 rule...&amp;quot; however you need to realize that anytime you have rules or directives that implicitly enforce certain capabilities, you run the risk of having false positives as it could match things that you didn't want them to. For instance, what if you have a situation where certain web clients (such as mobile devices) legitimately include some headers, however they are empty? Do you want to automatically block these clients? With the ModSecurity 1.x Rule Language, you would have to remove the entire rule. With the ModSecurity 2.x Rule Language, however, you are able to create rules to more accurately apply the logic that you desire.&lt;br /&gt;
&lt;br /&gt;
Please refer to the following blog post for more information.&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Chaim_Sanders|Chaim Sanders]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Brian_Rectanus|Brian Rectanus]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
Nick Galbreath&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|left|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
== v3.0 Detection Concepts ==&lt;br /&gt;
This page documents the goals/ideas for the next major version of the CRS.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Detection Logic/Flow Concepts ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
=Upcoming Major Release 3.0.0=&lt;br /&gt;
&lt;br /&gt;
The upcoming major Core Rules (CRS) release 3.0.0 is currently being developed in a separate branch on [https://github.com/SpiderLabs/owasp-modsecurity-crs/tree/v3.0.0-rc1 github]. The release is planned for the first quarter 2016. It brings incorporation of the &amp;lt;tt&amp;gt;@detectsqli&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;@detectxss&amp;lt;/tt&amp;gt; operators and a general reduction of false positives for default setups.&lt;br /&gt;
&lt;br /&gt;
==Infos about 3.0.0==&lt;br /&gt;
* [https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/ Blogpost comparing CRS 2.2.x with 3.0.0-dev]&lt;br /&gt;
&lt;br /&gt;
===Development===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_ModSec_CRS_Paranoia_Mode | Paranoia Mode / Bringing back the rules that used to yield a high number of false positives]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=209452</id>
		<title>Projects/OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=209452"/>
				<updated>2016-02-22T21:01:01Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP ModSecurity Core Rule Set Project&lt;br /&gt;
| project_home_page = :Category:OWASP ModSecurity Core Rule Set Project&lt;br /&gt;
&lt;br /&gt;
| project_description = &lt;br /&gt;
[http://www.modsecurity.org/ ModSecurity] is an Apache web server module that provides a web application firewall engine. The ModSecurity Rules Language engine is extrememly flexible and robust and has been referred to as the &amp;quot;Swiss Army Knife of web application firewalls.&amp;quot; While this is certainly true, it doesn't do much implicitly on its own and requires rules to tell it what to do. In order to enable users to take full advantage of ModSecurity out of the box, we have developed the Core Rule Set (CRS) which provides critical protections against attacks across most every web architecture.&lt;br /&gt;
&lt;br /&gt;
Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, the CRS is based on generic rules which focus on attack payload identification in order to provide protection from zero day and unknown vulnerabilities often found in web applications, which are in most cases custom coded.  &lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License v2 (ASLv2)] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Chaim Sanders&lt;br /&gt;
| leader_email1 = CSanders@trustwave.com&lt;br /&gt;
| leader_username1 = Chaim_sanders&lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = &lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
&lt;br /&gt;
| presentation_link = http://www.owasp.org/images/b/b3/OWASP_ModSecurity_Core_Rule_Set.ppt&lt;br /&gt;
&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set&lt;br /&gt;
&lt;br /&gt;
| project_road_map = http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_Roadmap&lt;br /&gt;
&lt;br /&gt;
| links_url1 = https://sourceforge.net/projects/mod-security/files/modsecurity-crs/0-CURRENT/&lt;br /&gt;
| links_name1 = ModSecurity on SourceForge&lt;br /&gt;
| links_url2 = https://www.modsecurity.org/tracker/browse/CORERULES&lt;br /&gt;
| links_name2 = Bug Tracker&lt;br /&gt;
| links_url3 = http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Installation&lt;br /&gt;
| links_name3 = Installation&lt;br /&gt;
| links_url4 = http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Documentation&lt;br /&gt;
| links_name4 = Documentation&lt;br /&gt;
| links_url5 = http://www.owasp.org/index.php/File:OWASP_ModSecurity_Core_Rule_Set.ppt&lt;br /&gt;
| links_name5 = PPT Presentation&lt;br /&gt;
| links_url6 = https://www.owasp.org/images/0/07/OWASP6thAppSec_ModSecurityCoreRuleSet_OferShezaf.pdf&lt;br /&gt;
| links_name6 = PDF Withepaper &lt;br /&gt;
&lt;br /&gt;
| release_1 = ModSecurity 2.0.6&lt;br /&gt;
| release_2 = ModSecurity 2.0.10 &lt;br /&gt;
| release_3 = ModSecurity 2.0.12&lt;br /&gt;
| release_4 = ModSecurity 2.1.2&lt;br /&gt;
| release_5 = &lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP ModSecurity Core Rule Set Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Rcbarnett&amp;diff=203165</id>
		<title>User:Rcbarnett</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Rcbarnett&amp;diff=203165"/>
				<updated>2015-11-06T15:09:17Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* BIO: Ryan Barnet, Akamai's Threat Research Team - To see my wiki contributions, [[:Special:Contributions/Rcbarnett|click here]].&lt;br /&gt;
&lt;br /&gt;
Ryan Barnett is a Principal Security Researcher working on the Akamai Threat Research Team supporting the Cloud Security Business Unit (including the Kona WAF product).  In addition to his primary work at Akamai, he is also a WASC Board Member and OWASP Project Leader for: Web Hacking Incident Database (WHID), Distributed Web Honeypots and a contributor to OWASP AppSensor. Mr. Barnett has also authored two web security books: Preventing Web Attacks with Apache (Pearson) and The Web Application Defender's Cookbook: Battling Hackers and Defending Users (Wiley).&lt;br /&gt;
&lt;br /&gt;
Specialties: Web Application Security, Web Application Firewalls, Intrusion Detection, Forensics and Honeypot technologies.&lt;br /&gt;
&lt;br /&gt;
* Ryan can be reached at: ryan.barnett(at)owasp.org or rbarnett(at)akamai.com&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Defenders&amp;diff=203164</id>
		<title>Defenders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Defenders&amp;diff=203164"/>
				<updated>2015-11-06T15:06:07Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== OWASP Defenders  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''Defenders Community''' &lt;br /&gt;
&lt;br /&gt;
A community of security professionals and stakeholders with the common goal of advancing the state of security in the area of application defense, including the tools and techniques that enable the detection and response to application layer attacks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Examples''' &lt;br /&gt;
&lt;br /&gt;
AppSensor, ModSecurity, Real Time Log Analysis, Application Trending Techniques &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Target Audience''' &lt;br /&gt;
&lt;br /&gt;
Application Security Professionals, Infrastructure Security Teams, Developers looking to integrate defensive technologies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''What Are OWASP Communities?'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Builders Builders], [http://www.owasp.org/index.php/Breakers Breakers] and Defenders; the idea of OWASP Communities is to bring together experts in the area that they are best at with the common goal of advancing the state of application security.  This approach allows similar groups of professionals and experts to tackle security problems with the involvement of the most relevant stakeholders.  The intent is to drive high quality output that is immediately usable by the target audience.  More information about this vision can be found [http://michael-coates.blogspot.com/2011/02/vision-for-owasp.html here]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:OWASP-vision.jpg]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== The Community  ====&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 404px; height: 413px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:MichaelCoates-OWASP.jpg|100px]]&amp;lt;br&amp;gt; &lt;br /&gt;
| '''Michael Coates''' &amp;lt;br&amp;gt; Shape Security &amp;lt;br&amp;gt; michael.coates@owasp.org &amp;lt;br&amp;gt; http://michael-coates.blogspot.com &amp;lt;br&amp;gt; @_mwc&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:JohnMelton-OWASP.jpg|100px]] &amp;lt;br&amp;gt; &lt;br /&gt;
| '''John Melton''' &amp;lt;br&amp;gt; White Hat Security &amp;lt;br&amp;gt; john.melton@owasp.org &amp;lt;br&amp;gt; http://www.jtmelton.com &amp;lt;br&amp;gt; &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:IvanRistic-OWASP.jpg|100px]]&amp;lt;br&amp;gt; &lt;br /&gt;
|  '''Ivan Ristic''' &amp;lt;br&amp;gt; Qualys &amp;lt;br&amp;gt; ivanr@webkreator.com &amp;lt;br&amp;gt; http://blog.ivanristic.com/ &amp;lt;br&amp;gt; @ivanristic&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:ColinWatson-OWASP.jpg|100px]] &amp;lt;br&amp;gt; &lt;br /&gt;
| '''Colin Watson''' &amp;lt;br&amp;gt; Watson Hall Ltd. &amp;lt;br&amp;gt; colin.watson@owasp.org &amp;lt;br&amp;gt; http://www.clerkendweller.com &amp;lt;br&amp;gt; @clerkendweller&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:RyanBarnett-OWASP.jpg|100px]]&amp;lt;br&amp;gt;&lt;br /&gt;
| '''Ryan Barnett'''&amp;lt;br&amp;gt; Akamai &amp;lt;br&amp;gt; ryan.barnett@owasp.org &amp;lt;br&amp;gt; http://tacticalwebappsec.blogspot.com/ &amp;lt;br&amp;gt; @ryancbarnett&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:LucasFerreira-OWASP.jpg|100px]] &amp;lt;br&amp;gt;&lt;br /&gt;
| '''Lucas C. Ferreira'''&amp;lt;br&amp;gt; Câmara dos Deputados (Brazilian Chamber of Deputies) &amp;lt;br&amp;gt; lucas.ferreira@owasp.org &amp;lt;br&amp;gt; http://blog.sapao.net &amp;lt;br&amp;gt; @lucassapao&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:PrzemyslawSkowron-OWASP.jpg|100px]] &amp;lt;br&amp;gt;&lt;br /&gt;
| '''Przemyslaw Skowron'''&amp;lt;br&amp;gt; Alior Bank S.A. &amp;lt;br&amp;gt; przemyslaw.skowron@owasp.org &amp;lt;br&amp;gt; - &amp;lt;br&amp;gt; -&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|  &amp;amp;nbsp;&lt;br /&gt;
| '''Chen King'''&amp;lt;br&amp;gt; &amp;amp;nbsp; &amp;lt;br&amp;gt; &amp;amp;nbsp;&amp;lt;br&amp;gt; &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| '''Fernando A. Damião'''&amp;lt;br&amp;gt; &amp;amp;nbsp; &amp;lt;br&amp;gt; &amp;amp;nbsp;&amp;lt;br&amp;gt; &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| '''Yvan Boily'''&amp;lt;br&amp;gt; yvanboily@gmail.com &amp;lt;br&amp;gt; @ygjb &amp;lt;br&amp;gt; &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| '''Josh Amishav-Zlatin'''&amp;lt;br&amp;gt; jamuse@gmail.com &amp;lt;br&amp;gt; @jamuse &amp;lt;br&amp;gt; &amp;amp;nbsp;&lt;br /&gt;
|  &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Want to contribute to the OWASP Defenders Community? &amp;lt;br&amp;gt;Add your info and send an email to [mailto:michael.coates@owasp.org michael.coates@owasp.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Roadmap  ====&lt;br /&gt;
* Determine the current market need. This requires involvement from people in enterprise that are tacking these problems. No guessing about what we think people need. &lt;br /&gt;
* Evaluate current OWASP projects to understand match with market need and quality of projects &lt;br /&gt;
* Identify 3-4 projects that will be focused on for growth and promotion &lt;br /&gt;
* Archive other projects (within defender domain) that are abandoned or not inline with market need &lt;br /&gt;
* Cross training - We should all be able to help out to advance our 3-4 core projects&lt;br /&gt;
* Significantly advance quality of selected projects&lt;br /&gt;
* Community outreach for adoption&lt;br /&gt;
* High quality marketing efforts&lt;br /&gt;
* Conference presentations across multiple projects&lt;br /&gt;
&lt;br /&gt;
==== Official Defender Projects  ====&lt;br /&gt;
&lt;br /&gt;
To be determined - see roadmap &lt;br /&gt;
&lt;br /&gt;
==== All Defender Related Projects ====&lt;br /&gt;
All projects that are related to the OWASP Defenders community can be found at the following link: [[:Category:OWASP_Defenders]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virtual_Patching_Cheat_Sheet&amp;diff=203129</id>
		<title>Virtual Patching Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virtual_Patching_Cheat_Sheet&amp;diff=203129"/>
				<updated>2015-11-05T21:23:34Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
The goal with this cheat Sheet is to present a concise virtual patching framework that organizations can follow to maximize the timely implementation of mitigation protections.&lt;br /&gt;
&lt;br /&gt;
= Definition: Virtual Patching =&lt;br /&gt;
&lt;br /&gt;
'''''A security policy enforcement layer which prevents and reports the exploitation attempt of a known vulnerability.'''''&lt;br /&gt;
&lt;br /&gt;
The virtual patch works when the security enforcement layer analyzes transactions and intercepts attacks in transit, so malicious traffic never reaches the web application.  The resulting impact of virtual patching is that, while the actual source code of the application itself has not been modified, the exploitation attempt does not succeed.&lt;br /&gt;
&lt;br /&gt;
= Why Not Just Fix the Code? =&lt;br /&gt;
&lt;br /&gt;
From a purely technical perspective, the number one remediation strategy would be for an organization to correct the identified vulnerability within the source code of the web application.  This concept is universally agreed upon by both web application security experts and system owners.  Unfortunately, in real world business situations, there arise many scenarios where updating the source code of a web application is not easy such as:&lt;br /&gt;
* '''Lack of resources''' - Devs are already allocated to other projects.&lt;br /&gt;
* '''3rd Party Software''' - Code can not be modified by the user.&lt;br /&gt;
* '''Outsourced App Dev''' - Changes would require a new project.&lt;br /&gt;
&lt;br /&gt;
The important point is this - '''Code level fixes and Virtual Patching are NOT mutually exclusive'''.  They are processes that are executed by different team (OWASP Builders/Devs vs. OWASP Defenders/OpSec) and can be run in tandem.&lt;br /&gt;
&lt;br /&gt;
= Value of Virtual Patching =&lt;br /&gt;
The two main goals of Virtual Patching are:&lt;br /&gt;
* '''Minimize Time-to-Fix''' - Fixing application source code takes time.  The main purpose of a virtual patch is to implement a mitigation for the identified vulnerability as soon as possible.  The urgency of this response may be different: for example if the vulnerability was identified in-house through code reviews or penetration testing vs. finding a vulnerability as part of live incident response.&lt;br /&gt;
&lt;br /&gt;
* '''Attack Surface Reduction''' - Focus on minimizing the attack vector.  In some cases, such as missing positive security input validation, it is possible to achieve 100% attack surface reduction.  In other cases, such with missing output encoding for XSS flaws, you may only be able to limit the exposures.  Keep in mind - 50% reduction in 10 minutes is better than 100% reduction in 48 hrs.&lt;br /&gt;
&lt;br /&gt;
= Virtual Patching Tools =&lt;br /&gt;
Notice that the definition above did not list any specific tool as there are a number of different options that may be used for virtual patching efforts such as:&lt;br /&gt;
* Intermediary devices such as a WAF or IPS appliance&lt;br /&gt;
* Web server plugin such as ModSecurity&lt;br /&gt;
* Application layer filter such as ESAPI WAF&lt;br /&gt;
&lt;br /&gt;
For example purposes, we will show virtual patching examples using the open source ModSecurity WAF tool - http://www.modsecurity.org/.&lt;br /&gt;
&lt;br /&gt;
= A Virtual Patching Methodology =&lt;br /&gt;
Virtual Patching, like most other security processes, is not something that should be approached haphazardly.  Instead, a consistent, repeatable process should be followed that will provide the best chances of success.  The following virtual patching workflow mimics the industry accepted practice for conducting IT Incident Response and consists of the following phases:&lt;br /&gt;
* Preparation&lt;br /&gt;
* Identification&lt;br /&gt;
* Analysis&lt;br /&gt;
* Virtual Patch Creation&lt;br /&gt;
* Implementation/Testing&lt;br /&gt;
* Recovery/Follow Up.&lt;br /&gt;
&lt;br /&gt;
= Example Public Vulnerability =&lt;br /&gt;
Let's take the following SQL Injection vulnerability as our example for the remainder of the article - http://www.osvdb.org/show/osvdb/88856&lt;br /&gt;
&lt;br /&gt;
'''''88856 : WordPress Shopping Cart Plugin for WordPress /wp-content/plugins/levelfourstorefront/scripts/administration/exportsubscribers.php reqID Parameter SQL Injection'''''&lt;br /&gt;
&lt;br /&gt;
'''''Description''': WordPress Shopping Cart Plugin for WordPress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the /wp-content/plugins/levelfourstorefront/scripts/administration/exportsubscribers.php script not properly sanitizing user-supplied input to the 'reqID' parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.''&lt;br /&gt;
&lt;br /&gt;
= Preparation Phase =&lt;br /&gt;
The importance of properly utilizing the preparation phase with regards to virtual patching cannot be overstated.  You need to do a number of things to setup the virtual patching processes and framework '''''prior''''' to actually having to deal with an identified vulnerability, or worse yet, react to a live web application intrusion.  The point is that during a live compromise is not the ideal time to be proposing installation of a web application firewall and the concept of a virtual patch.  Tension is high during real incidents and time is of the essence, so lay the foundation of virtual patching when the waters are calm and get everything in place and ready to go when an incident does occur.  &lt;br /&gt;
&lt;br /&gt;
Here are a few critical items that should be addressed during the preparation phase:&lt;br /&gt;
* '''Public/Vendor Vulnerability Monitoring''' - Ensure that you are signed up for all vendor alert mail-lists for commercial software that you are using.  This will ensure that you will be notified in the event that the vendor releases vulnerability information and patching data.  &lt;br /&gt;
* '''Virtual Patching Pre-Authorization''' – Virtual Patches need to be implemented quickly so the normal governance processes and authorizations steps for standard software patches need to be expedited.  Since virtual patches are not actually modifying source code, they do not require the same amount of regression testing as normal software patches.  Categorizing virtual patches in the same group as Anti-Virus updates or Network IDS signatures helps to speed up the authorization process and minimize extended testing phases.&lt;br /&gt;
* '''Deploy Virtual Patching Tool In Advance''' - As time is critical during incident response, it would be a poor time to have to get approvals to install new software.  For instance, you can install ModSecurity WAF in embedded mode on your Apache servers, or an Apache reverse proxy server.  The advantage with this deployment is that you can create fixes for non-Apache back-end servers.  Even if you do not use ModSecurity under normal circumstances, it is best to have it “on deck” ready to be enabled if need be.&lt;br /&gt;
* '''Increase HTTP Audit Logging''' – The standard Common Log Format (CLF) utilized by most web servers does not provide adequate data for conducting proper incident response.  You need to have access to the following HTTP data:&lt;br /&gt;
** Request URI (including QUERY_STRING)&lt;br /&gt;
** Full Request Headers (including Cookies)&lt;br /&gt;
** Full Request Body (POST payload)&lt;br /&gt;
** Full Response Headers&lt;br /&gt;
** Full Response Body&lt;br /&gt;
&lt;br /&gt;
= Identification Phase =&lt;br /&gt;
The Identification Phase occurs when an organization becomes aware of a vulnerability within their web application.  There are generally two different methods of identifying vulnerabilities: Proactive and Reactive.&lt;br /&gt;
&lt;br /&gt;
== Proactive Identification ==&lt;br /&gt;
This occurs when an organization takes it upon themselves to assess their web security posture and conducts the following tasks:&lt;br /&gt;
* '''Dynamic Application Assessments''' - Whitehat attackers conduct penetration tests or automated web assessment tools are run against the live web application to identify flaws.&lt;br /&gt;
* '''Source code reviews''' - Whitehat attackers use manual/automated means to analyze the source code of the web application to identify flaws.&lt;br /&gt;
Due to the fact that custom coded web applications are unique, these proactive identification tasks are extremely important as you are not able to rely upon 3rd party vulnerability notifications.&lt;br /&gt;
&lt;br /&gt;
== Reactive Identification ==&lt;br /&gt;
There are three main reactive methods for identifying vulnerabilities:&lt;br /&gt;
* '''Vendor contact (e.g. pre-warning)''' - Occurs when a vendor discloses a vulnerability for commercial web application software that you are using.  Example is Microsoft's Active Protections Program (MAPP) - http://www.microsoft.com/security/msrc/collaboration/mapp.aspx&lt;br /&gt;
* '''Public disclosure''' - Public vulnerability disclosure for commercial/open source web application software that you are using.  The threat level for public disclosure is increased as more people know about the vulnerability.&lt;br /&gt;
* '''Security incident''' – This is the most urgent situation as the attack is active.  In these situations, remediation must be immediate.  &lt;br /&gt;
&lt;br /&gt;
= Analysis Phase =&lt;br /&gt;
Here are the recommended steps to start the analysis phase:&lt;br /&gt;
&lt;br /&gt;
# '''Determine Virtual Patching Applicability''' - Virtual patching is ideally suited for injection-type flaws but may not provide an adequate level of attack surface reduction for other attack types or categories.  Thorough analysis of the underlying flaw should be conducted to determine if the virtual patching tool has adequate detection logic capabilities.&lt;br /&gt;
# '''Utilize Bug Tracking/Ticketing System''' - Enter the vulnerability information into a bug tracking system for tracking purposes and metrics.  Recommend you use ticketing systems you already use such as Jira or you may use a specialized tool such as ThreadFix - https://code.google.com/p/threadfix/. &lt;br /&gt;
# '''Verify the name of the vulnerability''' - This means that you need to have the proper public vulnerability identifier (such as CVE name/number) specified by the vulnerability announcement, vulnerability scan, etc. If the vulnerability is identified proactively rather than through public announcements, then you should assign your own unique identifier to each vulnerability. &lt;br /&gt;
# '''Designate the impact level''' - It is always important to understand the level of criticality involved with a web vulnerability.  Information leakages may not be treated in the same manner as an SQL Injection issue. &lt;br /&gt;
# '''Specify which versions of software are impacted''' - You need to identify what versions of software are listed so that you can determine if the version(s) you have installed are affected. &lt;br /&gt;
# '''List what configuration is required to trigger the problem''' - Some vulnerabilities may only manifest themselves under certain configuration settings.&lt;br /&gt;
# '''List Proof of Concept (PoC) exploit code or payloads used during attacks/testing''' - Many vulnerability announcements have accompanying exploit code that shows how to demonstrate the vulnerability.  If this data is available, make sure to download it for analysis.  This will be useful later on when both developing and testing the virtual patch.&lt;br /&gt;
&lt;br /&gt;
= Virtual Patch Creation Phase =&lt;br /&gt;
The process of creating an accurate virtual patch is bound by two main tenants:&lt;br /&gt;
&lt;br /&gt;
# '''No false positives''' - Do not ever block legitimate traffic under any circumstances. &lt;br /&gt;
# '''No false negatives''' - Do not ever miss attacks, even when the attacker intentionally tries to evade detection. &lt;br /&gt;
&lt;br /&gt;
Care should be taken to attempt to minimize either of these two rules.  It may not be possible to adhere 100% to each of these goals but remember that virtual patching is about '''Risk Reduction'''.  It should be understood by business owners that while you are gaining the advantage of shortening the Time-to-Fix metric, you may not be implementing a complete fix for the flaw.&lt;br /&gt;
&lt;br /&gt;
== Manual Virtual Patch Creation ==&lt;br /&gt;
&lt;br /&gt;
=== Positive Security (Whitelist) Virtual Patches ('''Recommended Solution''') ===&lt;br /&gt;
Positive security model (whitelist) is a comprehensive security mechanism that provides an independent input validation envelope to an application. The model specifies the characteristics of valid input (character set, length, etc…) and denies anything that does not conform.  By defining rules for every parameter in every page in the application the application is protected by an additional security envelop independent from its code.&lt;br /&gt;
&lt;br /&gt;
==== Example Whitelist ModSecurity Virtual Patch ====&lt;br /&gt;
In order to create a whitelist virtual patch, you must be able to verify what the normal, expected input values are.  If you have implemented proper audit logging as part of the Preparation Phase, then you should be able to review audit logs to identify the format of expected input types.  In this case, the &amp;quot;reqID&amp;quot; parameter is supposed to only hold integer characters so we can use this virtual patch:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# Verify we only receive 1 parameter called &amp;quot;reqID&amp;quot;&lt;br /&gt;
#&lt;br /&gt;
SecRule REQUEST_URI &amp;quot;@contains /wp-content/plugins/levelfourstorefront/scripts/administration/exportsubscribers.php&amp;quot; &amp;quot;chain,id:1,phase:2,t:none,t:Utf8toUnicode,t:urlDecodeUni,t:normalizePathWin,t:lowercase,block,msg:'Input Validation Error for \'reqID\' parameter - Duplicate Parameters Names Seen.',logdata:'%{matched_var}'&amp;quot;&lt;br /&gt;
  SecRule &amp;amp;ARGS:/reqID/ &amp;quot;!@eq 1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Verify reqID's payload only contains integers&lt;br /&gt;
#&lt;br /&gt;
SecRule REQUEST_URI &amp;quot;@contains /wp-content/plugins/levelfourstorefront/scripts/administration/exportsubscribers.php&amp;quot; &amp;quot;chain,id:2,phase:2,t:none,t:Utf8toUnicode,t:urlDecodeUni,t:normalizePathWin,t:lowercase,block,msg:'Input Validation Error for \'reqID\' parameter.',logdata:'%{args.reqid}'&amp;quot;&lt;br /&gt;
  SecRule ARGS:/reqID/ &amp;quot;!@rx ^[0-9]+$&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This virtual patch will inspect the reqID parameter value on the specified page and prevent any characters other than integers as input.&lt;br /&gt;
* '''Note''' - you should make sure to assign rule IDs properly and track them in the bug tracking system.&lt;br /&gt;
&lt;br /&gt;
* '''Caution''': There are numerous evasion vectors when creating virtual patches.  Please consult the OWASP Best Practices: Virtual Patching document for a more thorough discussion on countering evasion methods.&lt;br /&gt;
&lt;br /&gt;
=== Negative Security (Blacklist) Virtual Patches ===&lt;br /&gt;
A negative security model (blacklist) is based on a set of rules that detect specific known attacks rather than allow only valid traffic.&lt;br /&gt;
&lt;br /&gt;
==== Example Blacklist ModSecurity Virtual Patch ====&lt;br /&gt;
Here is the example PoC code that was supplied by the public advisory - http://packetstormsecurity.com/files/119217/WordPress-Shopping-Cart-8.1.14-Shell-Upload-SQL-Injection.html:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://localhost/wordpress/wp-content/plugins/levelfourstorefront/scripts/administration/exportsubscribers.php?reqID=1' or 1='1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Looking at the payload, we can see that the attacker is inserting a single quote character and then adding additional SQL query logic to the end.  Based on this data, we could disallow the single quote character like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SecRule REQUEST_URI &amp;quot;@contains /wp-content/plugins/levelfourstorefront/scripts/administration/exportsubscribers.php&amp;quot; &amp;quot;chain,id:1,phase:2,t:none,t:Utf8toUnicode,t:urlDecodeUni,t:normalizePathWin,t:lowercase,block,msg:'Input Validation Error for \'reqID\' parameter.',logdata:'%{args.reqid}'&amp;quot;&lt;br /&gt;
  SecRule ARGS:/reqID/ &amp;quot;@pm '&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Which Method is Better for Virtual Patching – Positive or Negative Security? ===&lt;br /&gt;
A virtual patch may employ either a positive or negative security model.  Which one you decide to use depends on the situation and a few different considerations.  For example, negative security rules can usually be implemented more quickly, however the possible evasions are more likely.&lt;br /&gt;
&lt;br /&gt;
Positive security rules, only the other hand, provides better protection however it is often a manual process and thus is not scalable and difficult to maintain for large/dynamic sites.  While manual positive security rules for an entire site may not be feasible, a positive security model can be selectively employed when a vulnerability alert identifies a specific location with a problem.&lt;br /&gt;
&lt;br /&gt;
=== Beware of Exploit-Specific Virtual Patches ===&lt;br /&gt;
You want to resist the urge to take the easy road and quickly create an '''exploit-specific virtual patch'''.  For instance, if an authorized penetration test identified an XSS vulnerability on a page and used the following attack payload in the report:&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;script&amp;gt;alert('XSS Test')&amp;lt;/script&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
It would not be wise to implement a virtual patch that simply blocks that exact payload.  While it may provide some immediate protection, its long term value is significantly decreased.&lt;br /&gt;
&lt;br /&gt;
== Automated Virtual Patch Creation ==&lt;br /&gt;
&lt;br /&gt;
Manual patch creation may become unfeasible as the number of vulnerabilities grow and automated means may become necessary.  If the vulnerabilities were identified using automated tools and an XML report is available, it is possible to leverage automated processes to auto-convert this vulnerability data into virtual patches for protection systems.  Three examples include:&lt;br /&gt;
* '''OWASP ModSecurity Core Rule Set (CRS) Scripts''' - The OWASP CRS includes scripts to auto-convert XML output from tools such as OWASP ZAP into ModSecurity Virtual Patches.  Reference - http://blog.spiderlabs.com/2012/03/modsecurity-advanced-topic-of-the-week-automated-virtual-patching-using-owasp-zed-attack-proxy.html&lt;br /&gt;
* '''ThreadFix Virtual Patching''' - ThreadFix also includes automated processes of converting imported vulnerability XML data into virtual patches for security tools such as ModSecurity.  Reference - https://code.google.com/p/threadfix/wiki/GettingStarted#Generating_WAF_Rules&lt;br /&gt;
* '''Direct Importing to WAF Device''' - Many commercial WAF products have the capability to import DAST tool XML report data and automatically adjust their protection profiles.&lt;br /&gt;
&lt;br /&gt;
= Implementation/Testing Phase =&lt;br /&gt;
In order to accurately test out the newly created virtual patches, it may be necessary to use an application other than a web browser.  Some useful tools are:&lt;br /&gt;
* Web browser&lt;br /&gt;
* Command line web clients such as Curl and Wget. &lt;br /&gt;
* Local Proxy Servers such as OWASP ZAP (https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project). &lt;br /&gt;
* ModSecurity AuditViewer  (http://www.jwall.org/web/audit/viewer.jsp) – which allows you to load a ModSecurity audit log file, manipulate it and then re-inject the data back into any web server.&lt;br /&gt;
&lt;br /&gt;
== Testing Steps ==&lt;br /&gt;
* Implement virtual patches initially in a &amp;quot;Log Only&amp;quot; configuration to ensure that you do not block any normal user traffic (false positives).&lt;br /&gt;
* If the vulnerability was identified by a specific tool or assessment team - request a retest.&lt;br /&gt;
* If retesting fails due to evasions, then you must go back to the Analysis phase to identify how to better fix the issue.&lt;br /&gt;
&lt;br /&gt;
= Recovery/Follow-Up Phase =&lt;br /&gt;
* '''Update Data in Ticket System''' - Although you may need to expedite the implementation of virtual patches, you should still track them in your normal Patch Management processes.  This means that you should create proper change request tickets, etc… so that their existence and functionality is documented.  Updating the ticket system also helps to identify &amp;quot;time-to-fix&amp;quot; metrics for different vulnerability types.  Make sure to properly log the virtual patch rule ID values.&lt;br /&gt;
 &lt;br /&gt;
* '''Periodic Re-assessments''' - You should also have periodic re-assessments to verify if/when you can remove previous virtual patches if the web application code has been updated with the real source code fix.  I have found that many people opt to keep virtual patches in place due to better identification/logging vs. application or db capabilities.&lt;br /&gt;
&lt;br /&gt;
* '''Running Virtual Patch Alert Reports''' - Run reports to identify if/when any of your virtual patches have triggered.  This will show value for virtual patching in relation to windows of exposure for source code time-to-fix.&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
* [https://www.owasp.org/index.php/Virtual_Patching_Best_Practices OWASP Virtual Patching Best Practices]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat with ModSecurity]&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
[[:User:Rcbarnett|Ryan Barnett (Main Author)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Josh Amishav-Zlatin|Josh Zlatin (Editor/Contributing Author)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:dune73|Christian Folini (Review)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;br /&gt;
[[Category:OWASP Defenders]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=200744</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=200744"/>
				<updated>2015-09-17T12:29:12Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Open HUB==&lt;br /&gt;
https://www.openhub.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
* Chaim Sanders&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== Who Leads the ModSecurity Project? ==&lt;br /&gt;
ModSecurity is supported by Trustwave's SpiderLabs Team [https://www.trustwave.com/spiderLabs.php] and includes the following team members:&lt;br /&gt;
*Ryan Barnett - ModSecurity Project Lead and OWASP ModSecurity Core Rule Set Project Lead&lt;br /&gt;
*Felipe Zimmerle Costa - ModSecurity Lead Developer&lt;br /&gt;
&lt;br /&gt;
Suggestions for enhancements of this document are always welcome. Please email them to the Mod-Security-Users mailing list [http://lists.sourceforge.net/lists/listinfo/mod-security-users].&lt;br /&gt;
&lt;br /&gt;
== Background and Support ==&lt;br /&gt;
&lt;br /&gt;
=== What exactly is ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
ModSecurity™is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks before they reach web applications. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Where do I get more help on ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The ModSecurity website is the definitive location for all information - http://www.modsecurity.org/help.html. &lt;br /&gt;
&lt;br /&gt;
==== Open Source/Free Help ====&lt;br /&gt;
*ModSecurity Users Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-users&lt;br /&gt;
*ModSecurity Developers Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-developers&lt;br /&gt;
*OWASP ModSecurity Core Rules Mail-list (OWASP) - https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set &lt;br /&gt;
*You can also join the #modsecurity channel on irc.freenode.net.&lt;br /&gt;
==== Commercial Help ====&lt;br /&gt;
*Commercial Support through Trustwave's Technical Assistance Center (TAC) - https://www3.trustwave.com/modsecurity-rules-support.php&lt;br /&gt;
*Professional Services offer by Trustwave SpiderLabs Research Team&lt;br /&gt;
*ModSecurity Training&lt;br /&gt;
&lt;br /&gt;
=== Do I need to sign up for the Mod-User Mail-list before I can send emails? ===&lt;br /&gt;
&lt;br /&gt;
Yes, only subscribers are able to post messages. As mentioned in the previous section, you will need to visit the mail-list website to register.&lt;br /&gt;
&lt;br /&gt;
=== Is there anything that I should do prior to sending emails to the mail-list? ===&lt;br /&gt;
&lt;br /&gt;
Yes. There is a good chance that the issue you are facing has already been discussed and, most likely, a fix has already been presented. You can review the mail-list archive online at the ModSecurity project site on SourceForge. You can also use the Search interface available for topic threads that are archived to the various mirror sites. For example, if you had a question about Exceptions and ModSecurity, you could use the following search to find past mail-list threads on this topic. If you can not find an answer to your question after doing some research, you should then send an email to the mod-security-users mail-list.&lt;br /&gt;
&lt;br /&gt;
=== Will I always get an immediate answer to my question on the open source mod-security-users mail-list? ===&lt;br /&gt;
&lt;br /&gt;
The open source mod-security-users mail-list is &amp;quot;best effort&amp;quot; support meaning that we will aspire to respond to emails as quickly as possible however the actual response time may vary depending on factors such as time of day, time of week and complexity of the question. If your email is sent on the week-end or if your question involves setting up test systems, unique configurations or interactions with a custom application then it may take some time to respond.&lt;br /&gt;
&lt;br /&gt;
=== If I don't get an immediate response, should I send an email to the Trustwave Technical Support email address? ===&lt;br /&gt;
&lt;br /&gt;
No. The Trustwave Technical Support email address is for commercial ModSecurity customers only.&lt;br /&gt;
&lt;br /&gt;
=== Where can I find books about Web Application Firewalls and ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity Handbook ====&lt;br /&gt;
ModSecurity Handbook is &amp;quot;The definitive guide to the popular open source web application firewall&amp;quot;, written by Ivan Ristic (original author of ModSecurity). The book is available from Feisty Duck in hard copy or with immediate access to the digital version which is continually updated.&lt;br /&gt;
&lt;br /&gt;
==== Web Application Defender's Cookbook: Battling Hackers and Defending Users ====&lt;br /&gt;
The Web Application Defender's Cookbook: Battling Hackers and Protecting Users is a book written by the ModSecurity Project Lead and OWASP ModSecurity Project Lead Ryan Barnett. The book outlines critical defensive techniques to protect web applications and includes example ModSecurity rules/scripts.&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity 2.5 ====&lt;br /&gt;
ModSecurity 2.5 is &amp;quot;A complete guide to using ModSecurity&amp;quot;, written by Magnus Mischel. The book is available from Packt Publishing in both hard copy and digital forms.&lt;br /&gt;
&lt;br /&gt;
==== Apache Security ====&lt;br /&gt;
Apache Security is a comprehensive Apache Security resource, written by Ivan Ristic for O'Reilly. Two chapters (Apache Installation and Configuration and PHP) are available as free download, as are the Apache security tools created for the book.&lt;br /&gt;
&lt;br /&gt;
==== Preventing Web Attacks with Apache ====&lt;br /&gt;
Preventing Web Attacks with Apache. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against.&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
=== What type(s) of security models does ModSecurity support? ===&lt;br /&gt;
&lt;br /&gt;
There is a common misconception that ModSecurity can only be used for negative policy enforcement. This is not the case. ModSecurity does not have any default security model &amp;quot;out-of-the-box.&amp;quot; It is up to the user to implement appropriate rules to achieve the desired security model. That being said, these are the security models which are most often employed:&lt;br /&gt;
&lt;br /&gt;
*Negative Security Model - looks for known bad, malicious requests. This method is effective at blocking a large number of automated attacks, however it is not the best approach for identifying new attack vectors. Using too many negative rules may also negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
*Positive Security Model - When positive security model is deployed, only requests that are known to be valid are accepted, with everything else rejected. This approach works best with applications that are heavily used but rarely updated.&lt;br /&gt;
&lt;br /&gt;
*Virtual Patching - Its rule language makes ModSecurity an ideal external patching tool. External patching is all about reducing the window of opportunity. Time needed to patch application vulnerabilities often runs to weeks in many organizations. With ModSecurity, applications can be patched from the outside, without touching the application source code (and even without any access to it), making your systems secure until a proper patch is produced.&lt;br /&gt;
&lt;br /&gt;
*Extrusion Detection Model - ModSecurity can also monitor outbound data and identify and block information disclosure issues such as leaking detailed error messages or Social Security Numbers or Credit Card Numbers.&lt;br /&gt;
&lt;br /&gt;
=== What's new in ModSecurity and why should I upgrade if I am already using ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
There are many significant changes and enhancements in ModSecurity 2.5 over the 1.x branch, including:&lt;br /&gt;
&lt;br /&gt;
In order to use the OWASP ModSecurity Core Rules, you must use the 2.x version of ModSecurity as it takes advantage of specific features not available in previous versions.&lt;br /&gt;
&lt;br /&gt;
Five processing phases (where there were only two in 1.9.x). These are: request headers, request body, response headers, response body, and logging. Those users who wanted to do things at the earliest possible moment can do them now.&lt;br /&gt;
&lt;br /&gt;
Per-rule transformation options (previously normalization was implicit and hard-coded). Many new transformation functions were added.&lt;br /&gt;
&lt;br /&gt;
Transaction variables. This can be used to store pieces of data, create a transaction anomaly score, and so on.&lt;br /&gt;
&lt;br /&gt;
Data persistence (can be configured any way you want although most people will want to use this feature to track IP addresses, application sessions, and application users).&lt;br /&gt;
&lt;br /&gt;
Support for anomaly scoring and basic event correlation (counters can be automatically decreased over time; variables can be expired).&lt;br /&gt;
&lt;br /&gt;
Support for web applications and session IDs.&lt;br /&gt;
&lt;br /&gt;
Regular Expression back-references (allows one to create custom variables using transaction content).&lt;br /&gt;
&lt;br /&gt;
There are now many functions that can be applied to the variables (where previously one could only use regular expressions).&lt;br /&gt;
&lt;br /&gt;
XML support (parsing, validation, XPath).&lt;br /&gt;
&lt;br /&gt;
For more information, it is suggested that you review the SecurityFocus interview that Ivan Ristic gave on ModSecurity 2.0 as it outlines these new features in more detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I migrate my rules from the ModSecurity 1.x format into the 2.x format? ===&lt;br /&gt;
&lt;br /&gt;
Due to the many changes in the ModSecurity 2.0 rules language, you can not directly use existing rulesets. You will need to translate the functionality of any custom rules into the new rules language. A migration matrix is available here [http://www.modsecurity.org/documentation/ModSecurity-Migration-Matrix.pdf] that will assist with this process.&lt;br /&gt;
&lt;br /&gt;
=== How do I install ModSecurity 2.0? ===&lt;br /&gt;
&lt;br /&gt;
The installation procedures for installing ModSecurity 2.5 has changed from previous versions. It now includes a configure script that should help to identify all local settings. After running configure, you then run the make and make install commands. You no longer use apxs directly.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in embedded-mode, what does that mean exactly? ===&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;embedded&amp;quot; simply refers to the fact that ModSecurity, running as an Apache module, is running inside the webserver process. Most WAFs function as totally separate hosts and sit in front of the web servers. Running in embedded-mode has some advantages and disadvantages that should be considered:&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Easy to add to an existing Apache server.&lt;br /&gt;
&lt;br /&gt;
Not a point of failure with respect to traffic.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
ModSecurity can only protect the local web server.&lt;br /&gt;
&lt;br /&gt;
ModSecurity will consume local resources such as CPU and RAM.&lt;br /&gt;
&lt;br /&gt;
Management of log files and configurations can become difficult if you have multiple installations.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in reverse proxy-mode, how does that differ from embedded-mode? ===&lt;br /&gt;
&lt;br /&gt;
The only difference with this deployment vs. an embedded one is that Apache itself is configured to function as a reverse proxy.&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Single point of access – functions as a choke point so you consolidate applying security settings and makes management easier.&lt;br /&gt;
&lt;br /&gt;
Network topology is hidden from the outside world - so it will be more difficult for attackers to enumerate your web platforms.&lt;br /&gt;
&lt;br /&gt;
Increased performance – if SSL accelerators/caching used.&lt;br /&gt;
&lt;br /&gt;
You can implement vulnerability filters to protect and vulnerable web server or application on the back-end (IIS, Netscape, ASP, PHP, etc...). See related section on Virtual Patching.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
A potential traffic bottleneck if the reverse proxy can not handle the network load.&lt;br /&gt;
&lt;br /&gt;
A potential point of failure - if the reverse proxy goes down it may cause a denial of service to the web applications that are behind it.&lt;br /&gt;
&lt;br /&gt;
Requires changes to the network.&lt;br /&gt;
&lt;br /&gt;
== Configuring ModSecurity ==&lt;br /&gt;
&lt;br /&gt;
=== Should I initially set the SecRuleEngine to On? ===&lt;br /&gt;
&lt;br /&gt;
No. Every Ruleset can have false positive in new environments and any new installation should initially use the log only Ruleset version or if no such version is available, set ModSecurity to Detection only using the SecRuleEngine DetectionOnly command. After running ModSecurity in a detection only mode for a while review the evens generated and decide if any modification to the rule set should be made before moving to protection mode.&lt;br /&gt;
&lt;br /&gt;
=== How do I get ModSecurity to inspect request and response bodies? ===&lt;br /&gt;
&lt;br /&gt;
You need to set the the following two directives:&lt;br /&gt;
&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
&lt;br /&gt;
SecResponseBodyAccess On&lt;br /&gt;
&lt;br /&gt;
=== How can I verify exactly how ModSecurity is processing rules and requests? ===&lt;br /&gt;
&lt;br /&gt;
You need to enable the debug log with SecDebugLog and increase the log level with SecDebugLogLevel. It you set the debug log level to 9, it will tell you exactly what tasks it is completing along with what data it is acting upon. Do be aware that while the increased debug log level does help from a troubleshooting perspective, it does negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== Can I use the Core Rules with ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
Unfortunately, no. The Core Rules takes advantage of the ModSecurity 2.0 rules language and is therefore not backward compatible.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== Are there rule differences for identify missing/empty variables between ModSecurity 1.x and 2.x? ===&lt;br /&gt;
&lt;br /&gt;
Yes there are. Many of these differences are outlined in the Migration Matrix document listed previously. Another common rule difference issue that arises is when you want to create white-listed ModSecurity rulesets which enforce that certain headers/variables are both present and not empty. In ModSecurity 1.x, you could create one rule that handles this while in ModSecurity 2.x you would need to write a chained rule.&lt;br /&gt;
&lt;br /&gt;
On the surface, you might think &amp;quot;The 1.x rules way is better since you only need 1 rule...&amp;quot; however you need to realize that anytime you have rules or directives that implicitly enforce certain capabilities, you run the risk of having false positives as it could match things that you didn't want them to. For instance, what if you have a situation where certain web clients (such as mobile devices) legitimately include some headers, however they are empty? Do you want to automatically block these clients? With the ModSecurity 1.x Rule Language, you would have to remove the entire rule. With the ModSecurity 2.x Rule Language, however, you are able to create rules to more accurately apply the logic that you desire.&lt;br /&gt;
&lt;br /&gt;
Please refer to the following blog post for more information.&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chaim Sanders&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Brian_Rectanus|Brian Rectanus]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
Nick Galbreath&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|left|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
== v3.0 Detection Concepts ==&lt;br /&gt;
This page documents the goals/ideas for the next major version of the CRS.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Detection Logic/Flow Concepts ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EH-3]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192777</id>
		<title>OWASP WASC Distributed Web Honeypots Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192777"/>
				<updated>2015-04-06T13:59:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Distributed Web Honeypots Project==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP WASC Distributed Web Honeypots Project is to identify emerging attacks against web applications and report them to the community including automated scanning activity, probes, as well as, targeted attacks against specific web apps.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The goal of the Distributed Web Honeypot (DWH) Project is to identify emerging attacks against web applications and report them to the community.  This may include automated scanning activity, probes, as well as, targeted attacks against specific web sites or applications.  The scope of this project has recently been expanded to include deployment of both standard web application honeypots and/or open proxy honeypots.  Project participants may choose whether they want to run their honeypot as an open proxy or a stand-alone sensor.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This project fills a need in the web application Defender's community to have detailed data about mass web application scanning attacks such as those being operated by Botnets.  This project will provide detailed data about attacks and their origins.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is free to use. It is licensed under the Apache 2.0 License.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP WASC Distributed Web Honeypots Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project provides:&lt;br /&gt;
&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
* [http://prezi.com/dvvv2gdpezzz/wasc-projects-overview/ Web Hacking Intelligence Gathering (Prezi)]&lt;br /&gt;
* [http://www.owasp.org/images/c/c5/OWASP-WASCAppSec2007SanJose_WASCOpenProxyHoneyPotUpdate.ppt Open Proxy Honeypot Project Update (2007)]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_distributed_web_honeypots_project Sign-up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_distributed_web_honeypots_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/OwaspHoneypots @OwaspHoneypots]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://projects.webappsec.org/w/file/fetch/94619066/Owasp-honeypot-v1.zip?force_download=1 Honeypot VMware Image (ZIP)]&lt;br /&gt;
* [http://projects.webappsec.org/w/file/fetch/94775630/Owasp-honeypot-v1-OVF.zip?force_download=1 Honeypot OVF Image (ZIP)] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [http://www.internetnews.com/security/article.php/3832131/WASC+Honeypot+Opens+Up+With+Open+Source.htm WASC Honeypot Opens Up With Open Source (InternetNews)]&lt;br /&gt;
* [http://news.techworld.com/security/10663/researchers-eye-open-proxy-attacks/ Researchers eye open-proxy attacks (TechWorld)]&lt;br /&gt;
* [http://www.infoworld.com/print/34304 Malware honeypots wait for '08 (InfoWorld)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= How to Participate =&lt;br /&gt;
There are two ways to participate:&lt;br /&gt;
&lt;br /&gt;
== Deploy a honeypot sensor ==&lt;br /&gt;
You can participate by deploying the Web Honyepot sensor on your own network. We has created a VMware image of the standard sensor. This image includes all of the software to quickly get your sensor up and running with little configuration on the end user's part. You must contact the project leader via email in order to participate. You will then receive the link location to download the VMware image.  You will need to have the free version of VMware player or Server.  If you would like to deploy a honeypot sensor, include the following details in your email to the project leader: &lt;br /&gt;
&lt;br /&gt;
* Sensor Point of Contact (POC) name&lt;br /&gt;
* Source IP address that the logs will be coming from&lt;br /&gt;
* Geographic location (Country, State, Locality)&lt;br /&gt;
* Network Block Owner&lt;br /&gt;
&lt;br /&gt;
The Project Leader will send back an email with instructions for downloading the VMware honeypot image data and the OS root credentials. The VMware host is configured with dhcp, so after you login, verify that the host has successfully obtained an IP address. The Project Leader will also provide you with the ModSecurity log agent credentials you will need to authenticate when sending your log data. ModSecurity uses a C program called mlogc located in the /usr/local/apache/conf/ directory. This program will take the data generated by the ModSecurity concurrent audit log and uses HTTP PUT requests to upload the individual audit_log files to the central console host. Each honeypot sensor will have a unique username/password combination. The file that you will need to update is /opt/wasc-honeypot/etc/mlogc.conf.  The final step is to start up the apache web server - /etc/init.d/wasc-honeypot-ctl.sh start. You should then review the log files to ensure that they everything is working properly. &lt;br /&gt;
&lt;br /&gt;
== Data analysis ==&lt;br /&gt;
Even if you do not deploy a honeypot sensor, we need help with data analysis for the capture traffic.  We will provide access to the ModSecurity AuditConsole web interface to all project participants.  The AuditConsole has built in searching and reporting functions that may be used for batch analysis.  We will provide all project participants with a reporting procedure so that we have a consistent process for vetting data prior to releasing to the public.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Are there any legal issues I should be concerned with?&lt;br /&gt;
: The short answer is '''yes''' - if you choose to run your honeypot as an open proxy server. There are some legal issues to be aware of in this type of honeypot setup where we will be capturing third party user information.  The Honeynet Project has excellent information on the challenges and issues surrounding due diligence in deploying honeypots/honeynets. Refer to this paper on Honeynets. In their book Know Your Enemy they have an entire chapter dedicated to Legal Issues.  It is this concern over increased risk why we expanded the project scope to allow for deployment of stand alone web sites instead of running it as an open proxy.&lt;br /&gt;
&lt;br /&gt;
; Should I run this on my production environment?&lt;br /&gt;
: That depends on your risk tolerance and whether or not you want to run the honeypot as an open proxy.  If your organization is willing to approve it, then the program itself is a virtual host and will run under any host that runs VMware.  We have many varied organizations participating ranging from universities, ISPs and government networks. &lt;br /&gt;
&lt;br /&gt;
; Can I run the sensor at home?&lt;br /&gt;
: Sure, many participants are running the sensors from their home network.  You shoud, however, consult your ISP's AUP info before deploying any web servers.  There may be conflicts with your ISP allowing inbound HTTP traffic however the honeypots are pre-configured to listen on common proxy ports including 8000, 8080 and 3128. &lt;br /&gt;
&lt;br /&gt;
; Should I announce the honeypot IP address on public lists?&lt;br /&gt;
: That is up to you however be aware that if the sensor IP address becomes posted to pubic open proxy lists that more than likely your sensor will become flooded with SPAMMER traffic.&lt;br /&gt;
&lt;br /&gt;
; What prerequisites do I need to participate?&lt;br /&gt;
: An understanding of ModSecurity functionality will help to understand the rules and logs being generated.  Review the following:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual ModSecurity Reference Manual]&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/ModSecurity-2-Data-Formats ModSecurity Audit Log Format]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Felipe Costa&lt;br /&gt;
* Chaim Sanders&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of April 2015, the priorities are:&lt;br /&gt;
&lt;br /&gt;
The main roadmap item is to solicit participants to deploy Sensors to collect data.&lt;br /&gt;
The main deliverables for this project are: 1) Real-world web attack data, 2) Real-time web attack data and 3) Technical details that can be leveraged by the OWASP Defenders community to help protect their websites. Think of this project as somewhat similar to the SANS Dshield project where the community correlates data and can also obtain reputation services for blocking IP addresses, etc...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Distributed_Web_Honeypots_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192501</id>
		<title>OWASP WASC Distributed Web Honeypots Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192501"/>
				<updated>2015-03-31T20:47:35Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Distributed Web Honeypots Project==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP WASC Distributed Web Honeypots Project is to identify emerging attacks against web applications and report them to the community including automated scanning activity, probes, as well as, targeted attacks against specific web apps.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The goal of the Distributed Web Honeypot (DWH) Project is to identify emerging attacks against web applications and report them to the community.  This may include automated scanning activity, probes, as well as, targeted attacks against specific web sites or applications.  The scope of this project has recently been expanded to include deployment of both standard web application honeypots and/or open proxy honeypots.  Project participants may choose whether they want to run their honeypot as an open proxy or a stand-alone sensor.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This project fills a need in the web application Defender's community to have detailed data about mass web application scanning attacks such as those being operated by Botnets.  This project will provide detailed data about attacks and their origins.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is free to use. It is licensed under the Apache 2.0 License.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP WASC Distributed Web Honeypots Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project provides:&lt;br /&gt;
&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
* [http://prezi.com/dvvv2gdpezzz/wasc-projects-overview/ Web Hacking Intelligence Gathering (Prezi)]&lt;br /&gt;
* [http://www.owasp.org/images/c/c5/OWASP-WASCAppSec2007SanJose_WASCOpenProxyHoneyPotUpdate.ppt Open Proxy Honeypot Project Update (2007)]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_distributed_web_honeypots_project Sign-up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_distributed_web_honeypots_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/OwaspHoneypots @OwaspHoneypots]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://projects.webappsec.org/w/file/fetch/94619066/Owasp-honeypot-v1.zip?force_download=1 Link to download Honeypot VM (ZIP)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [http://www.internetnews.com/security/article.php/3832131/WASC+Honeypot+Opens+Up+With+Open+Source.htm WASC Honeypot Opens Up With Open Source (InternetNews)]&lt;br /&gt;
* [http://news.techworld.com/security/10663/researchers-eye-open-proxy-attacks/ Researchers eye open-proxy attacks (TechWorld)]&lt;br /&gt;
* [http://www.infoworld.com/print/34304 Malware honeypots wait for '08 (InfoWorld)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= How to Participate =&lt;br /&gt;
There are two ways to participate:&lt;br /&gt;
&lt;br /&gt;
== Deploy a honeypot sensor ==&lt;br /&gt;
You can participate by deploying the Web Honyepot sensor on your own network. We has created a VMware image of the standard sensor. This image includes all of the software to quickly get your sensor up and running with little configuration on the end user's part. You must contact the project leader via email in order to participate. You will then receive the link location to download the VMware image.  You will need to have the free version of VMware player or Server.  If you would like to deploy a honeypot sensor, include the following details in your email to the project leader: &lt;br /&gt;
&lt;br /&gt;
* Sensor Point of Contact (POC) name&lt;br /&gt;
* Source IP address that the logs will be coming from&lt;br /&gt;
* Geographic location (Country, State, Locality)&lt;br /&gt;
* Network Block Owner&lt;br /&gt;
&lt;br /&gt;
The Project Leader will send back an email with instructions for downloading the VMware honeypot image data and the OS root credentials. The VMware host is configured with dhcp, so after you login, verify that the host has successfully obtained an IP address. The Project Leader will also provide you with the ModSecurity log agent credentials you will need to authenticate when sending your log data. ModSecurity uses a C program called mlogc located in the /usr/local/apache/conf/ directory. This program will take the data generated by the ModSecurity concurrent audit log and uses HTTP PUT requests to upload the individual audit_log files to the central console host. Each honeypot sensor will have a unique username/password combination. The file that you will need to update is /opt/wasc-honeypot/etc/mlogc.conf.  The final step is to start up the apache web server - /etc/init.d/wasc-honeypot-ctl.sh start. You should then review the log files to ensure that they everything is working properly. &lt;br /&gt;
&lt;br /&gt;
== Data analysis ==&lt;br /&gt;
Even if you do not deploy a honeypot sensor, we need help with data analysis for the capture traffic.  We will provide access to the ModSecurity AuditConsole web interface to all project participants.  The AuditConsole has built in searching and reporting functions that may be used for batch analysis.  We will provide all project participants with a reporting procedure so that we have a consistent process for vetting data prior to releasing to the public.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Are there any legal issues I should be concerned with?&lt;br /&gt;
: The short answer is '''yes''' - if you choose to run your honeypot as an open proxy server. There are some legal issues to be aware of in this type of honeypot setup where we will be capturing third party user information.  The Honeynet Project has excellent information on the challenges and issues surrounding due diligence in deploying honeypots/honeynets. Refer to this paper on Honeynets. In their book Know Your Enemy they have an entire chapter dedicated to Legal Issues.  It is this concern over increased risk why we expanded the project scope to allow for deployment of stand alone web sites instead of running it as an open proxy.&lt;br /&gt;
&lt;br /&gt;
; Should I run this on my production environment?&lt;br /&gt;
: That depends on your risk tolerance and whether or not you want to run the honeypot as an open proxy.  If your organization is willing to approve it, then the program itself is a virtual host and will run under any host that runs VMware.  We have many varied organizations participating ranging from universities, ISPs and government networks. &lt;br /&gt;
&lt;br /&gt;
; Can I run the sensor at home?&lt;br /&gt;
: Sure, many participants are running the sensors from their home network.  You shoud, however, consult your ISP's AUP info before deploying any web servers.  There may be conflicts with your ISP allowing inbound HTTP traffic however the honeypots are pre-configured to listen on common proxy ports including 8000, 8080 and 3128. &lt;br /&gt;
&lt;br /&gt;
; Should I announce the honeypot IP address on public lists?&lt;br /&gt;
: That is up to you however be aware that if the sensor IP address becomes posted to pubic open proxy lists that more than likely your sensor will become flooded with SPAMMER traffic.&lt;br /&gt;
&lt;br /&gt;
; What prerequisites do I need to participate?&lt;br /&gt;
: An understanding of ModSecurity functionality will help to understand the rules and logs being generated.  Review the following:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual ModSecurity Reference Manual]&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/ModSecurity-2-Data-Formats ModSecurity Audit Log Format]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Felipe Costa&lt;br /&gt;
* Chaim Sanders&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of April 2015, the priorities are:&lt;br /&gt;
&lt;br /&gt;
The main roadmap item is to solicit participants to deploy Sensors to collect data.&lt;br /&gt;
The main deliverables for this project are: 1) Real-world web attack data, 2) Real-time web attack data and 3) Technical details that can be leveraged by the OWASP Defenders community to help protect their websites. Think of this project as somewhat similar to the SANS Dshield project where the community correlates data and can also obtain reputation services for blocking IP addresses, etc...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Distributed_Web_Honeypots_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192500</id>
		<title>OWASP WASC Distributed Web Honeypots Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192500"/>
				<updated>2015-03-31T20:46:06Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Distributed Web Honeypots Project==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP WASC Distributed Web Honeypots Project is to identify emerging attacks against web applications and report them to the community including automated scanning activity, probes, as well as, targeted attacks against specific web apps.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The goal of the Distributed Web Honeypot (DWH) Project is to identify emerging attacks against web applications and report them to the community.  This may include automated scanning activity, probes, as well as, targeted attacks against specific web sites or applications.  The scope of this project has recently been expanded to include deployment of both standard web application honeypots and/or open proxy honeypots.  Project participants may choose whether they want to run their honeypot as an open proxy or a stand-alone sensor.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This project fills a need in the web application Defender's community to have detailed data about mass web application scanning attacks such as those being operated by Botnets.  This project will provide detailed data about attacks and their origins.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is free to use. It is licensed under the Apache 2.0 License.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP WASC Distributed Web Honeypots Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project provides:&lt;br /&gt;
&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
* [http://prezi.com/dvvv2gdpezzz/wasc-projects-overview/ Web Hacking Intelligence Gathering (Prezi)]&lt;br /&gt;
* [http://www.owasp.org/images/c/c5/OWASP-WASCAppSec2007SanJose_WASCOpenProxyHoneyPotUpdate.ppt Open Proxy Honeypot Project Update (2007)]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* Ryan Barnett&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_distributed_web_honeypots_project Sign-up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_distributed_web_honeypots_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/OwaspHoneypots @OwaspHoneypots]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://projects.webappsec.org/w/file/fetch/94619066/Owasp-honeypot-v1.zip?force_download=1 Link to download Honeypot VM (ZIP)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [http://www.internetnews.com/security/article.php/3832131/WASC+Honeypot+Opens+Up+With+Open+Source.htm WASC Honeypot Opens Up With Open Source (InternetNews)]&lt;br /&gt;
* [http://news.techworld.com/security/10663/researchers-eye-open-proxy-attacks/ Researchers eye open-proxy attacks (TechWorld)]&lt;br /&gt;
* [http://www.infoworld.com/print/34304 Malware honeypots wait for '08 (InfoWorld)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= How to Participate =&lt;br /&gt;
There are two ways to participate:&lt;br /&gt;
&lt;br /&gt;
== Deploy a honeypot sensor ==&lt;br /&gt;
You can participate by deploying the Web Honyepot sensor on your own network. We has created a VMware image of the standard sensor. This image includes all of the software to quickly get your sensor up and running with little configuration on the end user's part. You must contact the project leader via email in order to participate. You will then receive the link location to download the VMware image.  You will need to have the free version of VMware player or Server.  If you would like to deploy a honeypot sensor, include the following details in your email to the project leader: &lt;br /&gt;
&lt;br /&gt;
* Sensor Point of Contact (POC) name&lt;br /&gt;
* Source IP address that the logs will be coming from&lt;br /&gt;
* Geographic location (Country, State, Locality)&lt;br /&gt;
* Network Block Owner&lt;br /&gt;
&lt;br /&gt;
The Project Leader will send back an email with instructions for downloading the VMware honeypot image data and the OS root credentials. The VMware host is configured with dhcp, so after you login, verify that the host has successfully obtained an IP address. The Project Leader will also provide you with the ModSecurity log agent credentials you will need to authenticate when sending your log data. ModSecurity uses a C program called mlogc located in the /usr/local/apache/conf/ directory. This program will take the data generated by the ModSecurity concurrent audit log and uses HTTP PUT requests to upload the individual audit_log files to the central console host. Each honeypot sensor will have a unique username/password combination. The file that you will need to update is /opt/wasc-honeypot/etc/mlogc.conf.  The final step is to start up the apache web server - /etc/init.d/wasc-honeypot-ctl.sh start. You should then review the log files to ensure that they everything is working properly. &lt;br /&gt;
&lt;br /&gt;
== Data analysis ==&lt;br /&gt;
Even if you do not deploy a honeypot sensor, we need help with data analysis for the capture traffic.  We will provide access to the ModSecurity AuditConsole web interface to all project participants.  The AuditConsole has built in searching and reporting functions that may be used for batch analysis.  We will provide all project participants with a reporting procedure so that we have a consistent process for vetting data prior to releasing to the public.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Are there any legal issues I should be concerned with?&lt;br /&gt;
: The short answer is '''yes''' - if you choose to run your honeypot as an open proxy server. There are some legal issues to be aware of in this type of honeypot setup where we will be capturing third party user information.  The Honeynet Project has excellent information on the challenges and issues surrounding due diligence in deploying honeypots/honeynets. Refer to this paper on Honeynets. In their book Know Your Enemy they have an entire chapter dedicated to Legal Issues.  It is this concern over increased risk why we expanded the project scope to allow for deployment of stand alone web sites instead of running it as an open proxy.&lt;br /&gt;
&lt;br /&gt;
; Should I run this on my production environment?&lt;br /&gt;
: That depends on your risk tolerance and whether or not you want to run the honeypot as an open proxy.  If your organization is willing to approve it, then the program itself is a virtual host and will run under any host that runs VMware.  We have many varied organizations participating ranging from universities, ISPs and government networks. &lt;br /&gt;
&lt;br /&gt;
; Can I run the sensor at home?&lt;br /&gt;
: Sure, many participants are running the sensors from their home network.  You shoud, however, consult your ISP's AUP info before deploying any web servers.  There may be conflicts with your ISP allowing inbound HTTP traffic however the honeypots are pre-configured to listen on common proxy ports including 8000, 8080 and 3128. &lt;br /&gt;
&lt;br /&gt;
; Should I announce the honeypot IP address on public lists?&lt;br /&gt;
: That is up to you however be aware that if the sensor IP address becomes posted to pubic open proxy lists that more than likely your sensor will become flooded with SPAMMER traffic.&lt;br /&gt;
&lt;br /&gt;
; What prerequisites do I need to participate?&lt;br /&gt;
: An understanding of ModSecurity functionality will help to understand the rules and logs being generated.  Review the following:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual ModSecurity Reference Manual]&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/ModSecurity-2-Data-Formats ModSecurity Audit Log Format]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Felipe Costa&lt;br /&gt;
* Chaim Sanders&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of April 2015, the priorities are:&lt;br /&gt;
&lt;br /&gt;
The main roadmap item is to solicit participants to deploy Sensors to collect data.&lt;br /&gt;
The main deliverables for this project are: 1) Real-world web attack data, 2) Real-time web attack data and 3) Technical details that can be leveraged by the OWASP Defenders community to help protect their websites. Think of this project as somewhat similar to the SANS Dshield project where the community correlates data and can also obtain reputation services for blocking IP addresses, etc...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Distributed_Web_Honeypots_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192499</id>
		<title>OWASP WASC Distributed Web Honeypots Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192499"/>
				<updated>2015-03-31T20:45:34Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Distributed Web Honeypots Project==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP WASC Distributed Web Honeypots Project is to identify emerging attacks against web applications and report them to the community including automated scanning activity, probes, as well as, targeted attacks against specific web apps.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The goal of the Distributed Web Honeypot (DWH) Project is to identify emerging attacks against web applications and report them to the community.  This may include automated scanning activity, probes, as well as, targeted attacks against specific web sites or applications.  The scope of this project has recently been expanded to include deployment of both standard web application honeypots and/or open proxy honeypots.  Project participants may choose whether they want to run their honeypot as an open proxy or a stand-alone sensor.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This project fills a need in the web application Defender's community to have detailed data about mass web application scanning attacks such as those being operated by Botnets.  This project will provide detailed data about attacks and their origins.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is free to use. It is licensed under the Apache 2.0 License.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP WASC Distributed Web Honeypots Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project provides:&lt;br /&gt;
&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
* [http://prezi.com/dvvv2gdpezzz/wasc-projects-overview/ Web Hacking Intelligence Gathering (Prezi)]&lt;br /&gt;
* [http://www.owasp.org/images/c/c5/OWASP-WASCAppSec2007SanJose_WASCOpenProxyHoneyPotUpdate.ppt Open Proxy Honeypot Project Update (2007)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Ryan Barnett&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_distributed_web_honeypots_project Sign-up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_distributed_web_honeypots_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/OwaspHoneypots @OwaspHoneypots]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://projects.webappsec.org/w/file/fetch/94619066/Owasp-honeypot-v1.zip?force_download=1 Link to download Honeypot VM (ZIP)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [http://www.internetnews.com/security/article.php/3832131/WASC+Honeypot+Opens+Up+With+Open+Source.htm WASC Honeypot Opens Up With Open Source (InternetNews)]&lt;br /&gt;
* [http://news.techworld.com/security/10663/researchers-eye-open-proxy-attacks/ Researchers eye open-proxy attacks (TechWorld)]&lt;br /&gt;
* [http://www.infoworld.com/print/34304 Malware honeypots wait for '08 (InfoWorld)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= How to Participate =&lt;br /&gt;
There are two ways to participate:&lt;br /&gt;
&lt;br /&gt;
== Deploy a honeypot sensor ==&lt;br /&gt;
You can participate by deploying the Web Honyepot sensor on your own network. We has created a VMware image of the standard sensor. This image includes all of the software to quickly get your sensor up and running with little configuration on the end user's part. You must contact the project leader via email in order to participate. You will then receive the link location to download the VMware image.  You will need to have the free version of VMware player or Server.  If you would like to deploy a honeypot sensor, include the following details in your email to the project leader: &lt;br /&gt;
&lt;br /&gt;
* Sensor Point of Contact (POC) name&lt;br /&gt;
* Source IP address that the logs will be coming from&lt;br /&gt;
* Geographic location (Country, State, Locality)&lt;br /&gt;
* Network Block Owner&lt;br /&gt;
&lt;br /&gt;
The Project Leader will send back an email with instructions for downloading the VMware honeypot image data and the OS root credentials. The VMware host is configured with dhcp, so after you login, verify that the host has successfully obtained an IP address. The Project Leader will also provide you with the ModSecurity log agent credentials you will need to authenticate when sending your log data. ModSecurity uses a C program called mlogc located in the /usr/local/apache/conf/ directory. This program will take the data generated by the ModSecurity concurrent audit log and uses HTTP PUT requests to upload the individual audit_log files to the central console host. Each honeypot sensor will have a unique username/password combination. The file that you will need to update is /opt/wasc-honeypot/etc/mlogc.conf.  The final step is to start up the apache web server - /etc/init.d/wasc-honeypot-ctl.sh start. You should then review the log files to ensure that they everything is working properly. &lt;br /&gt;
&lt;br /&gt;
== Data analysis ==&lt;br /&gt;
Even if you do not deploy a honeypot sensor, we need help with data analysis for the capture traffic.  We will provide access to the ModSecurity AuditConsole web interface to all project participants.  The AuditConsole has built in searching and reporting functions that may be used for batch analysis.  We will provide all project participants with a reporting procedure so that we have a consistent process for vetting data prior to releasing to the public.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Are there any legal issues I should be concerned with?&lt;br /&gt;
: The short answer is '''yes''' - if you choose to run your honeypot as an open proxy server. There are some legal issues to be aware of in this type of honeypot setup where we will be capturing third party user information.  The Honeynet Project has excellent information on the challenges and issues surrounding due diligence in deploying honeypots/honeynets. Refer to this paper on Honeynets. In their book Know Your Enemy they have an entire chapter dedicated to Legal Issues.  It is this concern over increased risk why we expanded the project scope to allow for deployment of stand alone web sites instead of running it as an open proxy.&lt;br /&gt;
&lt;br /&gt;
; Should I run this on my production environment?&lt;br /&gt;
: That depends on your risk tolerance and whether or not you want to run the honeypot as an open proxy.  If your organization is willing to approve it, then the program itself is a virtual host and will run under any host that runs VMware.  We have many varied organizations participating ranging from universities, ISPs and government networks. &lt;br /&gt;
&lt;br /&gt;
; Can I run the sensor at home?&lt;br /&gt;
: Sure, many participants are running the sensors from their home network.  You shoud, however, consult your ISP's AUP info before deploying any web servers.  There may be conflicts with your ISP allowing inbound HTTP traffic however the honeypots are pre-configured to listen on common proxy ports including 8000, 8080 and 3128. &lt;br /&gt;
&lt;br /&gt;
; Should I announce the honeypot IP address on public lists?&lt;br /&gt;
: That is up to you however be aware that if the sensor IP address becomes posted to pubic open proxy lists that more than likely your sensor will become flooded with SPAMMER traffic.&lt;br /&gt;
&lt;br /&gt;
; What prerequisites do I need to participate?&lt;br /&gt;
: An understanding of ModSecurity functionality will help to understand the rules and logs being generated.  Review the following:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual ModSecurity Reference Manual]&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/ModSecurity-2-Data-Formats ModSecurity Audit Log Format]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Felipe Costa&lt;br /&gt;
* Chaim Sanders&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of April 2015, the priorities are:&lt;br /&gt;
&lt;br /&gt;
The main roadmap item is to solicit participants to deploy Sensors to collect data.&lt;br /&gt;
The main deliverables for this project are: 1) Real-world web attack data, 2) Real-time web attack data and 3) Technical details that can be leveraged by the OWASP Defenders community to help protect their websites. Think of this project as somewhat similar to the SANS Dshield project where the community correlates data and can also obtain reputation services for blocking IP addresses, etc...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Distributed_Web_Honeypots_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192492</id>
		<title>OWASP WASC Distributed Web Honeypots Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192492"/>
				<updated>2015-03-31T19:51:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Distributed Web Honeypots Project==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP WASC Distributed Web Honeypots Project is to identify emerging attacks against web applications and report them to the community including automated scanning activity, probes, as well as, targeted attacks against specific web apps.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The goal of the Distributed Web Honeypot (DWH) Project is to identify emerging attacks against web applications and report them to the community.  This may include automated scanning activity, probes, as well as, targeted attacks against specific web sites or applications.  The scope of this project has recently been expanded to include deployment of both standard web application honeypots and/or open proxy honeypots.  Project participants may choose whether they want to run their honeypot as an open proxy or a stand-alone sensor.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This project fills a need in the web application Defender's community to have detailed data about mass web application scanning attacks such as those being operated by Botnets.  This project will provide detailed data about attacks and their origins.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is free to use. It is licensed under the Apache 2.0 License.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP WASC Distributed Web Honeypots Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project provides:&lt;br /&gt;
&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
* [http://prezi.com/dvvv2gdpezzz/wasc-projects-overview/ Web Hacking Intelligence Gathering (Prezi)]&lt;br /&gt;
* [http://www.owasp.org/images/c/c5/OWASP-WASCAppSec2007SanJose_WASCOpenProxyHoneyPotUpdate.ppt Open Proxy Honeypot Project Update (2007)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Ryan Barnett&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_distributed_web_honeypots_project Sign-up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_distributed_web_honeypots_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://projects.webappsec.org/w/file/fetch/94619066/Owasp-honeypot-v1.zip?force_download=1 Link to download Honeypot VM (ZIP)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [http://www.internetnews.com/security/article.php/3832131/WASC+Honeypot+Opens+Up+With+Open+Source.htm WASC Honeypot Opens Up With Open Source (InternetNews)]&lt;br /&gt;
* [http://news.techworld.com/security/10663/researchers-eye-open-proxy-attacks/ Researchers eye open-proxy attacks (TechWorld)]&lt;br /&gt;
* [http://www.infoworld.com/print/34304 Malware honeypots wait for '08 (InfoWorld)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= How to Participate =&lt;br /&gt;
There are two ways to participate:&lt;br /&gt;
&lt;br /&gt;
== Deploy a honeypot sensor ==&lt;br /&gt;
You can participate by deploying the Web Honyepot sensor on your own network. We has created a VMware image of the standard sensor. This image includes all of the software to quickly get your sensor up and running with little configuration on the end user's part. You must contact the project leader via email in order to participate. You will then receive the link location to download the VMware image.  You will need to have the free version of VMware player or Server.  If you would like to deploy a honeypot sensor, include the following details in your email to the project leader: &lt;br /&gt;
&lt;br /&gt;
* Sensor Point of Contact (POC) name&lt;br /&gt;
* Source IP address that the logs will be coming from&lt;br /&gt;
* Geographic location (Country, State, Locality)&lt;br /&gt;
* Network Block Owner&lt;br /&gt;
&lt;br /&gt;
The Project Leader will send back an email with instructions for downloading the VMware honeypot image data and the OS root credentials. The VMware host is configured with dhcp, so after you login, verify that the host has successfully obtained an IP address. The Project Leader will also provide you with the ModSecurity log agent credentials you will need to authenticate when sending your log data. ModSecurity uses a C program called mlogc located in the /usr/local/apache/conf/ directory. This program will take the data generated by the ModSecurity concurrent audit log and uses HTTP PUT requests to upload the individual audit_log files to the central console host. Each honeypot sensor will have a unique username/password combination. The file that you will need to update is /opt/wasc-honeypot/etc/mlogc.conf.  The final step is to start up the apache web server - /etc/init.d/wasc-honeypot-ctl.sh start. You should then review the log files to ensure that they everything is working properly. &lt;br /&gt;
&lt;br /&gt;
== Data analysis ==&lt;br /&gt;
Even if you do not deploy a honeypot sensor, we need help with data analysis for the capture traffic.  We will provide access to the ModSecurity AuditConsole web interface to all project participants.  The AuditConsole has built in searching and reporting functions that may be used for batch analysis.  We will provide all project participants with a reporting procedure so that we have a consistent process for vetting data prior to releasing to the public.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Are there any legal issues I should be concerned with?&lt;br /&gt;
: The short answer is '''yes''' - if you choose to run your honeypot as an open proxy server. There are some legal issues to be aware of in this type of honeypot setup where we will be capturing third party user information.  The Honeynet Project has excellent information on the challenges and issues surrounding due diligence in deploying honeypots/honeynets. Refer to this paper on Honeynets. In their book Know Your Enemy they have an entire chapter dedicated to Legal Issues.  It is this concern over increased risk why we expanded the project scope to allow for deployment of stand alone web sites instead of running it as an open proxy.&lt;br /&gt;
&lt;br /&gt;
; Should I run this on my production environment?&lt;br /&gt;
: That depends on your risk tolerance and whether or not you want to run the honeypot as an open proxy.  If your organization is willing to approve it, then the program itself is a virtual host and will run under any host that runs VMware.  We have many varied organizations participating ranging from universities, ISPs and government networks. &lt;br /&gt;
&lt;br /&gt;
; Can I run the sensor at home?&lt;br /&gt;
: Sure, many participants are running the sensors from their home network.  You shoud, however, consult your ISP's AUP info before deploying any web servers.  There may be conflicts with your ISP allowing inbound HTTP traffic however the honeypots are pre-configured to listen on common proxy ports including 8000, 8080 and 3128. &lt;br /&gt;
&lt;br /&gt;
; Should I announce the honeypot IP address on public lists?&lt;br /&gt;
: That is up to you however be aware that if the sensor IP address becomes posted to pubic open proxy lists that more than likely your sensor will become flooded with SPAMMER traffic.&lt;br /&gt;
&lt;br /&gt;
; What prerequisites do I need to participate?&lt;br /&gt;
: An understanding of ModSecurity functionality will help to understand the rules and logs being generated.  Review the following:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual ModSecurity Reference Manual]&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/ModSecurity-2-Data-Formats ModSecurity Audit Log Format]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Felipe Costa&lt;br /&gt;
* Chaim Sanders&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of April 2015, the priorities are:&lt;br /&gt;
&lt;br /&gt;
The main roadmap item is to solicit participants to deploy Sensors to collect data.&lt;br /&gt;
The main deliverables for this project are: 1) Real-world web attack data, 2) Real-time web attack data and 3) Technical details that can be leveraged by the OWASP Defenders community to help protect their websites. Think of this project as somewhat similar to the SANS Dshield project where the community correlates data and can also obtain reputation services for blocking IP addresses, etc...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Distributed_Web_Honeypots_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192491</id>
		<title>OWASP WASC Distributed Web Honeypots Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=192491"/>
				<updated>2015-03-31T19:49:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Distributed Web Honeypots Project==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP WASC Distributed Web Honeypots Project is to identify emerging attacks against web applications and report them to the community including automated scanning activity, probes, as well as, targeted attacks against specific web apps.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The goal of the Distributed Web Honeypot (DWH) Project is to identify emerging attacks against web applications and report them to the community.  This may include automated scanning activity, probes, as well as, targeted attacks against specific web sites or applications.  The scope of this project has recently been expanded to include deployment of both standard web application honeypots and/or open proxy honeypots.  Project participants may choose whether they want to run their honeypot as an open proxy or a stand-alone sensor.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This project fills a need in the web application Defender's community to have detailed data about mass web application scanning attacks such as those being operated by Botnets.  This project will provide detailed data about attacks and their origins.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is free to use. It is licensed under the Apache 2.0 License.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP WASC Distributed Web Honeypots Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project provides:&lt;br /&gt;
&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
* [http://prezi.com/dvvv2gdpezzz/wasc-projects-overview/ Web Hacking Intelligence Gathering (Prezi)]&lt;br /&gt;
* [http://www.owasp.org/images/c/c5/OWASP-WASCAppSec2007SanJose_WASCOpenProxyHoneyPotUpdate.ppt Open Proxy Honeypot Project Update (2007)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Ryan Barnett&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_distributed_web_honeypots_project Sign-up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_distributed_web_honeypots_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [http://www.internetnews.com/security/article.php/3832131/WASC+Honeypot+Opens+Up+With+Open+Source.htm WASC Honeypot Opens Up With Open Source (InternetNews)]&lt;br /&gt;
* [http://news.techworld.com/security/10663/researchers-eye-open-proxy-attacks/ Researchers eye open-proxy attacks (TechWorld)]&lt;br /&gt;
* [http://www.infoworld.com/print/34304 Malware honeypots wait for '08 (InfoWorld)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= How to Participate =&lt;br /&gt;
There are two ways to participate:&lt;br /&gt;
&lt;br /&gt;
== Deploy a honeypot sensor ==&lt;br /&gt;
You can participate by deploying the Web Honyepot sensor on your own network. We has created a VMware image of the standard sensor. This image includes all of the software to quickly get your sensor up and running with little configuration on the end user's part. You must contact the project leader via email in order to participate. You will then receive the link location to download the VMware image.  You will need to have the free version of VMware player or Server.  If you would like to deploy a honeypot sensor, include the following details in your email to the project leader: &lt;br /&gt;
&lt;br /&gt;
* Sensor Point of Contact (POC) name&lt;br /&gt;
* Source IP address that the logs will be coming from&lt;br /&gt;
* Geographic location (Country, State, Locality)&lt;br /&gt;
* Network Block Owner&lt;br /&gt;
&lt;br /&gt;
The Project Leader will send back an email with instructions for downloading the VMware honeypot image data and the OS root credentials. The VMware host is configured with dhcp, so after you login, verify that the host has successfully obtained an IP address. The Project Leader will also provide you with the ModSecurity log agent credentials you will need to authenticate when sending your log data. ModSecurity uses a C program called mlogc located in the /usr/local/apache/conf/ directory. This program will take the data generated by the ModSecurity concurrent audit log and uses HTTP PUT requests to upload the individual audit_log files to the central console host. Each honeypot sensor will have a unique username/password combination. The file that you will need to update is /opt/wasc-honeypot/etc/mlogc.conf.  The final step is to start up the apache web server - /etc/init.d/wasc-honeypot-ctl.sh start. You should then review the log files to ensure that they everything is working properly. &lt;br /&gt;
&lt;br /&gt;
== Data analysis ==&lt;br /&gt;
Even if you do not deploy a honeypot sensor, we need help with data analysis for the capture traffic.  We will provide access to the ModSecurity AuditConsole web interface to all project participants.  The AuditConsole has built in searching and reporting functions that may be used for batch analysis.  We will provide all project participants with a reporting procedure so that we have a consistent process for vetting data prior to releasing to the public.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Are there any legal issues I should be concerned with?&lt;br /&gt;
: The short answer is '''yes''' - if you choose to run your honeypot as an open proxy server. There are some legal issues to be aware of in this type of honeypot setup where we will be capturing third party user information.  The Honeynet Project has excellent information on the challenges and issues surrounding due diligence in deploying honeypots/honeynets. Refer to this paper on Honeynets. In their book Know Your Enemy they have an entire chapter dedicated to Legal Issues.  It is this concern over increased risk why we expanded the project scope to allow for deployment of stand alone web sites instead of running it as an open proxy.&lt;br /&gt;
&lt;br /&gt;
; Should I run this on my production environment?&lt;br /&gt;
: That depends on your risk tolerance and whether or not you want to run the honeypot as an open proxy.  If your organization is willing to approve it, then the program itself is a virtual host and will run under any host that runs VMware.  We have many varied organizations participating ranging from universities, ISPs and government networks. &lt;br /&gt;
&lt;br /&gt;
; Can I run the sensor at home?&lt;br /&gt;
: Sure, many participants are running the sensors from their home network.  You shoud, however, consult your ISP's AUP info before deploying any web servers.  There may be conflicts with your ISP allowing inbound HTTP traffic however the honeypots are pre-configured to listen on common proxy ports including 8000, 8080 and 3128. &lt;br /&gt;
&lt;br /&gt;
; Should I announce the honeypot IP address on public lists?&lt;br /&gt;
: That is up to you however be aware that if the sensor IP address becomes posted to pubic open proxy lists that more than likely your sensor will become flooded with SPAMMER traffic.&lt;br /&gt;
&lt;br /&gt;
; What prerequisites do I need to participate?&lt;br /&gt;
: An understanding of ModSecurity functionality will help to understand the rules and logs being generated.  Review the following:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual ModSecurity Reference Manual]&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/ModSecurity-2-Data-Formats ModSecurity Audit Log Format]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Felipe Costa&lt;br /&gt;
* Chaim Sanders&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of April 2015, the priorities are:&lt;br /&gt;
&lt;br /&gt;
The main roadmap item is to solicit participants to deploy Sensors to collect data.&lt;br /&gt;
The main deliverables for this project are: 1) Real-world web attack data, 2) Real-time web attack data and 3) Technical details that can be leveraged by the OWASP Defenders community to help protect their websites. Think of this project as somewhat similar to the SANS Dshield project where the community correlates data and can also obtain reputation services for blocking IP addresses, etc...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Distributed_Web_Honeypots_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=192466</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=192466"/>
				<updated>2015-03-31T13:52:55Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Open HUB==&lt;br /&gt;
https://www.openhub.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== Who Leads the ModSecurity Project? ==&lt;br /&gt;
ModSecurity is supported by Trustwave's SpiderLabs Team [https://www.trustwave.com/spiderLabs.php] and includes the following team members:&lt;br /&gt;
*Ryan Barnett - ModSecurity Project Lead and OWASP ModSecurity Core Rule Set Project Lead&lt;br /&gt;
*Felipe Zimmerle Costa - ModSecurity Lead Developer&lt;br /&gt;
&lt;br /&gt;
Suggestions for enhancements of this document are always welcome. Please email them to the Mod-Security-Users mailing list [http://lists.sourceforge.net/lists/listinfo/mod-security-users].&lt;br /&gt;
&lt;br /&gt;
== Background and Support ==&lt;br /&gt;
&lt;br /&gt;
=== What exactly is ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
ModSecurity™is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks before they reach web applications. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Where do I get more help on ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The ModSecurity website is the definitive location for all information - http://www.modsecurity.org/help.html. &lt;br /&gt;
&lt;br /&gt;
==== Open Source/Free Help ====&lt;br /&gt;
*ModSecurity Users Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-users&lt;br /&gt;
*ModSecurity Developers Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-developers&lt;br /&gt;
*OWASP ModSecurity Core Rules Mail-list (OWASP) - https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set &lt;br /&gt;
*You can also join the #modsecurity channel on irc.freenode.net.&lt;br /&gt;
==== Commercial Help ====&lt;br /&gt;
*Commercial Support through Trustwave's Technical Assistance Center (TAC) - https://www3.trustwave.com/modsecurity-rules-support.php&lt;br /&gt;
*Professional Services offer by Trustwave SpiderLabs Research Team&lt;br /&gt;
*ModSecurity Training&lt;br /&gt;
&lt;br /&gt;
=== Do I need to sign up for the Mod-User Mail-list before I can send emails? ===&lt;br /&gt;
&lt;br /&gt;
Yes, only subscribers are able to post messages. As mentioned in the previous section, you will need to visit the mail-list website to register.&lt;br /&gt;
&lt;br /&gt;
=== Is there anything that I should do prior to sending emails to the mail-list? ===&lt;br /&gt;
&lt;br /&gt;
Yes. There is a good chance that the issue you are facing has already been discussed and, most likely, a fix has already been presented. You can review the mail-list archive online at the ModSecurity project site on SourceForge. You can also use the Search interface available for topic threads that are archived to the various mirror sites. For example, if you had a question about Exceptions and ModSecurity, you could use the following search to find past mail-list threads on this topic. If you can not find an answer to your question after doing some research, you should then send an email to the mod-security-users mail-list.&lt;br /&gt;
&lt;br /&gt;
=== Will I always get an immediate answer to my question on the open source mod-security-users mail-list? ===&lt;br /&gt;
&lt;br /&gt;
The open source mod-security-users mail-list is &amp;quot;best effort&amp;quot; support meaning that we will aspire to respond to emails as quickly as possible however the actual response time may vary depending on factors such as time of day, time of week and complexity of the question. If your email is sent on the week-end or if your question involves setting up test systems, unique configurations or interactions with a custom application then it may take some time to respond.&lt;br /&gt;
&lt;br /&gt;
=== If I don't get an immediate response, should I send an email to the Trustwave Technical Support email address? ===&lt;br /&gt;
&lt;br /&gt;
No. The Trustwave Technical Support email address is for commercial ModSecurity customers only.&lt;br /&gt;
&lt;br /&gt;
=== Where can I find books about Web Application Firewalls and ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity Handbook ====&lt;br /&gt;
ModSecurity Handbook is &amp;quot;The definitive guide to the popular open source web application firewall&amp;quot;, written by Ivan Ristic (original author of ModSecurity). The book is available from Feisty Duck in hard copy or with immediate access to the digital version which is continually updated.&lt;br /&gt;
&lt;br /&gt;
==== Web Application Defender's Cookbook: Battling Hackers and Defending Users ====&lt;br /&gt;
The Web Application Defender's Cookbook: Battling Hackers and Protecting Users is a book written by the ModSecurity Project Lead and OWASP ModSecurity Project Lead Ryan Barnett. The book outlines critical defensive techniques to protect web applications and includes example ModSecurity rules/scripts.&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity 2.5 ====&lt;br /&gt;
ModSecurity 2.5 is &amp;quot;A complete guide to using ModSecurity&amp;quot;, written by Magnus Mischel. The book is available from Packt Publishing in both hard copy and digital forms.&lt;br /&gt;
&lt;br /&gt;
==== Apache Security ====&lt;br /&gt;
Apache Security is a comprehensive Apache Security resource, written by Ivan Ristic for O'Reilly. Two chapters (Apache Installation and Configuration and PHP) are available as free download, as are the Apache security tools created for the book.&lt;br /&gt;
&lt;br /&gt;
==== Preventing Web Attacks with Apache ====&lt;br /&gt;
Preventing Web Attacks with Apache. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against.&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
=== What type(s) of security models does ModSecurity support? ===&lt;br /&gt;
&lt;br /&gt;
There is a common misconception that ModSecurity can only be used for negative policy enforcement. This is not the case. ModSecurity does not have any default security model &amp;quot;out-of-the-box.&amp;quot; It is up to the user to implement appropriate rules to achieve the desired security model. That being said, these are the security models which are most often employed:&lt;br /&gt;
&lt;br /&gt;
*Negative Security Model - looks for known bad, malicious requests. This method is effective at blocking a large number of automated attacks, however it is not the best approach for identifying new attack vectors. Using too many negative rules may also negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
*Positive Security Model - When positive security model is deployed, only requests that are known to be valid are accepted, with everything else rejected. This approach works best with applications that are heavily used but rarely updated.&lt;br /&gt;
&lt;br /&gt;
*Virtual Patching - Its rule language makes ModSecurity an ideal external patching tool. External patching is all about reducing the window of opportunity. Time needed to patch application vulnerabilities often runs to weeks in many organizations. With ModSecurity, applications can be patched from the outside, without touching the application source code (and even without any access to it), making your systems secure until a proper patch is produced.&lt;br /&gt;
&lt;br /&gt;
*Extrusion Detection Model - ModSecurity can also monitor outbound data and identify and block information disclosure issues such as leaking detailed error messages or Social Security Numbers or Credit Card Numbers.&lt;br /&gt;
&lt;br /&gt;
=== What's new in ModSecurity and why should I upgrade if I am already using ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
There are many significant changes and enhancements in ModSecurity 2.5 over the 1.x branch, including:&lt;br /&gt;
&lt;br /&gt;
In order to use the OWASP ModSecurity Core Rules, you must use the 2.x version of ModSecurity as it takes advantage of specific features not available in previous versions.&lt;br /&gt;
&lt;br /&gt;
Five processing phases (where there were only two in 1.9.x). These are: request headers, request body, response headers, response body, and logging. Those users who wanted to do things at the earliest possible moment can do them now.&lt;br /&gt;
&lt;br /&gt;
Per-rule transformation options (previously normalization was implicit and hard-coded). Many new transformation functions were added.&lt;br /&gt;
&lt;br /&gt;
Transaction variables. This can be used to store pieces of data, create a transaction anomaly score, and so on.&lt;br /&gt;
&lt;br /&gt;
Data persistence (can be configured any way you want although most people will want to use this feature to track IP addresses, application sessions, and application users).&lt;br /&gt;
&lt;br /&gt;
Support for anomaly scoring and basic event correlation (counters can be automatically decreased over time; variables can be expired).&lt;br /&gt;
&lt;br /&gt;
Support for web applications and session IDs.&lt;br /&gt;
&lt;br /&gt;
Regular Expression back-references (allows one to create custom variables using transaction content).&lt;br /&gt;
&lt;br /&gt;
There are now many functions that can be applied to the variables (where previously one could only use regular expressions).&lt;br /&gt;
&lt;br /&gt;
XML support (parsing, validation, XPath).&lt;br /&gt;
&lt;br /&gt;
For more information, it is suggested that you review the SecurityFocus interview that Ivan Ristic gave on ModSecurity 2.0 as it outlines these new features in more detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I migrate my rules from the ModSecurity 1.x format into the 2.x format? ===&lt;br /&gt;
&lt;br /&gt;
Due to the many changes in the ModSecurity 2.0 rules language, you can not directly use existing rulesets. You will need to translate the functionality of any custom rules into the new rules language. A migration matrix is available here [http://www.modsecurity.org/documentation/ModSecurity-Migration-Matrix.pdf] that will assist with this process.&lt;br /&gt;
&lt;br /&gt;
=== How do I install ModSecurity 2.0? ===&lt;br /&gt;
&lt;br /&gt;
The installation procedures for installing ModSecurity 2.5 has changed from previous versions. It now includes a configure script that should help to identify all local settings. After running configure, you then run the make and make install commands. You no longer use apxs directly.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in embedded-mode, what does that mean exactly? ===&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;embedded&amp;quot; simply refers to the fact that ModSecurity, running as an Apache module, is running inside the webserver process. Most WAFs function as totally separate hosts and sit in front of the web servers. Running in embedded-mode has some advantages and disadvantages that should be considered:&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Easy to add to an existing Apache server.&lt;br /&gt;
&lt;br /&gt;
Not a point of failure with respect to traffic.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
ModSecurity can only protect the local web server.&lt;br /&gt;
&lt;br /&gt;
ModSecurity will consume local resources such as CPU and RAM.&lt;br /&gt;
&lt;br /&gt;
Management of log files and configurations can become difficult if you have multiple installations.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in reverse proxy-mode, how does that differ from embedded-mode? ===&lt;br /&gt;
&lt;br /&gt;
The only difference with this deployment vs. an embedded one is that Apache itself is configured to function as a reverse proxy.&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Single point of access – functions as a choke point so you consolidate applying security settings and makes management easier.&lt;br /&gt;
&lt;br /&gt;
Network topology is hidden from the outside world - so it will be more difficult for attackers to enumerate your web platforms.&lt;br /&gt;
&lt;br /&gt;
Increased performance – if SSL accelerators/caching used.&lt;br /&gt;
&lt;br /&gt;
You can implement vulnerability filters to protect and vulnerable web server or application on the back-end (IIS, Netscape, ASP, PHP, etc...). See related section on Virtual Patching.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
A potential traffic bottleneck if the reverse proxy can not handle the network load.&lt;br /&gt;
&lt;br /&gt;
A potential point of failure - if the reverse proxy goes down it may cause a denial of service to the web applications that are behind it.&lt;br /&gt;
&lt;br /&gt;
Requires changes to the network.&lt;br /&gt;
&lt;br /&gt;
== Configuring ModSecurity ==&lt;br /&gt;
&lt;br /&gt;
=== Should I initially set the SecRuleEngine to On? ===&lt;br /&gt;
&lt;br /&gt;
No. Every Ruleset can have false positive in new environments and any new installation should initially use the log only Ruleset version or if no such version is available, set ModSecurity to Detection only using the SecRuleEngine DetectionOnly command. After running ModSecurity in a detection only mode for a while review the evens generated and decide if any modification to the rule set should be made before moving to protection mode.&lt;br /&gt;
&lt;br /&gt;
=== How do I get ModSecurity to inspect request and response bodies? ===&lt;br /&gt;
&lt;br /&gt;
You need to set the the following two directives:&lt;br /&gt;
&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
&lt;br /&gt;
SecResponseBodyAccess On&lt;br /&gt;
&lt;br /&gt;
=== How can I verify exactly how ModSecurity is processing rules and requests? ===&lt;br /&gt;
&lt;br /&gt;
You need to enable the debug log with SecDebugLog and increase the log level with SecDebugLogLevel. It you set the debug log level to 9, it will tell you exactly what tasks it is completing along with what data it is acting upon. Do be aware that while the increased debug log level does help from a troubleshooting perspective, it does negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== Can I use the Core Rules with ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
Unfortunately, no. The Core Rules takes advantage of the ModSecurity 2.0 rules language and is therefore not backward compatible.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== Are there rule differences for identify missing/empty variables between ModSecurity 1.x and 2.x? ===&lt;br /&gt;
&lt;br /&gt;
Yes there are. Many of these differences are outlined in the Migration Matrix document listed previously. Another common rule difference issue that arises is when you want to create white-listed ModSecurity rulesets which enforce that certain headers/variables are both present and not empty. In ModSecurity 1.x, you could create one rule that handles this while in ModSecurity 2.x you would need to write a chained rule.&lt;br /&gt;
&lt;br /&gt;
On the surface, you might think &amp;quot;The 1.x rules way is better since you only need 1 rule...&amp;quot; however you need to realize that anytime you have rules or directives that implicitly enforce certain capabilities, you run the risk of having false positives as it could match things that you didn't want them to. For instance, what if you have a situation where certain web clients (such as mobile devices) legitimately include some headers, however they are empty? Do you want to automatically block these clients? With the ModSecurity 1.x Rule Language, you would have to remove the entire rule. With the ModSecurity 2.x Rule Language, however, you are able to create rules to more accurately apply the logic that you desire.&lt;br /&gt;
&lt;br /&gt;
Please refer to the following blog post for more information.&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chaim Sanders&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Brian_Rectanus|Brian Rectanus]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
Nick Galbreath&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
OWASP/WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project&lt;br /&gt;
&lt;br /&gt;
cPanel distributes the OWASP CRS with their ModSecurity package -&lt;br /&gt;
https://documentation.cpanel.net/display/CKB/OWASP+ModSecurity+CRS&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|left|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
== v3.0 Detection Concepts ==&lt;br /&gt;
This page documents the goals/ideas for the next major version of the CRS.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Detection Logic/Flow Concepts ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10/Mapping_to_WHID&amp;diff=191295</id>
		<title>OWASP Top 10/Mapping to WHID</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10/Mapping_to_WHID&amp;diff=191295"/>
				<updated>2015-03-12T19:50:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Here is a mapping of the [[https://www.owasp.org/index.php/Top_10_2013 | OWASP Top 10 - 2013]] to example real world entries in the [https://www.owasp.org/index.php/OWASP_WASC_Web_Hacking_Incidents_Database_Project OWASP/WASC Web Hacking Incident Database (WHID)]:&lt;br /&gt;
&lt;br /&gt;
* A1: Injection - http://www.google.com/fusiontables/DataSource?snapid=S2086702IR5&lt;br /&gt;
* A2: Broken Authentication and Session Management - https://www.google.com/fusiontables/DataSource?snapid=S1536601kboC&lt;br /&gt;
* A3: Cross-site Scripting - https://www.google.com/fusiontables/DataSource?snapid=S856202bP-1&lt;br /&gt;
* A4: Insecure Direct Object Reference - http://www.google.com/fusiontables/DataSource?snapid=S208914Efwz &lt;br /&gt;
* A5: Security Misconfiguration - http://www.google.com/fusiontables/DataSource?snapid=S208909HtmA&lt;br /&gt;
* A6: Sensitive Data Exposure - http://www.google.com/fusiontables/DataSource?snapid=S2089112yxM&lt;br /&gt;
* A7: Missing Function Level Access Control - http://www.google.com/fusiontables/DataSource?snapid=S208910u7mt&lt;br /&gt;
* A8: Cross-site Request Forgery - https://www.google.com/fusiontables/DataSource?snapid=S856204sdBi&lt;br /&gt;
* A9: Using Components with Known Vulnerabilities - https://www.google.com/fusiontables/DataSource?snapid=S1536701c0JG&lt;br /&gt;
* A10: Unvalidated Redirects and Forwards - http://www.google.com/fusiontables/DataSource?snapid=S2089124qF5&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10/Mapping_to_WHID&amp;diff=191294</id>
		<title>OWASP Top 10/Mapping to WHID</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10/Mapping_to_WHID&amp;diff=191294"/>
				<updated>2015-03-12T19:32:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Here is a mapping of the [[https://www.owasp.org/index.php/Top_10_2013 | OWASP Top 10 - 2013]] to example real world entries in the [https://www.owasp.org/index.php/OWASP_WASC_Web_Hacking_Incidents_Database_Project OWASP/WASC Web Hacking Incident Database (WHID)]:&lt;br /&gt;
&lt;br /&gt;
* A1: Injection - http://www.google.com/fusiontables/DataSource?snapid=S2086702IR5&lt;br /&gt;
* A2: Cross-site Scripting - https://www.google.com/fusiontables/DataSource?snapid=S856202bP-1&lt;br /&gt;
* A3: Broken Authentication and Session Management - https://www.google.com/fusiontables/DataSource?snapid=S856203SqTh&lt;br /&gt;
* A4: Insecure Direct Object Reference - http://www.google.com/fusiontables/DataSource?snapid=S208914Efwz &lt;br /&gt;
* A5: Cross-site Request Forgery - https://www.google.com/fusiontables/DataSource?snapid=S856204sdBi&lt;br /&gt;
* A6: Security Misconfiguration - http://www.google.com/fusiontables/DataSource?snapid=S208909HtmA&lt;br /&gt;
* A8: Failure to Restrict URL Access - http://www.google.com/fusiontables/DataSource?snapid=S208910u7mt&lt;br /&gt;
* A9: Insufficient Transport Layer Protection - http://www.google.com/fusiontables/DataSource?snapid=S2089112yxM&lt;br /&gt;
* A10: Unvalidated Redirects and Forwards - http://www.google.com/fusiontables/DataSource?snapid=S2089124qF5&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=191293</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=191293"/>
				<updated>2015-03-12T19:30:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Submit an Incident ==&lt;br /&gt;
[https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AvaknFl7LiV2dHRLNEVoNks4YlJuZ1JIWHhyaG5OM2c&amp;amp;usp=drive_web#gid=1 Full WHID Spreadsheet on Google Docs]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo Full WHID Data on Google Fusion Tables]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [18 Feb 2014] WHID Becomes an OWASP Project&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What incidents are included in the Web Hacking Incidents Database?&lt;br /&gt;
: The Web Hacking Incident Database only tracks media reported security incidents that can be associated with a web application security vulnerability. We also try to limit the database only to targeted attacks, though the distinction between targeted and non-targeted attacks is grey. The database does not include known vulnerabilities in web based applications, an area well covered by other databases such as CVE, OSVDB or the  Bugtraq vulnerabilities database. Neither does the database include incidents in which web site were breached using operating system or network layer vulnerabilities. We also consider most web site defacements as non targeted attacks and do not include them in the database. For information about web site defacements refer to zone-h.&lt;br /&gt;
: As those criteria are somewhat subjective, we welcome comments on the inclusion or exclusion of publicized security breaches.&lt;br /&gt;
 &lt;br /&gt;
; Were there only few dozen web hacks last year?&lt;br /&gt;
: The criteria for inclusion in WHID are very strict. The goal is to list only incidents that are related to web application layer vulnerabilities/attacks. The goal is to show that application layer security is a risk we cannot ignore anymore.&lt;br /&gt;
: Keep in mind, that while there are countless website hacks and defacements most are not reported. Even for those reported most of the time it is difficult to tell how exactly they occurred.&lt;br /&gt;
: Specifically addressing the defacement incidents reported in zone-h, bear in mind that in nearly all of these incidents there is no public information on the way in which they were carried. Additionally, many defacements are not targeted and are the result of a wide scan for vulnerable sites and therefore we do not normally include defacements in WHID.&lt;br /&gt;
 &lt;br /&gt;
; Why can't I find a well known incident in the database?&lt;br /&gt;
: The reason is probably that the incident did not occur due to a web application vulnerability, or that we do not know how did it happen. For example probably the most well known information security breach ever, the CardSystems incident was added only in April 2006, nearly a year after it was initially publicized. While we always suspected that it was a web hack and industry rumors hinted that, no public information regarding the way in which the hack was done was available until April 2006. Actually the CardSystems incident was brought in previous versions of this FAQ as an example of an incident that we would like to add to WHID but cannot. For other hacks such information is not available and may not become available in the future.&lt;br /&gt;
 &lt;br /&gt;
; How reliable are the incidents reported at WHID?&lt;br /&gt;
: The data collected is NOT reported directly to WASC but is rather collected from public sources, mostly technical media, mailing list post and researchers advisories. As a result the reliability of the reported information depends on the source. Since the source (or sources) is included with each entry, the reader can assess its reliability independently. We do however assess the source before including an incident in the database and if for whatever reason something we added to the database is found to be erroneous, we remove it, though this has ever happened to date.&lt;br /&gt;
: For media reported incidents, we're trusting that the reporter or news outlet verified the information. For mailing list reported incidents and research advisories, these issues are normally quickly confirmed our refuted by other subscribers or by the offended vendor. In case of doubt evaluate the level of information provided in the disclosure and the publishing history of the researcher.&lt;br /&gt;
 &lt;br /&gt;
; Breach vs. Disclosure&lt;br /&gt;
: The database includes two types of incidents: &amp;quot;breach&amp;quot; or &amp;quot;disclosure&amp;quot;. Breaches are incidents in which a web site was compromised, while disclosures are incidents in which a researcher published a vulnerability in a web site. In other words, breaches are incidents in which we know bad guys took advantage of a vulnerability, while disclosures are incidents in which we hope the good guys were first.&lt;br /&gt;
 &lt;br /&gt;
; The &amp;quot;Unknown&amp;quot; Threat Classification&lt;br /&gt;
: All incidents are classified according to the Web Application Security Consortium Threat Classification (WASC-TC). This classification sheds light on the nature of the security vulnerability in the web application.&lt;br /&gt;
: Some of the incidents are classified as &amp;quot;Unknown&amp;quot;. You may wonder why were these incidents included in the list, as there is no way to know that the hacker exploited a web application vulnerability. In some cases the public information available indicates that the incident exploited a web application vulnerability, and in others we deducted from the available information.&lt;br /&gt;
 &lt;br /&gt;
; How can I contribute?&lt;br /&gt;
: The Web Hacking Incidents Database (WHID) is a community effort.  The information is provided under the open source Creative Common License, which in very simple words says that anyone can use the information for whatever need as long as the source is mentioned.&lt;br /&gt;
: You can help make WHID better. You don't need to invest a lot of time:&lt;br /&gt;
* If you encounter a new Web incident, please use one of the following methods to notify the WHID project team:&lt;br /&gt;
** Send an email to - owaspwhid_at_owasp.org&lt;br /&gt;
** Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
** Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
* As we natively speak English we miss alot in non English speaking countries so we are especially looking for non English sources. As long as they can be translated using Google translate of a similar service, we can include it.&lt;br /&gt;
* If you want to contribute more, become a WHID editor. Send an e-mail to the project leader with a few words (and preferably a link) about yourself and sign up to this site. We will activate your account and enable you to edit incidents. We need you to:&lt;br /&gt;
** Classify incidents a backlog of incidents from 2nd half of 2013.&lt;br /&gt;
** You can help by Proofing/editing the descriptions and classifications.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* [https://twitter.com/oshezaf Ofer Shezaf]&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* If you would like to have WRITE access so you can add entries directly to WHID in Google FusionTables, contact the project team and we will add your Gmail account.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10/Mapping_to_WHID&amp;diff=191159</id>
		<title>OWASP Top 10/Mapping to WHID</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10/Mapping_to_WHID&amp;diff=191159"/>
				<updated>2015-03-10T21:45:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Here is a mapping of the [[OWASP Top 10#OWASP_Top_10_for_2010 | OWASP Top 10 - 2010]] to example real world entries in the [https://www.owasp.org/index.php/OWASP_WASC_Web_Hacking_Incidents_Database_Project OWASP/WASC Web Hacking Incident Database (WHID)]:&lt;br /&gt;
&lt;br /&gt;
* A1: Injection - http://www.google.com/fusiontables/DataSource?snapid=S2086702IR5&lt;br /&gt;
* A2: Cross-site Scripting - https://www.google.com/fusiontables/DataSource?snapid=S856202bP-1&lt;br /&gt;
* A3: Broken Authentication and Session Management - https://www.google.com/fusiontables/DataSource?snapid=S856203SqTh&lt;br /&gt;
* A4: Insecure Direct Object Reference - http://www.google.com/fusiontables/DataSource?snapid=S208914Efwz &lt;br /&gt;
* A5: Cross-site Request Forgery - https://www.google.com/fusiontables/DataSource?snapid=S856204sdBi&lt;br /&gt;
* A6: Security Misconfiguration - http://www.google.com/fusiontables/DataSource?snapid=S208909HtmA&lt;br /&gt;
* A8: Failure to Restrict URL Access - http://www.google.com/fusiontables/DataSource?snapid=S208910u7mt&lt;br /&gt;
* A9: Insufficient Transport Layer Protection - http://www.google.com/fusiontables/DataSource?snapid=S2089112yxM&lt;br /&gt;
* A10: Unvalidated Redirects and Forwards - http://www.google.com/fusiontables/DataSource?snapid=S2089124qF5&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=184966</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=184966"/>
				<updated>2014-11-07T18:28:54Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Open HUB==&lt;br /&gt;
https://www.openhub.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== Who Leads the ModSecurity Project? ==&lt;br /&gt;
ModSecurity is supported by Trustwave's SpiderLabs Team [https://www.trustwave.com/spiderLabs.php] and includes the following team members:&lt;br /&gt;
*Ryan Barnett - ModSecurity Project Lead and OWASP ModSecurity Core Rule Set Project Lead&lt;br /&gt;
*Felipe Zimmerle Costa - ModSecurity Lead Developer&lt;br /&gt;
&lt;br /&gt;
Suggestions for enhancements of this document are always welcome. Please email them to the Mod-Security-Users mailing list [http://lists.sourceforge.net/lists/listinfo/mod-security-users].&lt;br /&gt;
&lt;br /&gt;
== Background and Support ==&lt;br /&gt;
&lt;br /&gt;
=== What exactly is ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
ModSecurity™is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks before they reach web applications. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Where do I get more help on ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The ModSecurity website is the definitive location for all information - http://www.modsecurity.org/help.html. &lt;br /&gt;
&lt;br /&gt;
==== Open Source/Free Help ====&lt;br /&gt;
*ModSecurity Users Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-users&lt;br /&gt;
*ModSecurity Developers Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-developers&lt;br /&gt;
*OWASP ModSecurity Core Rules Mail-list (OWASP) - https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set &lt;br /&gt;
*You can also join the #modsecurity channel on irc.freenode.net.&lt;br /&gt;
==== Commercial Help ====&lt;br /&gt;
*Commercial Support through Trustwave's Technical Assistance Center (TAC) - https://www3.trustwave.com/modsecurity-rules-support.php&lt;br /&gt;
*Professional Services offer by Trustwave SpiderLabs Research Team&lt;br /&gt;
*ModSecurity Training&lt;br /&gt;
&lt;br /&gt;
=== Do I need to sign up for the Mod-User Mail-list before I can send emails? ===&lt;br /&gt;
&lt;br /&gt;
Yes, only subscribers are able to post messages. As mentioned in the previous section, you will need to visit the mail-list website to register.&lt;br /&gt;
&lt;br /&gt;
=== Is there anything that I should do prior to sending emails to the mail-list? ===&lt;br /&gt;
&lt;br /&gt;
Yes. There is a good chance that the issue you are facing has already been discussed and, most likely, a fix has already been presented. You can review the mail-list archive online at the ModSecurity project site on SourceForge. You can also use the Search interface available for topic threads that are archived to the various mirror sites. For example, if you had a question about Exceptions and ModSecurity, you could use the following search to find past mail-list threads on this topic. If you can not find an answer to your question after doing some research, you should then send an email to the mod-security-users mail-list.&lt;br /&gt;
&lt;br /&gt;
=== Will I always get an immediate answer to my question on the open source mod-security-users mail-list? ===&lt;br /&gt;
&lt;br /&gt;
The open source mod-security-users mail-list is &amp;quot;best effort&amp;quot; support meaning that we will aspire to respond to emails as quickly as possible however the actual response time may vary depending on factors such as time of day, time of week and complexity of the question. If your email is sent on the week-end or if your question involves setting up test systems, unique configurations or interactions with a custom application then it may take some time to respond.&lt;br /&gt;
&lt;br /&gt;
=== If I don't get an immediate response, should I send an email to the Trustwave Technical Support email address? ===&lt;br /&gt;
&lt;br /&gt;
No. The Trustwave Technical Support email address is for commercial ModSecurity customers only.&lt;br /&gt;
&lt;br /&gt;
=== Where can I find books about Web Application Firewalls and ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity Handbook ====&lt;br /&gt;
ModSecurity Handbook is &amp;quot;The definitive guide to the popular open source web application firewall&amp;quot;, written by Ivan Ristic (original author of ModSecurity). The book is available from Feisty Duck in hard copy or with immediate access to the digital version which is continually updated.&lt;br /&gt;
&lt;br /&gt;
==== Web Application Defender's Cookbook: Battling Hackers and Defending Users ====&lt;br /&gt;
The Web Application Defender's Cookbook: Battling Hackers and Protecting Users is a book written by the ModSecurity Project Lead and OWASP ModSecurity Project Lead Ryan Barnett. The book outlines critical defensive techniques to protect web applications and includes example ModSecurity rules/scripts.&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity 2.5 ====&lt;br /&gt;
ModSecurity 2.5 is &amp;quot;A complete guide to using ModSecurity&amp;quot;, written by Magnus Mischel. The book is available from Packt Publishing in both hard copy and digital forms.&lt;br /&gt;
&lt;br /&gt;
==== Apache Security ====&lt;br /&gt;
Apache Security is a comprehensive Apache Security resource, written by Ivan Ristic for O'Reilly. Two chapters (Apache Installation and Configuration and PHP) are available as free download, as are the Apache security tools created for the book.&lt;br /&gt;
&lt;br /&gt;
==== Preventing Web Attacks with Apache ====&lt;br /&gt;
Preventing Web Attacks with Apache. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against.&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
=== What type(s) of security models does ModSecurity support? ===&lt;br /&gt;
&lt;br /&gt;
There is a common misconception that ModSecurity can only be used for negative policy enforcement. This is not the case. ModSecurity does not have any default security model &amp;quot;out-of-the-box.&amp;quot; It is up to the user to implement appropriate rules to achieve the desired security model. That being said, these are the security models which are most often employed:&lt;br /&gt;
&lt;br /&gt;
*Negative Security Model - looks for known bad, malicious requests. This method is effective at blocking a large number of automated attacks, however it is not the best approach for identifying new attack vectors. Using too many negative rules may also negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
*Positive Security Model - When positive security model is deployed, only requests that are known to be valid are accepted, with everything else rejected. This approach works best with applications that are heavily used but rarely updated.&lt;br /&gt;
&lt;br /&gt;
*Virtual Patching - Its rule language makes ModSecurity an ideal external patching tool. External patching is all about reducing the window of opportunity. Time needed to patch application vulnerabilities often runs to weeks in many organizations. With ModSecurity, applications can be patched from the outside, without touching the application source code (and even without any access to it), making your systems secure until a proper patch is produced.&lt;br /&gt;
&lt;br /&gt;
*Extrusion Detection Model - ModSecurity can also monitor outbound data and identify and block information disclosure issues such as leaking detailed error messages or Social Security Numbers or Credit Card Numbers.&lt;br /&gt;
&lt;br /&gt;
=== What's new in ModSecurity and why should I upgrade if I am already using ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
There are many significant changes and enhancements in ModSecurity 2.5 over the 1.x branch, including:&lt;br /&gt;
&lt;br /&gt;
In order to use the OWASP ModSecurity Core Rules, you must use the 2.x version of ModSecurity as it takes advantage of specific features not available in previous versions.&lt;br /&gt;
&lt;br /&gt;
Five processing phases (where there were only two in 1.9.x). These are: request headers, request body, response headers, response body, and logging. Those users who wanted to do things at the earliest possible moment can do them now.&lt;br /&gt;
&lt;br /&gt;
Per-rule transformation options (previously normalization was implicit and hard-coded). Many new transformation functions were added.&lt;br /&gt;
&lt;br /&gt;
Transaction variables. This can be used to store pieces of data, create a transaction anomaly score, and so on.&lt;br /&gt;
&lt;br /&gt;
Data persistence (can be configured any way you want although most people will want to use this feature to track IP addresses, application sessions, and application users).&lt;br /&gt;
&lt;br /&gt;
Support for anomaly scoring and basic event correlation (counters can be automatically decreased over time; variables can be expired).&lt;br /&gt;
&lt;br /&gt;
Support for web applications and session IDs.&lt;br /&gt;
&lt;br /&gt;
Regular Expression back-references (allows one to create custom variables using transaction content).&lt;br /&gt;
&lt;br /&gt;
There are now many functions that can be applied to the variables (where previously one could only use regular expressions).&lt;br /&gt;
&lt;br /&gt;
XML support (parsing, validation, XPath).&lt;br /&gt;
&lt;br /&gt;
For more information, it is suggested that you review the SecurityFocus interview that Ivan Ristic gave on ModSecurity 2.0 as it outlines these new features in more detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I migrate my rules from the ModSecurity 1.x format into the 2.x format? ===&lt;br /&gt;
&lt;br /&gt;
Due to the many changes in the ModSecurity 2.0 rules language, you can not directly use existing rulesets. You will need to translate the functionality of any custom rules into the new rules language. A migration matrix is available here [http://www.modsecurity.org/documentation/ModSecurity-Migration-Matrix.pdf] that will assist with this process.&lt;br /&gt;
&lt;br /&gt;
=== How do I install ModSecurity 2.0? ===&lt;br /&gt;
&lt;br /&gt;
The installation procedures for installing ModSecurity 2.5 has changed from previous versions. It now includes a configure script that should help to identify all local settings. After running configure, you then run the make and make install commands. You no longer use apxs directly.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in embedded-mode, what does that mean exactly? ===&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;embedded&amp;quot; simply refers to the fact that ModSecurity, running as an Apache module, is running inside the webserver process. Most WAFs function as totally separate hosts and sit in front of the web servers. Running in embedded-mode has some advantages and disadvantages that should be considered:&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Easy to add to an existing Apache server.&lt;br /&gt;
&lt;br /&gt;
Not a point of failure with respect to traffic.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
ModSecurity can only protect the local web server.&lt;br /&gt;
&lt;br /&gt;
ModSecurity will consume local resources such as CPU and RAM.&lt;br /&gt;
&lt;br /&gt;
Management of log files and configurations can become difficult if you have multiple installations.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in reverse proxy-mode, how does that differ from embedded-mode? ===&lt;br /&gt;
&lt;br /&gt;
The only difference with this deployment vs. an embedded one is that Apache itself is configured to function as a reverse proxy.&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Single point of access – functions as a choke point so you consolidate applying security settings and makes management easier.&lt;br /&gt;
&lt;br /&gt;
Network topology is hidden from the outside world - so it will be more difficult for attackers to enumerate your web platforms.&lt;br /&gt;
&lt;br /&gt;
Increased performance – if SSL accelerators/caching used.&lt;br /&gt;
&lt;br /&gt;
You can implement vulnerability filters to protect and vulnerable web server or application on the back-end (IIS, Netscape, ASP, PHP, etc...). See related section on Virtual Patching.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
A potential traffic bottleneck if the reverse proxy can not handle the network load.&lt;br /&gt;
&lt;br /&gt;
A potential point of failure - if the reverse proxy goes down it may cause a denial of service to the web applications that are behind it.&lt;br /&gt;
&lt;br /&gt;
Requires changes to the network.&lt;br /&gt;
&lt;br /&gt;
== Configuring ModSecurity ==&lt;br /&gt;
&lt;br /&gt;
=== Should I initially set the SecRuleEngine to On? ===&lt;br /&gt;
&lt;br /&gt;
No. Every Ruleset can have false positive in new environments and any new installation should initially use the log only Ruleset version or if no such version is available, set ModSecurity to Detection only using the SecRuleEngine DetectionOnly command. After running ModSecurity in a detection only mode for a while review the evens generated and decide if any modification to the rule set should be made before moving to protection mode.&lt;br /&gt;
&lt;br /&gt;
=== How do I get ModSecurity to inspect request and response bodies? ===&lt;br /&gt;
&lt;br /&gt;
You need to set the the following two directives:&lt;br /&gt;
&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
&lt;br /&gt;
SecResponseBodyAccess On&lt;br /&gt;
&lt;br /&gt;
=== How can I verify exactly how ModSecurity is processing rules and requests? ===&lt;br /&gt;
&lt;br /&gt;
You need to enable the debug log with SecDebugLog and increase the log level with SecDebugLogLevel. It you set the debug log level to 9, it will tell you exactly what tasks it is completing along with what data it is acting upon. Do be aware that while the increased debug log level does help from a troubleshooting perspective, it does negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== Can I use the Core Rules with ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
Unfortunately, no. The Core Rules takes advantage of the ModSecurity 2.0 rules language and is therefore not backward compatible.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== Are there rule differences for identify missing/empty variables between ModSecurity 1.x and 2.x? ===&lt;br /&gt;
&lt;br /&gt;
Yes there are. Many of these differences are outlined in the Migration Matrix document listed previously. Another common rule difference issue that arises is when you want to create white-listed ModSecurity rulesets which enforce that certain headers/variables are both present and not empty. In ModSecurity 1.x, you could create one rule that handles this while in ModSecurity 2.x you would need to write a chained rule.&lt;br /&gt;
&lt;br /&gt;
On the surface, you might think &amp;quot;The 1.x rules way is better since you only need 1 rule...&amp;quot; however you need to realize that anytime you have rules or directives that implicitly enforce certain capabilities, you run the risk of having false positives as it could match things that you didn't want them to. For instance, what if you have a situation where certain web clients (such as mobile devices) legitimately include some headers, however they are empty? Do you want to automatically block these clients? With the ModSecurity 1.x Rule Language, you would have to remove the entire rule. With the ModSecurity 2.x Rule Language, however, you are able to create rules to more accurately apply the logic that you desire.&lt;br /&gt;
&lt;br /&gt;
Please refer to the following blog post for more information.&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Brian_Rectanus|Brian Rectanus]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
Nick Galbreath&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
http://projects.webappsec.org/Distributed-Web-Honeypots&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
CloudFlare's WAF uses the logic from the OWASP ModSecurity CRS -&lt;br /&gt;
https://www.cloudflare.com/waf&lt;br /&gt;
http://blog.cloudflare.com/cloudflares-new-waf-compiling-to-lua/&lt;br /&gt;
&lt;br /&gt;
Verizon/EdgeCast WAF uses ModSecurity and the OWASP ModSecurity CRS -&lt;br /&gt;
http://www.edgecast.com/services/security/#waf&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|left|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
== v3.0 Detection Concepts ==&lt;br /&gt;
This page documents the goals/ideas for the next major version of the CRS.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Detection Logic/Flow Concepts ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=184961</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=184961"/>
				<updated>2014-11-07T18:08:26Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Open HUB==&lt;br /&gt;
https://www.openhub.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== Who Leads the ModSecurity Project? ==&lt;br /&gt;
ModSecurity is supported by Trustwave's SpiderLabs Team [https://www.trustwave.com/spiderLabs.php] and includes the following team members:&lt;br /&gt;
*Ryan Barnett - ModSecurity Project Lead and OWASP ModSecurity Core Rule Set Project Lead&lt;br /&gt;
*Felipe Zimmerle Costa - ModSecurity Lead Developer&lt;br /&gt;
&lt;br /&gt;
Suggestions for enhancements of this document are always welcome. Please email them to the Mod-Security-Users mailing list [http://lists.sourceforge.net/lists/listinfo/mod-security-users].&lt;br /&gt;
&lt;br /&gt;
== Background and Support ==&lt;br /&gt;
&lt;br /&gt;
=== What exactly is ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
ModSecurity™is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks before they reach web applications. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Where do I get more help on ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The ModSecurity website is the definitive location for all information - http://www.modsecurity.org/help.html. &lt;br /&gt;
&lt;br /&gt;
==== Open Source/Free Help ====&lt;br /&gt;
*ModSecurity Users Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-users&lt;br /&gt;
*ModSecurity Developers Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-developers&lt;br /&gt;
*OWASP ModSecurity Core Rules Mail-list (OWASP) - https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set &lt;br /&gt;
*You can also join the #modsecurity channel on irc.freenode.net.&lt;br /&gt;
==== Commercial Help ====&lt;br /&gt;
*Commercial Support through Trustwave's Technical Assistance Center (TAC) - https://www3.trustwave.com/modsecurity-rules-support.php&lt;br /&gt;
*Professional Services offer by Trustwave SpiderLabs Research Team&lt;br /&gt;
*ModSecurity Training&lt;br /&gt;
&lt;br /&gt;
=== Do I need to sign up for the Mod-User Mail-list before I can send emails? ===&lt;br /&gt;
&lt;br /&gt;
Yes, only subscribers are able to post messages. As mentioned in the previous section, you will need to visit the mail-list website to register.&lt;br /&gt;
&lt;br /&gt;
=== Is there anything that I should do prior to sending emails to the mail-list? ===&lt;br /&gt;
&lt;br /&gt;
Yes. There is a good chance that the issue you are facing has already been discussed and, most likely, a fix has already been presented. You can review the mail-list archive online at the ModSecurity project site on SourceForge. You can also use the Search interface available for topic threads that are archived to the various mirror sites. For example, if you had a question about Exceptions and ModSecurity, you could use the following search to find past mail-list threads on this topic. If you can not find an answer to your question after doing some research, you should then send an email to the mod-security-users mail-list.&lt;br /&gt;
&lt;br /&gt;
=== Will I always get an immediate answer to my question on the open source mod-security-users mail-list? ===&lt;br /&gt;
&lt;br /&gt;
The open source mod-security-users mail-list is &amp;quot;best effort&amp;quot; support meaning that we will aspire to respond to emails as quickly as possible however the actual response time may vary depending on factors such as time of day, time of week and complexity of the question. If your email is sent on the week-end or if your question involves setting up test systems, unique configurations or interactions with a custom application then it may take some time to respond.&lt;br /&gt;
&lt;br /&gt;
=== If I don't get an immediate response, should I send an email to the Trustwave Technical Support email address? ===&lt;br /&gt;
&lt;br /&gt;
No. The Trustwave Technical Support email address is for commercial ModSecurity customers only.&lt;br /&gt;
&lt;br /&gt;
=== Where can I find books about Web Application Firewalls and ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity Handbook ====&lt;br /&gt;
ModSecurity Handbook is &amp;quot;The definitive guide to the popular open source web application firewall&amp;quot;, written by Ivan Ristic (original author of ModSecurity). The book is available from Feisty Duck in hard copy or with immediate access to the digital version which is continually updated.&lt;br /&gt;
&lt;br /&gt;
==== Web Application Defender's Cookbook: Battling Hackers and Defending Users ====&lt;br /&gt;
The Web Application Defender's Cookbook: Battling Hackers and Protecting Users is a book written by the ModSecurity Project Lead and OWASP ModSecurity Project Lead Ryan Barnett. The book outlines critical defensive techniques to protect web applications and includes example ModSecurity rules/scripts.&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity 2.5 ====&lt;br /&gt;
ModSecurity 2.5 is &amp;quot;A complete guide to using ModSecurity&amp;quot;, written by Magnus Mischel. The book is available from Packt Publishing in both hard copy and digital forms.&lt;br /&gt;
&lt;br /&gt;
==== Apache Security ====&lt;br /&gt;
Apache Security is a comprehensive Apache Security resource, written by Ivan Ristic for O'Reilly. Two chapters (Apache Installation and Configuration and PHP) are available as free download, as are the Apache security tools created for the book.&lt;br /&gt;
&lt;br /&gt;
==== Preventing Web Attacks with Apache ====&lt;br /&gt;
Preventing Web Attacks with Apache. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against.&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
=== What type(s) of security models does ModSecurity support? ===&lt;br /&gt;
&lt;br /&gt;
There is a common misconception that ModSecurity can only be used for negative policy enforcement. This is not the case. ModSecurity does not have any default security model &amp;quot;out-of-the-box.&amp;quot; It is up to the user to implement appropriate rules to achieve the desired security model. That being said, these are the security models which are most often employed:&lt;br /&gt;
&lt;br /&gt;
*Negative Security Model - looks for known bad, malicious requests. This method is effective at blocking a large number of automated attacks, however it is not the best approach for identifying new attack vectors. Using too many negative rules may also negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
*Positive Security Model - When positive security model is deployed, only requests that are known to be valid are accepted, with everything else rejected. This approach works best with applications that are heavily used but rarely updated.&lt;br /&gt;
&lt;br /&gt;
*Virtual Patching - Its rule language makes ModSecurity an ideal external patching tool. External patching is all about reducing the window of opportunity. Time needed to patch application vulnerabilities often runs to weeks in many organizations. With ModSecurity, applications can be patched from the outside, without touching the application source code (and even without any access to it), making your systems secure until a proper patch is produced.&lt;br /&gt;
&lt;br /&gt;
*Extrusion Detection Model - ModSecurity can also monitor outbound data and identify and block information disclosure issues such as leaking detailed error messages or Social Security Numbers or Credit Card Numbers.&lt;br /&gt;
&lt;br /&gt;
=== What's new in ModSecurity and why should I upgrade if I am already using ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
There are many significant changes and enhancements in ModSecurity 2.5 over the 1.x branch, including:&lt;br /&gt;
&lt;br /&gt;
In order to use the OWASP ModSecurity Core Rules, you must use the 2.x version of ModSecurity as it takes advantage of specific features not available in previous versions.&lt;br /&gt;
&lt;br /&gt;
Five processing phases (where there were only two in 1.9.x). These are: request headers, request body, response headers, response body, and logging. Those users who wanted to do things at the earliest possible moment can do them now.&lt;br /&gt;
&lt;br /&gt;
Per-rule transformation options (previously normalization was implicit and hard-coded). Many new transformation functions were added.&lt;br /&gt;
&lt;br /&gt;
Transaction variables. This can be used to store pieces of data, create a transaction anomaly score, and so on.&lt;br /&gt;
&lt;br /&gt;
Data persistence (can be configured any way you want although most people will want to use this feature to track IP addresses, application sessions, and application users).&lt;br /&gt;
&lt;br /&gt;
Support for anomaly scoring and basic event correlation (counters can be automatically decreased over time; variables can be expired).&lt;br /&gt;
&lt;br /&gt;
Support for web applications and session IDs.&lt;br /&gt;
&lt;br /&gt;
Regular Expression back-references (allows one to create custom variables using transaction content).&lt;br /&gt;
&lt;br /&gt;
There are now many functions that can be applied to the variables (where previously one could only use regular expressions).&lt;br /&gt;
&lt;br /&gt;
XML support (parsing, validation, XPath).&lt;br /&gt;
&lt;br /&gt;
For more information, it is suggested that you review the SecurityFocus interview that Ivan Ristic gave on ModSecurity 2.0 as it outlines these new features in more detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I migrate my rules from the ModSecurity 1.x format into the 2.x format? ===&lt;br /&gt;
&lt;br /&gt;
Due to the many changes in the ModSecurity 2.0 rules language, you can not directly use existing rulesets. You will need to translate the functionality of any custom rules into the new rules language. A migration matrix is available here [http://www.modsecurity.org/documentation/ModSecurity-Migration-Matrix.pdf] that will assist with this process.&lt;br /&gt;
&lt;br /&gt;
=== How do I install ModSecurity 2.0? ===&lt;br /&gt;
&lt;br /&gt;
The installation procedures for installing ModSecurity 2.5 has changed from previous versions. It now includes a configure script that should help to identify all local settings. After running configure, you then run the make and make install commands. You no longer use apxs directly.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in embedded-mode, what does that mean exactly? ===&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;embedded&amp;quot; simply refers to the fact that ModSecurity, running as an Apache module, is running inside the webserver process. Most WAFs function as totally separate hosts and sit in front of the web servers. Running in embedded-mode has some advantages and disadvantages that should be considered:&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Easy to add to an existing Apache server.&lt;br /&gt;
&lt;br /&gt;
Not a point of failure with respect to traffic.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
ModSecurity can only protect the local web server.&lt;br /&gt;
&lt;br /&gt;
ModSecurity will consume local resources such as CPU and RAM.&lt;br /&gt;
&lt;br /&gt;
Management of log files and configurations can become difficult if you have multiple installations.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in reverse proxy-mode, how does that differ from embedded-mode? ===&lt;br /&gt;
&lt;br /&gt;
The only difference with this deployment vs. an embedded one is that Apache itself is configured to function as a reverse proxy.&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Single point of access – functions as a choke point so you consolidate applying security settings and makes management easier.&lt;br /&gt;
&lt;br /&gt;
Network topology is hidden from the outside world - so it will be more difficult for attackers to enumerate your web platforms.&lt;br /&gt;
&lt;br /&gt;
Increased performance – if SSL accelerators/caching used.&lt;br /&gt;
&lt;br /&gt;
You can implement vulnerability filters to protect and vulnerable web server or application on the back-end (IIS, Netscape, ASP, PHP, etc...). See related section on Virtual Patching.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
A potential traffic bottleneck if the reverse proxy can not handle the network load.&lt;br /&gt;
&lt;br /&gt;
A potential point of failure - if the reverse proxy goes down it may cause a denial of service to the web applications that are behind it.&lt;br /&gt;
&lt;br /&gt;
Requires changes to the network.&lt;br /&gt;
&lt;br /&gt;
== Configuring ModSecurity ==&lt;br /&gt;
&lt;br /&gt;
=== Should I initially set the SecRuleEngine to On? ===&lt;br /&gt;
&lt;br /&gt;
No. Every Ruleset can have false positive in new environments and any new installation should initially use the log only Ruleset version or if no such version is available, set ModSecurity to Detection only using the SecRuleEngine DetectionOnly command. After running ModSecurity in a detection only mode for a while review the evens generated and decide if any modification to the rule set should be made before moving to protection mode.&lt;br /&gt;
&lt;br /&gt;
=== How do I get ModSecurity to inspect request and response bodies? ===&lt;br /&gt;
&lt;br /&gt;
You need to set the the following two directives:&lt;br /&gt;
&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
&lt;br /&gt;
SecResponseBodyAccess On&lt;br /&gt;
&lt;br /&gt;
=== How can I verify exactly how ModSecurity is processing rules and requests? ===&lt;br /&gt;
&lt;br /&gt;
You need to enable the debug log with SecDebugLog and increase the log level with SecDebugLogLevel. It you set the debug log level to 9, it will tell you exactly what tasks it is completing along with what data it is acting upon. Do be aware that while the increased debug log level does help from a troubleshooting perspective, it does negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== Can I use the Core Rules with ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
Unfortunately, no. The Core Rules takes advantage of the ModSecurity 2.0 rules language and is therefore not backward compatible.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== Are there rule differences for identify missing/empty variables between ModSecurity 1.x and 2.x? ===&lt;br /&gt;
&lt;br /&gt;
Yes there are. Many of these differences are outlined in the Migration Matrix document listed previously. Another common rule difference issue that arises is when you want to create white-listed ModSecurity rulesets which enforce that certain headers/variables are both present and not empty. In ModSecurity 1.x, you could create one rule that handles this while in ModSecurity 2.x you would need to write a chained rule.&lt;br /&gt;
&lt;br /&gt;
On the surface, you might think &amp;quot;The 1.x rules way is better since you only need 1 rule...&amp;quot; however you need to realize that anytime you have rules or directives that implicitly enforce certain capabilities, you run the risk of having false positives as it could match things that you didn't want them to. For instance, what if you have a situation where certain web clients (such as mobile devices) legitimately include some headers, however they are empty? Do you want to automatically block these clients? With the ModSecurity 1.x Rule Language, you would have to remove the entire rule. With the ModSecurity 2.x Rule Language, however, you are able to create rules to more accurately apply the logic that you desire.&lt;br /&gt;
&lt;br /&gt;
Please refer to the following blog post for more information.&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Rcbarnett|Ryan Barnett]]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:User:Brian_Rectanus|Brian Rectanus]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
Nick Galbreath&lt;br /&gt;
&lt;br /&gt;
== Project Users ==&lt;br /&gt;
&lt;br /&gt;
WASC Distributed Web Honeypot Project uses the Core Rule Set -&lt;br /&gt;
http://projects.webappsec.org/Distributed-Web-Honeypots&lt;br /&gt;
&lt;br /&gt;
Akamai's WAF Service is based on a previous version of the Core Rule Set -&lt;br /&gt;
http://www.akamai.com/html/about/press/releases/2009/press_121409.html&lt;br /&gt;
&lt;br /&gt;
Varnish Web Cache/Accelerator uses a converted version of the CRS -&lt;br /&gt;
https://github.com/comotion/security.vcl&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SpiderLabs Logo 2011.JPG|200px|left|link=https://www.trustwave.com/spiderLabs.php]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
== v3.0 Detection Concepts ==&lt;br /&gt;
This page documents the goals/ideas for the next major version of the CRS.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Detection Logic/Flow Concepts ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=184959</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=184959"/>
				<updated>2014-11-07T17:56:54Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Open HUB==&lt;br /&gt;
https://www.openhub.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== Who Leads the ModSecurity Project? ==&lt;br /&gt;
ModSecurity is supported by Trustwave's SpiderLabs Team [https://www.trustwave.com/spiderLabs.php] and includes the following team members:&lt;br /&gt;
*Ryan Barnett - ModSecurity Project Lead and OWASP ModSecurity Core Rule Set Project Lead&lt;br /&gt;
*Felipe Zimmerle Costa - ModSecurity Lead Developer&lt;br /&gt;
&lt;br /&gt;
Suggestions for enhancements of this document are always welcome. Please email them to the Mod-Security-Users mailing list [http://lists.sourceforge.net/lists/listinfo/mod-security-users].&lt;br /&gt;
&lt;br /&gt;
== Background and Support ==&lt;br /&gt;
&lt;br /&gt;
=== What exactly is ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
ModSecurity™is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks before they reach web applications. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Where do I get more help on ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The ModSecurity website is the definitive location for all information - http://www.modsecurity.org/help.html. &lt;br /&gt;
&lt;br /&gt;
==== Open Source/Free Help ====&lt;br /&gt;
*ModSecurity Users Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-users&lt;br /&gt;
*ModSecurity Developers Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-developers&lt;br /&gt;
*OWASP ModSecurity Core Rules Mail-list (OWASP) - https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set &lt;br /&gt;
*You can also join the #modsecurity channel on irc.freenode.net.&lt;br /&gt;
==== Commercial Help ====&lt;br /&gt;
*Commercial Support through Trustwave's Technical Assistance Center (TAC) - https://www3.trustwave.com/modsecurity-rules-support.php&lt;br /&gt;
*Professional Services offer by Trustwave SpiderLabs Research Team&lt;br /&gt;
*ModSecurity Training&lt;br /&gt;
&lt;br /&gt;
=== Do I need to sign up for the Mod-User Mail-list before I can send emails? ===&lt;br /&gt;
&lt;br /&gt;
Yes, only subscribers are able to post messages. As mentioned in the previous section, you will need to visit the mail-list website to register.&lt;br /&gt;
&lt;br /&gt;
=== Is there anything that I should do prior to sending emails to the mail-list? ===&lt;br /&gt;
&lt;br /&gt;
Yes. There is a good chance that the issue you are facing has already been discussed and, most likely, a fix has already been presented. You can review the mail-list archive online at the ModSecurity project site on SourceForge. You can also use the Search interface available for topic threads that are archived to the various mirror sites. For example, if you had a question about Exceptions and ModSecurity, you could use the following search to find past mail-list threads on this topic. If you can not find an answer to your question after doing some research, you should then send an email to the mod-security-users mail-list.&lt;br /&gt;
&lt;br /&gt;
=== Will I always get an immediate answer to my question on the open source mod-security-users mail-list? ===&lt;br /&gt;
&lt;br /&gt;
The open source mod-security-users mail-list is &amp;quot;best effort&amp;quot; support meaning that we will aspire to respond to emails as quickly as possible however the actual response time may vary depending on factors such as time of day, time of week and complexity of the question. If your email is sent on the week-end or if your question involves setting up test systems, unique configurations or interactions with a custom application then it may take some time to respond.&lt;br /&gt;
&lt;br /&gt;
=== If I don't get an immediate response, should I send an email to the Trustwave Technical Support email address? ===&lt;br /&gt;
&lt;br /&gt;
No. The Trustwave Technical Support email address is for commercial ModSecurity customers only.&lt;br /&gt;
&lt;br /&gt;
=== Where can I find books about Web Application Firewalls and ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity Handbook ====&lt;br /&gt;
ModSecurity Handbook is &amp;quot;The definitive guide to the popular open source web application firewall&amp;quot;, written by Ivan Ristic (original author of ModSecurity). The book is available from Feisty Duck in hard copy or with immediate access to the digital version which is continually updated.&lt;br /&gt;
&lt;br /&gt;
==== Web Application Defender's Cookbook: Battling Hackers and Defending Users ====&lt;br /&gt;
The Web Application Defender's Cookbook: Battling Hackers and Protecting Users is a book written by the ModSecurity Project Lead and OWASP ModSecurity Project Lead Ryan Barnett. The book outlines critical defensive techniques to protect web applications and includes example ModSecurity rules/scripts.&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity 2.5 ====&lt;br /&gt;
ModSecurity 2.5 is &amp;quot;A complete guide to using ModSecurity&amp;quot;, written by Magnus Mischel. The book is available from Packt Publishing in both hard copy and digital forms.&lt;br /&gt;
&lt;br /&gt;
==== Apache Security ====&lt;br /&gt;
Apache Security is a comprehensive Apache Security resource, written by Ivan Ristic for O'Reilly. Two chapters (Apache Installation and Configuration and PHP) are available as free download, as are the Apache security tools created for the book.&lt;br /&gt;
&lt;br /&gt;
==== Preventing Web Attacks with Apache ====&lt;br /&gt;
Preventing Web Attacks with Apache. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against.&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
=== What type(s) of security models does ModSecurity support? ===&lt;br /&gt;
&lt;br /&gt;
There is a common misconception that ModSecurity can only be used for negative policy enforcement. This is not the case. ModSecurity does not have any default security model &amp;quot;out-of-the-box.&amp;quot; It is up to the user to implement appropriate rules to achieve the desired security model. That being said, these are the security models which are most often employed:&lt;br /&gt;
&lt;br /&gt;
*Negative Security Model - looks for known bad, malicious requests. This method is effective at blocking a large number of automated attacks, however it is not the best approach for identifying new attack vectors. Using too many negative rules may also negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
*Positive Security Model - When positive security model is deployed, only requests that are known to be valid are accepted, with everything else rejected. This approach works best with applications that are heavily used but rarely updated.&lt;br /&gt;
&lt;br /&gt;
*Virtual Patching - Its rule language makes ModSecurity an ideal external patching tool. External patching is all about reducing the window of opportunity. Time needed to patch application vulnerabilities often runs to weeks in many organizations. With ModSecurity, applications can be patched from the outside, without touching the application source code (and even without any access to it), making your systems secure until a proper patch is produced.&lt;br /&gt;
&lt;br /&gt;
*Extrusion Detection Model - ModSecurity can also monitor outbound data and identify and block information disclosure issues such as leaking detailed error messages or Social Security Numbers or Credit Card Numbers.&lt;br /&gt;
&lt;br /&gt;
=== What's new in ModSecurity and why should I upgrade if I am already using ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
There are many significant changes and enhancements in ModSecurity 2.5 over the 1.x branch, including:&lt;br /&gt;
&lt;br /&gt;
In order to use the OWASP ModSecurity Core Rules, you must use the 2.x version of ModSecurity as it takes advantage of specific features not available in previous versions.&lt;br /&gt;
&lt;br /&gt;
Five processing phases (where there were only two in 1.9.x). These are: request headers, request body, response headers, response body, and logging. Those users who wanted to do things at the earliest possible moment can do them now.&lt;br /&gt;
&lt;br /&gt;
Per-rule transformation options (previously normalization was implicit and hard-coded). Many new transformation functions were added.&lt;br /&gt;
&lt;br /&gt;
Transaction variables. This can be used to store pieces of data, create a transaction anomaly score, and so on.&lt;br /&gt;
&lt;br /&gt;
Data persistence (can be configured any way you want although most people will want to use this feature to track IP addresses, application sessions, and application users).&lt;br /&gt;
&lt;br /&gt;
Support for anomaly scoring and basic event correlation (counters can be automatically decreased over time; variables can be expired).&lt;br /&gt;
&lt;br /&gt;
Support for web applications and session IDs.&lt;br /&gt;
&lt;br /&gt;
Regular Expression back-references (allows one to create custom variables using transaction content).&lt;br /&gt;
&lt;br /&gt;
There are now many functions that can be applied to the variables (where previously one could only use regular expressions).&lt;br /&gt;
&lt;br /&gt;
XML support (parsing, validation, XPath).&lt;br /&gt;
&lt;br /&gt;
For more information, it is suggested that you review the SecurityFocus interview that Ivan Ristic gave on ModSecurity 2.0 as it outlines these new features in more detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I migrate my rules from the ModSecurity 1.x format into the 2.x format? ===&lt;br /&gt;
&lt;br /&gt;
Due to the many changes in the ModSecurity 2.0 rules language, you can not directly use existing rulesets. You will need to translate the functionality of any custom rules into the new rules language. A migration matrix is available here [http://www.modsecurity.org/documentation/ModSecurity-Migration-Matrix.pdf] that will assist with this process.&lt;br /&gt;
&lt;br /&gt;
=== How do I install ModSecurity 2.0? ===&lt;br /&gt;
&lt;br /&gt;
The installation procedures for installing ModSecurity 2.5 has changed from previous versions. It now includes a configure script that should help to identify all local settings. After running configure, you then run the make and make install commands. You no longer use apxs directly.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in embedded-mode, what does that mean exactly? ===&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;embedded&amp;quot; simply refers to the fact that ModSecurity, running as an Apache module, is running inside the webserver process. Most WAFs function as totally separate hosts and sit in front of the web servers. Running in embedded-mode has some advantages and disadvantages that should be considered:&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Easy to add to an existing Apache server.&lt;br /&gt;
&lt;br /&gt;
Not a point of failure with respect to traffic.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
ModSecurity can only protect the local web server.&lt;br /&gt;
&lt;br /&gt;
ModSecurity will consume local resources such as CPU and RAM.&lt;br /&gt;
&lt;br /&gt;
Management of log files and configurations can become difficult if you have multiple installations.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in reverse proxy-mode, how does that differ from embedded-mode? ===&lt;br /&gt;
&lt;br /&gt;
The only difference with this deployment vs. an embedded one is that Apache itself is configured to function as a reverse proxy.&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Single point of access – functions as a choke point so you consolidate applying security settings and makes management easier.&lt;br /&gt;
&lt;br /&gt;
Network topology is hidden from the outside world - so it will be more difficult for attackers to enumerate your web platforms.&lt;br /&gt;
&lt;br /&gt;
Increased performance – if SSL accelerators/caching used.&lt;br /&gt;
&lt;br /&gt;
You can implement vulnerability filters to protect and vulnerable web server or application on the back-end (IIS, Netscape, ASP, PHP, etc...). See related section on Virtual Patching.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
A potential traffic bottleneck if the reverse proxy can not handle the network load.&lt;br /&gt;
&lt;br /&gt;
A potential point of failure - if the reverse proxy goes down it may cause a denial of service to the web applications that are behind it.&lt;br /&gt;
&lt;br /&gt;
Requires changes to the network.&lt;br /&gt;
&lt;br /&gt;
== Configuring ModSecurity ==&lt;br /&gt;
&lt;br /&gt;
=== Should I initially set the SecRuleEngine to On? ===&lt;br /&gt;
&lt;br /&gt;
No. Every Ruleset can have false positive in new environments and any new installation should initially use the log only Ruleset version or if no such version is available, set ModSecurity to Detection only using the SecRuleEngine DetectionOnly command. After running ModSecurity in a detection only mode for a while review the evens generated and decide if any modification to the rule set should be made before moving to protection mode.&lt;br /&gt;
&lt;br /&gt;
=== How do I get ModSecurity to inspect request and response bodies? ===&lt;br /&gt;
&lt;br /&gt;
You need to set the the following two directives:&lt;br /&gt;
&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
&lt;br /&gt;
SecResponseBodyAccess On&lt;br /&gt;
&lt;br /&gt;
=== How can I verify exactly how ModSecurity is processing rules and requests? ===&lt;br /&gt;
&lt;br /&gt;
You need to enable the debug log with SecDebugLog and increase the log level with SecDebugLogLevel. It you set the debug log level to 9, it will tell you exactly what tasks it is completing along with what data it is acting upon. Do be aware that while the increased debug log level does help from a troubleshooting perspective, it does negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== Can I use the Core Rules with ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
Unfortunately, no. The Core Rules takes advantage of the ModSecurity 2.0 rules language and is therefore not backward compatible.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== Are there rule differences for identify missing/empty variables between ModSecurity 1.x and 2.x? ===&lt;br /&gt;
&lt;br /&gt;
Yes there are. Many of these differences are outlined in the Migration Matrix document listed previously. Another common rule difference issue that arises is when you want to create white-listed ModSecurity rulesets which enforce that certain headers/variables are both present and not empty. In ModSecurity 1.x, you could create one rule that handles this while in ModSecurity 2.x you would need to write a chained rule.&lt;br /&gt;
&lt;br /&gt;
On the surface, you might think &amp;quot;The 1.x rules way is better since you only need 1 rule...&amp;quot; however you need to realize that anytime you have rules or directives that implicitly enforce certain capabilities, you run the risk of having false positives as it could match things that you didn't want them to. For instance, what if you have a situation where certain web clients (such as mobile devices) legitimately include some headers, however they are empty? Do you want to automatically block these clients? With the ModSecurity 1.x Rule Language, you would have to remove the entire rule. With the ModSecurity 2.x Rule Language, however, you are able to create rules to more accurately apply the logic that you desire.&lt;br /&gt;
&lt;br /&gt;
Please refer to the following blog post for more information.&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
This page outlines development projects which would add new functionality to ModSecurity that could be leveraged by the OWASP ModSecurity Core Rule Set.&lt;br /&gt;
&lt;br /&gt;
== v3.0 Detection Concepts ==&lt;br /&gt;
This page documents the goals/ideas for the next major version of the CRS.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
These are not listed in any particular order.&lt;br /&gt;
# '''Add New Detection Logic'''&lt;br /&gt;
## Fraud Detection (Session Hijacking/CSRF/Banking Trojans)&lt;br /&gt;
## User Profiling (GeoIP/Browser Fingerprinting)&lt;br /&gt;
## HoneyTraps&lt;br /&gt;
# '''Increase Rule Accuracy'''&lt;br /&gt;
## Reduce False Positives - many users complain about the number of false positives and the negative impacts (breaking functionality) when in blocking mode&lt;br /&gt;
## Reduce False Negatives - we need to constantly improve detection so that we don't miss attacks (http://blog.spiderlabs.com/2011/07/modsecurity-sql-injection-challenge-lessons-learned.html)&lt;br /&gt;
# '''Increase Performance/Reduce Latency'''&lt;br /&gt;
## Utilize set-based pattern matching (@pm/@pmf) for pre-qualification of regular expression checks&lt;br /&gt;
## Optimize individual @rx SecRules into less optimized versions&lt;br /&gt;
## Review all regular expression rules for performance (non-capturing/greediness). &lt;br /&gt;
# '''Improve Rule Management'''&lt;br /&gt;
## Make it easier for user to enable/disable the desired rules for their platform&lt;br /&gt;
## Update rule formatting for easier readability&lt;br /&gt;
## Reorder/Regroup rule into new file names&lt;br /&gt;
&lt;br /&gt;
== Detection Logic/Flow Concepts ==&lt;br /&gt;
This section outlines the processing flow and associated points of detection and actions taken.&lt;br /&gt;
# '''IP Reputation'''&lt;br /&gt;
## Data inspected: REMOTE_ADDR&lt;br /&gt;
## Use @rbl to check against remote RBLs&lt;br /&gt;
## Use @pmf to check a local file if bad IPs&lt;br /&gt;
## Use GeoIP Data to assign fraud scores&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Method Analysis'''&lt;br /&gt;
## Data inspected: REQUEST_METHOD&lt;br /&gt;
## Compare the REQUEST_METHOD specified against:&lt;br /&gt;
### Allowed global methods set by the admin in the modsecurity_crs_10_setup.conf file&lt;br /&gt;
### Request methods allowed per-resource (GET vs. POST)&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
# '''Request Header Analysis'''&lt;br /&gt;
## Data inspected: REQUESTE_HEADERS&lt;br /&gt;
## Check for existence of malicious headers (User-Agent of scanners, etc..)&lt;br /&gt;
## Check for the absence of required headers (Host, User-Agent, Accept)&lt;br /&gt;
## Request Header Ordering Anomalies detects non-browsers/bots&lt;br /&gt;
## '''Actions'''&lt;br /&gt;
### Deny&lt;br /&gt;
### Increase TX anomaly score&lt;br /&gt;
### Tag client as &amp;quot;suspicious&amp;quot; in IP collection&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWASP ModSecurity CRS is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Contribute on the mail-list by answering questions from the community&lt;br /&gt;
* Report issues to our GitHub Issue tracker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=181351</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=181351"/>
				<updated>2014-08-28T16:22:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Open HUB==&lt;br /&gt;
https://www.openhub.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
== Who Leads the ModSecurity Project? ==&lt;br /&gt;
ModSecurity is supported by Trustwave's SpiderLabs Team [https://www.trustwave.com/spiderLabs.php] and includes the following team members:&lt;br /&gt;
*Ryan Barnett - ModSecurity Project Lead and OWASP ModSecurity Core Rule Set Project Lead&lt;br /&gt;
*Felipe Zimmerle Costa - ModSecurity Lead Developer&lt;br /&gt;
&lt;br /&gt;
Suggestions for enhancements of this document are always welcome. Please email them to the Mod-Security-Users mailing list [http://lists.sourceforge.net/lists/listinfo/mod-security-users].&lt;br /&gt;
&lt;br /&gt;
== Background and Support ==&lt;br /&gt;
&lt;br /&gt;
=== What exactly is ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
ModSecurity™is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks before they reach web applications. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Where do I get more help on ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The ModSecurity website is the definitive location for all information - http://www.modsecurity.org/help.html. &lt;br /&gt;
&lt;br /&gt;
==== Open Source/Free Help ====&lt;br /&gt;
*ModSecurity Users Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-users&lt;br /&gt;
*ModSecurity Developers Mail-list (SourceForge) - http://lists.sourceforge.net/lists/listinfo/mod-security-developers&lt;br /&gt;
*OWASP ModSecurity Core Rules Mail-list (OWASP) - https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set &lt;br /&gt;
*You can also join the #modsecurity channel on irc.freenode.net.&lt;br /&gt;
==== Commercial Help ====&lt;br /&gt;
*Commercial Support through Trustwave's Technical Assistance Center (TAC) - https://www3.trustwave.com/modsecurity-rules-support.php&lt;br /&gt;
*Professional Services offer by Trustwave SpiderLabs Research Team&lt;br /&gt;
*ModSecurity Training&lt;br /&gt;
&lt;br /&gt;
=== Do I need to sign up for the Mod-User Mail-list before I can send emails? ===&lt;br /&gt;
&lt;br /&gt;
Yes, only subscribers are able to post messages. As mentioned in the previous section, you will need to visit the mail-list website to register.&lt;br /&gt;
&lt;br /&gt;
=== Is there anything that I should do prior to sending emails to the mail-list? ===&lt;br /&gt;
&lt;br /&gt;
Yes. There is a good chance that the issue you are facing has already been discussed and, most likely, a fix has already been presented. You can review the mail-list archive online at the ModSecurity project site on SourceForge. You can also use the Search interface available for topic threads that are archived to the various mirror sites. For example, if you had a question about Exceptions and ModSecurity, you could use the following search to find past mail-list threads on this topic. If you can not find an answer to your question after doing some research, you should then send an email to the mod-security-users mail-list.&lt;br /&gt;
&lt;br /&gt;
=== Will I always get an immediate answer to my question on the open source mod-security-users mail-list? ===&lt;br /&gt;
&lt;br /&gt;
The open source mod-security-users mail-list is &amp;quot;best effort&amp;quot; support meaning that we will aspire to respond to emails as quickly as possible however the actual response time may vary depending on factors such as time of day, time of week and complexity of the question. If your email is sent on the week-end or if your question involves setting up test systems, unique configurations or interactions with a custom application then it may take some time to respond.&lt;br /&gt;
&lt;br /&gt;
=== If I don't get an immediate response, should I send an email to the Trustwave Technical Support email address? ===&lt;br /&gt;
&lt;br /&gt;
No. The Trustwave Technical Support email address is for commercial ModSecurity customers only.&lt;br /&gt;
&lt;br /&gt;
=== Where can I find books about Web Application Firewalls and ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity Handbook ====&lt;br /&gt;
ModSecurity Handbook is &amp;quot;The definitive guide to the popular open source web application firewall&amp;quot;, written by Ivan Ristic (original author of ModSecurity). The book is available from Feisty Duck in hard copy or with immediate access to the digital version which is continually updated.&lt;br /&gt;
&lt;br /&gt;
==== Web Application Defender's Cookbook: Battling Hackers and Defending Users ====&lt;br /&gt;
The Web Application Defender's Cookbook: Battling Hackers and Protecting Users is a book written by the ModSecurity Project Lead and OWASP ModSecurity Project Lead Ryan Barnett. The book outlines critical defensive techniques to protect web applications and includes example ModSecurity rules/scripts.&lt;br /&gt;
&lt;br /&gt;
==== ModSecurity 2.5 ====&lt;br /&gt;
ModSecurity 2.5 is &amp;quot;A complete guide to using ModSecurity&amp;quot;, written by Magnus Mischel. The book is available from Packt Publishing in both hard copy and digital forms.&lt;br /&gt;
&lt;br /&gt;
==== Apache Security ====&lt;br /&gt;
Apache Security is a comprehensive Apache Security resource, written by Ivan Ristic for O'Reilly. Two chapters (Apache Installation and Configuration and PHP) are available as free download, as are the Apache security tools created for the book.&lt;br /&gt;
&lt;br /&gt;
==== Preventing Web Attacks with Apache ====&lt;br /&gt;
Preventing Web Attacks with Apache. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against.&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
=== What type(s) of security models does ModSecurity support? ===&lt;br /&gt;
&lt;br /&gt;
There is a common misconception that ModSecurity can only be used for negative policy enforcement. This is not the case. ModSecurity does not have any default security model &amp;quot;out-of-the-box.&amp;quot; It is up to the user to implement appropriate rules to achieve the desired security model. That being said, these are the security models which are most often employed:&lt;br /&gt;
&lt;br /&gt;
*Negative Security Model - looks for known bad, malicious requests. This method is effective at blocking a large number of automated attacks, however it is not the best approach for identifying new attack vectors. Using too many negative rules may also negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
*Positive Security Model - When positive security model is deployed, only requests that are known to be valid are accepted, with everything else rejected. This approach works best with applications that are heavily used but rarely updated.&lt;br /&gt;
&lt;br /&gt;
*Virtual Patching - Its rule language makes ModSecurity an ideal external patching tool. External patching is all about reducing the window of opportunity. Time needed to patch application vulnerabilities often runs to weeks in many organizations. With ModSecurity, applications can be patched from the outside, without touching the application source code (and even without any access to it), making your systems secure until a proper patch is produced.&lt;br /&gt;
&lt;br /&gt;
*Extrusion Detection Model - ModSecurity can also monitor outbound data and identify and block information disclosure issues such as leaking detailed error messages or Social Security Numbers or Credit Card Numbers.&lt;br /&gt;
&lt;br /&gt;
=== What's new in ModSecurity and why should I upgrade if I am already using ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
There are many significant changes and enhancements in ModSecurity 2.5 over the 1.x branch, including:&lt;br /&gt;
&lt;br /&gt;
In order to use the OWASP ModSecurity Core Rules, you must use the 2.x version of ModSecurity as it takes advantage of specific features not available in previous versions.&lt;br /&gt;
&lt;br /&gt;
Five processing phases (where there were only two in 1.9.x). These are: request headers, request body, response headers, response body, and logging. Those users who wanted to do things at the earliest possible moment can do them now.&lt;br /&gt;
&lt;br /&gt;
Per-rule transformation options (previously normalization was implicit and hard-coded). Many new transformation functions were added.&lt;br /&gt;
&lt;br /&gt;
Transaction variables. This can be used to store pieces of data, create a transaction anomaly score, and so on.&lt;br /&gt;
&lt;br /&gt;
Data persistence (can be configured any way you want although most people will want to use this feature to track IP addresses, application sessions, and application users).&lt;br /&gt;
&lt;br /&gt;
Support for anomaly scoring and basic event correlation (counters can be automatically decreased over time; variables can be expired).&lt;br /&gt;
&lt;br /&gt;
Support for web applications and session IDs.&lt;br /&gt;
&lt;br /&gt;
Regular Expression back-references (allows one to create custom variables using transaction content).&lt;br /&gt;
&lt;br /&gt;
There are now many functions that can be applied to the variables (where previously one could only use regular expressions).&lt;br /&gt;
&lt;br /&gt;
XML support (parsing, validation, XPath).&lt;br /&gt;
&lt;br /&gt;
For more information, it is suggested that you review the SecurityFocus interview that Ivan Ristic gave on ModSecurity 2.0 as it outlines these new features in more detail.&lt;br /&gt;
&lt;br /&gt;
=== How do I migrate my rules from the ModSecurity 1.x format into the 2.x format? ===&lt;br /&gt;
&lt;br /&gt;
Due to the many changes in the ModSecurity 2.0 rules language, you can not directly use existing rulesets. You will need to translate the functionality of any custom rules into the new rules language. A migration matrix is available here [http://www.modsecurity.org/documentation/ModSecurity-Migration-Matrix.pdf] that will assist with this process.&lt;br /&gt;
&lt;br /&gt;
=== How do I install ModSecurity 2.0? ===&lt;br /&gt;
&lt;br /&gt;
The installation procedures for installing ModSecurity 2.5 has changed from previous versions. It now includes a configure script that should help to identify all local settings. After running configure, you then run the make and make install commands. You no longer use apxs directly.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in embedded-mode, what does that mean exactly? ===&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;embedded&amp;quot; simply refers to the fact that ModSecurity, running as an Apache module, is running inside the webserver process. Most WAFs function as totally separate hosts and sit in front of the web servers. Running in embedded-mode has some advantages and disadvantages that should be considered:&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Easy to add to an existing Apache server.&lt;br /&gt;
&lt;br /&gt;
Not a point of failure with respect to traffic.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
ModSecurity can only protect the local web server.&lt;br /&gt;
&lt;br /&gt;
ModSecurity will consume local resources such as CPU and RAM.&lt;br /&gt;
&lt;br /&gt;
Management of log files and configurations can become difficult if you have multiple installations.&lt;br /&gt;
&lt;br /&gt;
=== I hear that ModSecurity can be run in reverse proxy-mode, how does that differ from embedded-mode? ===&lt;br /&gt;
&lt;br /&gt;
The only difference with this deployment vs. an embedded one is that Apache itself is configured to function as a reverse proxy.&lt;br /&gt;
&lt;br /&gt;
*Advantages&lt;br /&gt;
Single point of access – functions as a choke point so you consolidate applying security settings and makes management easier.&lt;br /&gt;
&lt;br /&gt;
Network topology is hidden from the outside world - so it will be more difficult for attackers to enumerate your web platforms.&lt;br /&gt;
&lt;br /&gt;
Increased performance – if SSL accelerators/caching used.&lt;br /&gt;
&lt;br /&gt;
You can implement vulnerability filters to protect and vulnerable web server or application on the back-end (IIS, Netscape, ASP, PHP, etc...). See related section on Virtual Patching.&lt;br /&gt;
&lt;br /&gt;
*Disadvantages&lt;br /&gt;
A potential traffic bottleneck if the reverse proxy can not handle the network load.&lt;br /&gt;
&lt;br /&gt;
A potential point of failure - if the reverse proxy goes down it may cause a denial of service to the web applications that are behind it.&lt;br /&gt;
&lt;br /&gt;
Requires changes to the network.&lt;br /&gt;
&lt;br /&gt;
== Configuring ModSecurity ==&lt;br /&gt;
&lt;br /&gt;
=== Should I initially set the SecRuleEngine to On? ===&lt;br /&gt;
&lt;br /&gt;
No. Every Ruleset can have false positive in new environments and any new installation should initially use the log only Ruleset version or if no such version is available, set ModSecurity to Detection only using the SecRuleEngine DetectionOnly command. After running ModSecurity in a detection only mode for a while review the evens generated and decide if any modification to the rule set should be made before moving to protection mode.&lt;br /&gt;
&lt;br /&gt;
=== How do I get ModSecurity to inspect request and response bodies? ===&lt;br /&gt;
&lt;br /&gt;
You need to set the the following two directives:&lt;br /&gt;
&lt;br /&gt;
SecRequestBodyAccess On&lt;br /&gt;
&lt;br /&gt;
SecResponseBodyAccess On&lt;br /&gt;
&lt;br /&gt;
=== How can I verify exactly how ModSecurity is processing rules and requests? ===&lt;br /&gt;
&lt;br /&gt;
You need to enable the debug log with SecDebugLog and increase the log level with SecDebugLogLevel. It you set the debug log level to 9, it will tell you exactly what tasks it is completing along with what data it is acting upon. Do be aware that while the increased debug log level does help from a troubleshooting perspective, it does negatively impact performance.&lt;br /&gt;
&lt;br /&gt;
== ModSecurity Rules Language ==&lt;br /&gt;
&lt;br /&gt;
=== What are the OWASP ModSecurity Core Rules (CRS) and why should I use them? ===&lt;br /&gt;
&lt;br /&gt;
Using ModSecurity requires rules. In order to enable users to take full advantage of ModSecurity immediately, Trustwave's SpiderLabs is sponsoring the OWASP ModSecrity Core Rule Set (CRS) Project. Unlike intrusion detection and prevention systems which rely on signature specific to known vulnerabilities, the Core Rule Set provides generic protection from unknown vulnerabilities often found in web application that are in most cases custom coded. You may also consider writing custom rules for providing a positive security envelope to your application or critical parts of it. The Core Rule Set is heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity.&lt;br /&gt;
&lt;br /&gt;
=== What attacks do the Core Rules protect against? ===&lt;br /&gt;
&lt;br /&gt;
In order to provide generic web applications protection, the Core Rules use the following techniques:&lt;br /&gt;
&lt;br /&gt;
*HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Errors Hiding – Disguising error messages sent by the server&lt;br /&gt;
&lt;br /&gt;
In addition the ruleset also hints at the power of ModSecurity beyond providing security by reporting access from the major search engines to your site.&lt;br /&gt;
&lt;br /&gt;
=== Can I use the Core Rules with ModSecurity 1.x? ===&lt;br /&gt;
&lt;br /&gt;
Unfortunately, no. The Core Rules takes advantage of the ModSecurity 2.0 rules language and is therefore not backward compatible.&lt;br /&gt;
&lt;br /&gt;
=== How do I whitelist an IP address so it can pass through ModSecurity? ===&lt;br /&gt;
&lt;br /&gt;
The first issue to realize is that in ModSecurity 2.0, the allow action is only applied to the current phase. This means that if a rule matches in a subsequent phase it may still take a disruptive action. The recommended rule configuration to allow a remote IP address to bypass ModSecurity rules is to do the following (where 192.168.1.100 should be substituted with the desired IP address):&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off&lt;br /&gt;
&lt;br /&gt;
If you want to allow uninterrupted access to the remote IP address, however you still want to log rule alerts, then you can use this rule -&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=DetectionOnly&lt;br /&gt;
&lt;br /&gt;
If you want to disable both the rule and audit engines, then you can optionally add another ctl action:&lt;br /&gt;
&lt;br /&gt;
SecRule REMOTE_ADDR &amp;quot;@ipMatch 192.168.110&amp;quot; phase:1,nolog,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off&lt;br /&gt;
&lt;br /&gt;
=== Are there rule differences for identify missing/empty variables between ModSecurity 1.x and 2.x? ===&lt;br /&gt;
&lt;br /&gt;
Yes there are. Many of these differences are outlined in the Migration Matrix document listed previously. Another common rule difference issue that arises is when you want to create white-listed ModSecurity rulesets which enforce that certain headers/variables are both present and not empty. In ModSecurity 1.x, you could create one rule that handles this while in ModSecurity 2.x you would need to write a chained rule.&lt;br /&gt;
&lt;br /&gt;
On the surface, you might think &amp;quot;The 1.x rules way is better since you only need 1 rule...&amp;quot; however you need to realize that anytime you have rules or directives that implicitly enforce certain capabilities, you run the risk of having false positives as it could match things that you didn't want them to. For instance, what if you have a situation where certain web clients (such as mobile devices) legitimately include some headers, however they are empty? Do you want to automatically block these clients? With the ModSecurity 1.x Rule Language, you would have to remove the entire rule. With the ModSecurity 2.x Rule Language, however, you are able to create rules to more accurately apply the logic that you desire.&lt;br /&gt;
&lt;br /&gt;
Please refer to the following blog post for more information.&lt;br /&gt;
&lt;br /&gt;
=== How do I handle False Positives and creating Custom Rules? ===&lt;br /&gt;
&lt;br /&gt;
It is inevitable; you will run into some False Positive hits when using web application firewalls. This is not something that is unique to ModSecurity. All web application firewalls will generate false positives from time to time. The following Blog post information will help to guide you through the process of identifying, fixing, implementing and testing new custom rules to address false positives.&lt;br /&gt;
http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html&lt;br /&gt;
&lt;br /&gt;
=== Will using a large amount of negative filtering rules impact performance? ===&lt;br /&gt;
&lt;br /&gt;
Yes. Each and every rule that you implement will consume resources (RAM, CPU, etc...). The two most important factors to consider with creating ModSecurity rules are the total number of rules and the Regular Expression optimizations. A single rule with a complex regular expression is significantly faster than multiple rules with simple regular expressions. Unfortunately, it is quite easy to create inefficient RegEx patterns. Optimizing RegExs by utilizing Grouping Only/Non-Capturing Parentheses can cut the validation time by up to 50%. The Core Ruleset is optimized for performance.&lt;br /&gt;
&lt;br /&gt;
=== What is a Virtual Patch and why should I care? ===&lt;br /&gt;
&lt;br /&gt;
Fixing identified vulnerabilities in web applications always requires time. Organizations often do not have access to a commercial application's source code and are at the vendor's mercy while waiting for a patch. Even if they have access to the code, implementing a patch in development takes time. This leaves a window of opportunity for the attacker to exploit. External patching (also called &amp;quot;just-in-time patching&amp;quot; and &amp;quot;virtual patching&amp;quot;) is one of the biggest advantages of web application firewalls as they can fix this problem externally. A fix for a specific vulnerability is usually very easy to design and in most cases it can be done in less than 15 minutes.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Virtual_Patching_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
== Managing Alerts ==&lt;br /&gt;
&lt;br /&gt;
=== How do I manage ModSecurity logs if I have multiple installations? ===&lt;br /&gt;
&lt;br /&gt;
If you have more then 1 ModSecurity installation, you have undoubtedly run into issues with consolidating, analyzing and responding to alert messages. Unfortunately, the original &amp;quot;Serial&amp;quot; format of the audit log was multi-line with all records held within one file. This made remote logging difficult. What was really needed was to have a mechanism to send logs onto a centralized logging host made specifically for processing ModSecurity Alert data. This is the purpose of the mlogc program. It comes with the ModSecurity source code and can be used to send individual audit log entries to a remote host in near real-time.&lt;br /&gt;
&lt;br /&gt;
=== Is there an open source Console to send my audit logs to? ===&lt;br /&gt;
&lt;br /&gt;
Christian Bockermann has developed an outstanding free tool called AuditConsole that allows you to centralize and analyze remote ModSecurity audit log data.&lt;br /&gt;
&lt;br /&gt;
=== Can I send ModSecurity alert log data through Syslog? ===&lt;br /&gt;
&lt;br /&gt;
Yes. If you already have a central Syslog infrastructure setup and/or if you are using some sort of SIEM application, then you might want to include the short version ModSecurity alert messages that appear in the Apache error_log file. You can easily reconfigure Apache to send its error logs through Syslog onto a remote, central logging server. However, the data being forwarded is a very small subset of the entire transaction. It is only a warning message and not enough information to conduct proper incident response to determine if there was a false positive or if it was a legitimate attack. In order to determine this information, you need access to the ModSecurity Audit log files.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_ModSecurity_Core_Rule_Set_Project/Releases/ModSecurity_2.2.0&amp;diff=181344</id>
		<title>Projects/OWASP ModSecurity Core Rule Set Project/Releases/ModSecurity 2.2.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_ModSecurity_Core_Rule_Set_Project/Releases/ModSecurity_2.2.0&amp;diff=181344"/>
				<updated>2014-08-28T12:54:23Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP ModSecurity Core Rule Set Project&lt;br /&gt;
| project_home_page = :Category:OWASP ModSecurity Core Rule Set Project&lt;br /&gt;
&lt;br /&gt;
| release_name = ModSecurity 2.2.8&lt;br /&gt;
| release_date = 06/30/2013 &lt;br /&gt;
| release_description = &lt;br /&gt;
== Version 2.2.8 - 06/30/2013 ==&lt;br /&gt;
&lt;br /&gt;
Security Fixes:&lt;br /&gt;
&lt;br /&gt;
Improvements:&lt;br /&gt;
* Updatd the /util directory structure&lt;br /&gt;
* Added scripts to check Rule ID duplicates&lt;br /&gt;
* Added script to remove v2.7 actions so older ModSecurity rules will work&lt;br /&gt;
  - https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/43&lt;br /&gt;
* Added new PHP rule (958977) to detect PHP exploits (Plesk 0-day from king cope)&lt;br /&gt;
  - http://seclists.org/fulldisclosure/2013/Jun/21&lt;br /&gt;
  - http://blog.spiderlabs.com/2013/06/honeypot-alert-active-exploits-attempts-for-plesk-vulnerability-.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bug Fixes:&lt;br /&gt;
* fix 950901 - word boundary added&lt;br /&gt;
  - https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/48&lt;br /&gt;
* fix regex error&lt;br /&gt;
  - https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/44&lt;br /&gt;
* Updated the Regex in 981244 to include word boundaries&lt;br /&gt;
  - https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/36&lt;br /&gt;
* Problem with Regression Test (Invalid use of backslash) - Rule 960911 - Test2&lt;br /&gt;
  - https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/34&lt;br /&gt;
* ModSecurity: No action id present within the rule - ignore_static.conf&lt;br /&gt;
  - https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/17&lt;br /&gt;
* &amp;quot;Bad robots&amp;quot; rule blocks all Java applets on Windows XP machines&lt;br /&gt;
  - https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/16&lt;br /&gt;
* duplicated rules id 981173&lt;br /&gt;
  - https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/18&lt;br /&gt;
&lt;br /&gt;
| release_license = [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License v2 (ASLv2)]&lt;br /&gt;
&lt;br /&gt;
| release_download_link = https://github.com/SpiderLabs/owasp-modsecurity-crs/releases/tag/2.2.8  &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Ryan Barnett&lt;br /&gt;
| leader_email1 = Ryan.Barnett@owasp.org&lt;br /&gt;
| leader_username1 = Rcbarnett &lt;br /&gt;
&lt;br /&gt;
| release_notes = http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.2.0_-_Notes&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=179180</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=179180"/>
				<updated>2014-07-22T18:38:03Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Ohloh */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Open HUB==&lt;br /&gt;
https://www.openhub.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=178936</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=178936"/>
				<updated>2014-07-17T20:36:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Quick Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Submit an Incident ==&lt;br /&gt;
[https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AvaknFl7LiV2dHRLNEVoNks4YlJuZ1JIWHhyaG5OM2c&amp;amp;usp=drive_web#gid=1 Full WHID Spreadsheet on Google Docs]&lt;br /&gt;
* [https://www.google.com/fusiontables/data?docid=1PqK-eOdhn14po2MY31Knz1nJ48Q--k7uVCJcIqFg#rows:id=1 Full WHID Data on Google Fusion Tables]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [18 Feb 2014] WHID Becomes an OWASP Project&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What incidents are included in the Web Hacking Incidents Database?&lt;br /&gt;
: The Web Hacking Incident Database only tracks media reported security incidents that can be associated with a web application security vulnerability. We also try to limit the database only to targeted attacks, though the distinction between targeted and non-targeted attacks is grey. The database does not include known vulnerabilities in web based applications, an area well covered by other databases such as CVE, OSVDB or the  Bugtraq vulnerabilities database. Neither does the database include incidents in which web site were breached using operating system or network layer vulnerabilities. We also consider most web site defacements as non targeted attacks and do not include them in the database. For information about web site defacements refer to zone-h.&lt;br /&gt;
: As those criteria are somewhat subjective, we welcome comments on the inclusion or exclusion of publicized security breaches.&lt;br /&gt;
 &lt;br /&gt;
; Were there only few dozen web hacks last year?&lt;br /&gt;
: The criteria for inclusion in WHID are very strict. The goal is to list only incidents that are related to web application layer vulnerabilities/attacks. The goal is to show that application layer security is a risk we cannot ignore anymore.&lt;br /&gt;
: Keep in mind, that while there are countless website hacks and defacements most are not reported. Even for those reported most of the time it is difficult to tell how exactly they occurred.&lt;br /&gt;
: Specifically addressing the defacement incidents reported in zone-h, bear in mind that in nearly all of these incidents there is no public information on the way in which they were carried. Additionally, many defacements are not targeted and are the result of a wide scan for vulnerable sites and therefore we do not normally include defacements in WHID.&lt;br /&gt;
 &lt;br /&gt;
; Why can't I find a well known incident in the database?&lt;br /&gt;
: The reason is probably that the incident did not occur due to a web application vulnerability, or that we do not know how did it happen. For example probably the most well known information security breach ever, the CardSystems incident was added only in April 2006, nearly a year after it was initially publicized. While we always suspected that it was a web hack and industry rumors hinted that, no public information regarding the way in which the hack was done was available until April 2006. Actually the CardSystems incident was brought in previous versions of this FAQ as an example of an incident that we would like to add to WHID but cannot. For other hacks such information is not available and may not become available in the future.&lt;br /&gt;
 &lt;br /&gt;
; How reliable are the incidents reported at WHID?&lt;br /&gt;
: The data collected is NOT reported directly to WASC but is rather collected from public sources, mostly technical media, mailing list post and researchers advisories. As a result the reliability of the reported information depends on the source. Since the source (or sources) is included with each entry, the reader can assess its reliability independently. We do however assess the source before including an incident in the database and if for whatever reason something we added to the database is found to be erroneous, we remove it, though this has ever happened to date.&lt;br /&gt;
: For media reported incidents, we're trusting that the reporter or news outlet verified the information. For mailing list reported incidents and research advisories, these issues are normally quickly confirmed our refuted by other subscribers or by the offended vendor. In case of doubt evaluate the level of information provided in the disclosure and the publishing history of the researcher.&lt;br /&gt;
 &lt;br /&gt;
; Breach vs. Disclosure&lt;br /&gt;
: The database includes two types of incidents: &amp;quot;breach&amp;quot; or &amp;quot;disclosure&amp;quot;. Breaches are incidents in which a web site was compromised, while disclosures are incidents in which a researcher published a vulnerability in a web site. In other words, breaches are incidents in which we know bad guys took advantage of a vulnerability, while disclosures are incidents in which we hope the good guys were first.&lt;br /&gt;
 &lt;br /&gt;
; The &amp;quot;Unknown&amp;quot; Threat Classification&lt;br /&gt;
: All incidents are classified according to the Web Application Security Consortium Threat Classification (WASC-TC). This classification sheds light on the nature of the security vulnerability in the web application.&lt;br /&gt;
: Some of the incidents are classified as &amp;quot;Unknown&amp;quot;. You may wonder why were these incidents included in the list, as there is no way to know that the hacker exploited a web application vulnerability. In some cases the public information available indicates that the incident exploited a web application vulnerability, and in others we deducted from the available information.&lt;br /&gt;
 &lt;br /&gt;
; How can I contribute?&lt;br /&gt;
: The Web Hacking Incidents Database (WHID) is a community effort.  The information is provided under the open source Creative Common License, which in very simple words says that anyone can use the information for whatever need as long as the source is mentioned.&lt;br /&gt;
: You can help make WHID better. You don't need to invest a lot of time:&lt;br /&gt;
* If you encounter a new Web incident, please use one of the following methods to notify the WHID project team:&lt;br /&gt;
** Send an email to - owaspwhid_at_owasp.org&lt;br /&gt;
** Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
** Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
* As we natively speak English we miss alot in non English speaking countries so we are especially looking for non English sources. As long as they can be translated using Google translate of a similar service, we can include it.&lt;br /&gt;
* If you want to contribute more, become a WHID editor. Send an e-mail to the project leader with a few words (and preferably a link) about yourself and sign up to this site. We will activate your account and enable you to edit incidents. We need you to:&lt;br /&gt;
** Classify incidents a backlog of incidents from 2nd half of 2013.&lt;br /&gt;
** You can help by Proofing/editing the descriptions and classifications.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* [https://twitter.com/oshezaf Ofer Shezaf]&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* If you would like to have WRITE access so you can add entries directly to WHID in Google FusionTables, contact the project team and we will add your Gmail account.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173210</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173210"/>
				<updated>2014-04-22T18:46:29Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Ohloh */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Ohloh==&lt;br /&gt;
http://www.ohloh.net/p/owasp-modsecurity-crs&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173209</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173209"/>
				<updated>2014-04-22T18:44:57Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Ohlo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Ohloh==&lt;br /&gt;
https://www.ohloh.net/p/modsecurity&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173208</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173208"/>
				<updated>2014-04-22T18:44:29Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Licensing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
==Ohlo==&lt;br /&gt;
https://www.ohloh.net/p/modsecurity&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=173127</id>
		<title>Projects/OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=173127"/>
				<updated>2014-04-21T15:15:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Project About&lt;br /&gt;
| project_name =OWASP WASC Web Hacking Incidents Database Project&lt;br /&gt;
| project_home_page =OWASP WASC Web Hacking Incidents Database Project&lt;br /&gt;
| project_description =The web hacking incident database (WHID) is a project dedicated to maintaining a list of web applications related security incidents. WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability.  This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting. &lt;br /&gt;
| project_license =Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
| leader_name1 =Ryan Barnett&lt;br /&gt;
| leader_email1 =ryan.barnett@owasp.org&lt;br /&gt;
| leader_username1 =Rcbarnett&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt&lt;br /&gt;
| current_release_name = LIVE WHID Dataset on Google Fusion Tables&lt;br /&gt;
| current_release_date = &lt;br /&gt;
| current_release_download_link = https://www.google.com/fusiontables/DataSource?snapid=S1257901DGNM&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project/Roadmap&lt;br /&gt;
| project_health_status = &lt;br /&gt;
| current_release_name = LIVE WHID Dataset on Google Fusion Tables&lt;br /&gt;
| current_release_date = April 2014&lt;br /&gt;
| current_release_download_link = https://www.google.com/fusiontables/DataSource?snapid=S1257901DGNM&lt;br /&gt;
| current_release_rating = &lt;br /&gt;
| current_release_leader_name = Ryan Barnett&lt;br /&gt;
| current_release_leader_email = ryan.barnett@owasp.org&lt;br /&gt;
| current_release_leader_username = Rcbarnett&lt;br /&gt;
| current_release_details = &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173126</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173126"/>
				<updated>2014-04-21T14:59:35Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173125</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project&amp;diff=173125"/>
				<updated>2014-04-21T14:56:36Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ModSecurity Core Rule Set (CRS)==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS Project's goal is to provide an easily &amp;quot;pluggable&amp;quot; set of generic attack detection rules that provide a base level of protection for any web application.   &lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS is a set of web application defense rules for the open source, cross-platform [http://www.modsecurity.org/ ModSecurity] Web Application Firewall (WAF).&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP ModSecurity CRS provides protections if the following attack/threat categories:&lt;br /&gt;
*HTTP Protection - detecting violations of the HTTP protocol and a locally defined usage policy.&lt;br /&gt;
*Real-time Blacklist Lookups - utilizes 3rd Party IP Reputation&lt;br /&gt;
*HTTP Denial of Service Protections - defense against HTTP Flooding and Slow HTTP DoS Attacks.&lt;br /&gt;
*Common Web Attacks Protection - detecting common web application security attack.&lt;br /&gt;
*Automation Detection - Detecting bots, crawlers, scanners and other surface malicious activity.&lt;br /&gt;
*Integration with AV Scanning for File Uploads - detects malicious files uploaded through the web application.&lt;br /&gt;
*Tracking Sensitive Data - Tracks Credit Card usage and blocks leakages.&lt;br /&gt;
*Trojan Protection - Detecting access to Trojans horses.&lt;br /&gt;
*Identification of Application Defects - alerts on application misconfigurations.&lt;br /&gt;
*Error Detection and Hiding - Disguising error messages sent by the server.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP ModSecurity CRS is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0.txt Apache Software License version 2 (ASLv2)], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP ModSecurity CRS? ==&lt;br /&gt;
&lt;br /&gt;
OWASP ModSecurity CRS provides:&lt;br /&gt;
&lt;br /&gt;
* Baseline protection for common web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt OWASP ModSecurity CRS Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/20166971 OWASP ModSecurity CRS Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader:&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
*[[:User:Josh Amishav-Zlatin|Josh Zlatin]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[:user:Roberto_Salgado|Roberto Salgado]]&amp;lt;br&amp;gt;&lt;br /&gt;
*[https://twitter.com/soaj1664ashar Ashar Javed (@soaj1664ashar)]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
*[[http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]]&lt;br /&gt;
*[[https://www.owasp.org/index.php/Category:OWASP_Blacklist_Regex_Repository OWASP Blacklist Regex Repository]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/tarball/master Latest CRS (TAR/GZ)]&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs/zipball/master Latest CRS (ZIP)]&lt;br /&gt;
&lt;br /&gt;
== Source Code Repo ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/owasp-modsecurity-crs OWASP ModSecurity CRS on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set OWASP CRS Mail-list]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Mature_projects.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  width=&amp;quot;50%&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0.html License: ASLv2]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;ModSecurity Core Rule Set Project&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP ModSecurity Core Rule Set Project | Project About}}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Inventory&amp;diff=171603</id>
		<title>OWASP Project Inventory</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Inventory&amp;diff=171603"/>
				<updated>2014-04-04T13:11:33Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Flagship Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:Owasp_banner_web_pro.jpg|800px| link=https://www.owasp.org/index.php/Category:OWASP_Project]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Incubator Projects  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Code'''&lt;br /&gt;
* [https://www.owasp.org/index.php/Opa OWASP OPA]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_Encoder_Project OWASP Java Encoder Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passfault OWASP Passfault]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OctoMS OWASP OctoMS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AW00T OWASP AW00t]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JSON_Sanitizer OWASP JSON Sanitizer]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Research_and_Development_Framework OWASP Security Research and Development Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_1-Liner OWASP 1-Liner]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Focus OWASP Focus]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHPRBAC_Project OWASP PHPRBAC Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_EJSF_Project OWASP EJSF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Barbarus OWASP Barbarus]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iMAS_iOS_Mobile_Application_Security_Project OWASP iMAS - iOS Mobile Application Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_RBAC_Project OWASP RBAC Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHP_Security_Project OWASP PHP Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Simple_Host_Base_Incidence_Detection_System_Project OWASP Simple Host Base Incidence Detection System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Format_Validation_Project OWASP File Format Validation Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JAWS_Project OWASP JAWS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project OWASP Node.js Goat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ISO_IEC_27034_Application_Security_Controls_Project OWASP ISO/IEC 27034 Application Security Controls Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ultimatum_Project OWASP Ultimatum Project]&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WhatTheFuzz_Project#tab=Project_About OWASP WhatTheFuzz Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Tools_for_Developers_Project OWASP Security Tools for Developers Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OVAL_Content_Project OWASP OVAL Content Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_NAXSI_Project OWASP NAXSI Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passw3rd_Project OWASP Passw3rd Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_WebGoat.NET OWASP WebGoat.NET]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Path_Traverser OWASP Path Traverser]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWASP_Watiqay OWASP Watiqay]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_Security_Shepherd/Roadmap OWASP Security Shepherd]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework OWASP Xenotix XSS Exploit Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mantra_OS OWASP Mantra OS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_XSSER OWASP XSSER]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Academy_Portal_Project OWASP Academy Portal Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ASIDE_Project OWASP ASIDE Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iGoat_Project OWASP iGoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Proxy OWASP Proxy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SamuraiWTF_Project OWASP SamuraiWTF]&lt;br /&gt;
* [https://www.owasp.org/index.php/O-Saft O-Saft]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Crowdtesting OWASP Crowdtesting]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OpenStack_Security_Project OWASP OpenStack Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Desktop_Goat_and_Top_5_Project OWASP Desktop Goat and Top 5 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Bricks OWASP Bricks]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hive_Project OWASP Hive Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Droid_Fusion OWASP Droid Fusion]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iSABEL_Proxy_Server OWASP iSABEL Proxy Server]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project OWASP Rails Goat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Bywaf_Project OWASP Bywaf Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_S.T.I.N.G_Project OWASP S.T.I.N.G Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Fuzzing_Framework_Project OWASP Application Fuzzing Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VaultDB_Project OWASP VaultDB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WS_Amplification_DoS_Project OWASP WS-Amplification DoS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project OWASP Mutillidae 2 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Skanda_SSRF_Exploitation_Framework OWASP Skanda - SSRF Exploitation Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP SeraphimDroid Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Unmaskme_Project OWASP Unmaskme Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Androick_Project OWASP Androïck Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SafeNuGet_Project OWASP SafeNuGet Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WebSandBox_Project OWASP WebSandBox Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HA_Vulnerability_Scanner_Project OWASP HA Vulnerability Scanner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Dependency_Track_Project OWASP Dependency Track Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHP_Portscanner_Project OWASP PHP Portscaner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer OWASP Java HTML Sanitizer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Pygoat_Project OWASP Pygoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Python_Security_Project OWASP Python Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WebSpa_Project OWASP WebSpa Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Financial_Information_Exchange_Security_Project OWASP Financial Information Exchange Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_STeBB_Project OWASP STeBB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_NINJA_PingU_Project OWASP NINJA PingU Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Encoder_Comparison_Reference_Project OWASP Encoder Comparison Reference Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_SQLiX_Project OWASP sqliX Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_LAPSE_Project OWASP LAPSE Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project OWASP WASC Distributed Web Honeypots Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Click_Me_Project OWASP Click Me Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_TDD_Project OWASP Secure TDD Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_XSecurity_Project OWASP XSecurity Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Pyttacker_Project OWASP Pyttacker Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_XML_Templates_Project OWASP Java XML Templates Project]&lt;br /&gt;
&lt;br /&gt;
'''Documentation'''&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Data_Exchange_Format_Project OWASP Data Exchange Format Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Cheat_Sheets OWASP Cheat Sheets Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Proactive_Controls OWASP Proactive Controls]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_J2EE_Secure_Development_Curriculum OWASP Java/J2EE Secure Development Curriculum]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Baseline_Project OWASP Security Baseline Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Software_Security_Assurance_Process OWASP Software Security Assurance Process]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Accessibility_Project#tab=Project_About OWASP Web Application Security Accessibility Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Requirements_Project OWASP Application Security Requirements Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Common_Numbering_Project OWASP Common Numbering Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Assessment_Standards_Project OWASP Application Security Assessment Standards Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Skills_Assessment OWASP Application Security Skills Assessment]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CBT_Project OWASP Computer Based Training Project (OWASP CBT Project)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Enterprise_Application_Security_Project OWASP Enterprise Application Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Exams_Project OWASP Exams Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_GoatDroid_Project OWASP GoatDroid Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_RFP-Criteria OWASP Request For Proposal]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_University_Challenge OWASP University Challenge]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hacking_Lab OWASP Hacking-Lab]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Awareness_Top_10_E-learning_Project OWASP Application Security Awareness Top 10 E-learning Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Periodic_Table_of_Vulnerabilities OWASP Periodic Table of Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]&lt;br /&gt;
* [https://www.owasp.org/index.php/ESAPI_Swingset OWASP ESAPI Swingset Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Press OWASP Press]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_CISO_Survey OWASP CISO Survey]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Guide_For_CISOs_Project OWASP Application Security Guide For CISOs]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Scada_Security_Project OWASP Scada Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Application_Design_Project OWASP Secure Application Design Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10_Fuer_Entwickler_Project OWASP Top 10 Fuer Entwickler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Good_Component_Practices_Project OWASP Good Component Practices Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Quick_Reference_Guide_Project OWASP Web Application Security Quick Reference Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Windows_Binary_Executable_Files_Security_Checks_Project OWASP Windows Binary Executable Files Security Checks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Wordpress_Security_Checklist_Project OWASP Wordpress Security Checklist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project OWASP Supporting Legacy Web Applications in the Current Environment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Principles_Project OWASP Security Principles Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ruby_on_Rails_and_friends_Security_Guide OWASP Ruby on Rails and friends Security Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Framework_Security_Project OWASP Framework Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Media_Project OWASP Media Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Global_Chapter_Meetings_Project OWASP Global Chapter Meetings Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project OWASP Vulnerable Web Applications Directory Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project OWASP Game Security Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Labeling_System_Project OWASP Security Labeling System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_IoTs_Project OWASP IoTs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Insecure_Web_Components_Project OWASP Insecure Web Components Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project OWASP Reverse Engineering and Code Modification Prevention Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Student_Chapters_Program OWASP Student Chapters Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Education_Project OWASP Education Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Speakers_Project OWASP Speakers Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project OWASP Internet of Things Top Ten Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_.NET_Project OWASP .NET Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Research_Book_Project OWASP Research Book Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Open_Cyber_Security_Framework_Project OWASP Open Cyber Security Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ISO_Project OWASP ISO Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10_Privacy_Risks_Project OWASP Top 10 Privacy Risks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WASC_Web_Hacking_Incidents_Database_Project OWASP WASC Web Hacking Incidents Database Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Frameworks_Project OWASP Security Frameworks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Incident_Response_Project OWASP Incident Response Project]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
  &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt;&lt;br /&gt;
&amp;lt;!-- There be dragons here --&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Labs Projects  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tools''' &lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project OWASP Broken Web Applications Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWASP CSRFTester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_EnDe OWASP EnDe Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool OWASP HTTP POST Tool]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mantra_-_Security_Framework OWASP Mantra Security Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Mutillidae OWASP Mutillidae Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_O2_Platform OWASP O2 Platform]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Vicnum_Project OWASP Vicnum Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Yasca_Project OWASP Yasca Project]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Documentation'''&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series OWASP AppSec Tutorial Series]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project OWASP AppSensor Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CTF_Project OWASP CTF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Legal_Project OWASP Legal Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Podcast OWASP Podcast Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Virtual_Patching_Best_Practices Virtual Patching Best Practices]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Flagship Projects  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Code'''&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFGuard_Project OWASP CSRFGuard Project]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
* [https://www.owasp.org/index.php?title=OWASP_Web_Testing_Environment_Project OWASP Web Testing Environment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Webgoat OWASP WebGoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Documentation'''&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project OWASP Code Review Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Codes_of_Conduct OWASP Codes of Conduct]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Guide_Project OWASP Development Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model OWASP Software Assurance Maturity Model (SAMM)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top Ten Project]&lt;br /&gt;
&lt;br /&gt;
= Archived Projects  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Archived Projects ==&lt;br /&gt;
&lt;br /&gt;
OWASP Archived Projects are inactive Labs projects. If you are interested in pursuing any of the projects below, please contact us and let us know of your interest.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Access_Control_Rules_Tester_Project OWASP Access Control Rules Tester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Metrics_Project OWASP Application Security Metrics Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AppSec_FAQ_Project OWASP AppSec FAQ Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Asdr OWASP ASDR Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Backend_Security_Project OWASP Backend Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls OWASP Best Practices: Use of Web Application Firewalls]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CAL9000_Project OWASP CAL9000 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CLASP_Project OWASP CLASP Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Code_Crawler OWASP CodeCrawler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Content_Validation_using_Java_Annotations_Project OWASP Content Validation using Java Annotations Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project OWASP DirBuster Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Encoding_Project OWASP Encoding Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Google_Hacking_Project OWASP Google Hacking Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project OWASP Insecure Web App Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Interceptor_Project OWASP Interceptor Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_JSP_Testing_Tool_Project OWASP JSP Testing Tool Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_LiveCD_Education_Project OWASP LiveCD Education Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Logging_Project OWASP Logging Guide]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_NetBouncer_Project OWASP NetBouncer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp OWASP OpenPGP Extensions for HTTP - Enigform and mod_openpgp Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_OpenSign_Server_Project OWASP OpenSign Server Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project OWASP Pantera Web Assessment Studio Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_PHP_Project OWASP PHP Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/ORG_%28OWASP_Report_Generator%29 OWASP Report Generator]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_SASAP_Project OWASP Scholastic Application Security Assessment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Analysis_of_Core_J2EE_Design_Patterns_Project OWASP Security Analysis of Core J2EE Design Patterns Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Security_Spending_Benchmarks OWASP Security Spending Benchmarks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SiteGenerator OWASP Site Generator Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Skavenger_Project OWASP Skavenger Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Source_Code_Flaws_Top_10_Project OWASP Source Code Flaws Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Sprajax_Project OWASP Sprajax Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Sqlibench_Project OWASP Sqlibench Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Teachable_Static_Analysis_Workbench_Project OWASP Teachable Static Analysis Workbench Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Tiger OWASP Tiger]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Tools_Project OWASP Tools Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_Uniform_Reporting_Guidelines OWASP Uniform Reporting Guidelines]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_WeBekci_Project OWASP Webekci Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/JBroFuzz JBroFuzz]&lt;br /&gt;
* [https://owasp.org/index.php/Category:OWASP_SWAAT_Project OWASP SWAAT Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Web_Application_Framework_Manifesto OWASP Secure Web Application Framework Manifesto]&lt;br /&gt;
* [https://www.owasp.org/index.php/Scrubbr OWASP Scrubbr]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes OWASP JavaScript Sandboxes Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project OWASP Joomla Vulnerability Scanner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hatkit_Datafiddler_Project OWASP Hatkit Datafiddler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hatkit_Proxy_Project OWASP Hatkit Proxy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Fiddler_Addons_for_Security_Testing_Project OWASP Fiddler Addons for Security Testing Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Forward_Exploit_Tool_Project OWASP Forward Exploit Tool Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database OWASP Fuzzing Code Database]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Cloud_‐_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Browser_Testing_System_Project OWASP Web Browser Testing System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Webscarab OWASP WebScarab Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Webslayer_Project OWASP Webslayer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_WSFuzzer_Project OWASP WSFuzzer Project]&lt;br /&gt;
* [http://owasp.com/index.php/Category:OWASP_Security_Assurance_Testing_of_Virtual_Worlds_Project OWASP Security Assurance Testing of Virtual Worlds Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WAF_Project OWASP WAF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VFW_Project OWASP VFW Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SIMBA_Project OWASP SIMBA Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ONYX OWASP ONYX]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_Uncertain_Form_Submit_Prevention OWASP Java Uncertain Form Submit Prevention]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ecuador OWASP Ecuador]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ESOP_Framework OWASP ESOP Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Alchemist_Project OWASP Alchemist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_the_Flag_Competition_Project OWASP Secure the Flag Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Browser_Security_ACID_Tests_Project OWASP Browser Security ACID Test Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AJAX_Crawling_Tool OWASP AJAX Crawling Tool]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Threat_Modelling_Project OWASP Threat Modeling Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Crossword_of_the_Month OWASP Crossword of the Month]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Password_Project OWASP Secure Password Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Myth_Breakers_Project OWASP Myth Breakers Project]&lt;br /&gt;
* [http://owasp.com/index.php/OWASP_Project_Partnership_Model OWASP Project Partnership Model]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Browser_Security_Project OWASP Browser Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Program_for_Managers OWASP Application Security Program for Managers]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Favicon_Database_Project OWASP Favicon Database Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Embedded_Application_Security OWASP Embedded Application Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_JDIs_Project OWASP Security JDIs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Hash_Repository OWASP File Hash Repository]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Project Types =&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFGuard_Project OWASPCSRF Guard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Opa OWASP OPA]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_Encoder_Project OWASP Java Encoder Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passfault OWASP Passfault]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OctoMS OWASP OctoMS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AW00T OWASP AW00t]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JSON_Sanitizer OWASP JSON Sanitizer]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Research_and_Development_Framework OWASP Security Research and Development Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_1-Liner OWASP 1-Liner]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Focus OWASP Focus]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHPRBAC_Project OWASP PHPRBAC Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_EJSF_Project OWASP EJSF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Barbarus OWASP Barbarus]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iMAS_iOS_Mobile_Application_Security_Project OWASP iMAS - iOS Mobile Application Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_RBAC_Project OWASP RBAC Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHP_Security_Project OWASP PHP Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Simple_Host_Base_Incidence_Detection_System_Project OWASP Simple Host Base Incidence Detection System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Format_Validation_Project OWASP File Format Validation Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JAWS_Project OWASP JAWS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project OWASP Node.js Goat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ISO_IEC_27034_Application_Security_Controls_Project OWASP ISO/IEC 27034 Application Security Controls Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ultimatum_Project OWASP Ultimatum Project]&lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
* [https://www.owasp.org/index.php?title=OWASP_Web_Testing_Environment_Project OWASP Web Testing Environment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Webgoat OWASP WebGoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project OWASP Broken Web Applications Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWAsP CSRFTester Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_EnDe OWASP EnDe Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool OWASP HTTP Post Tool]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_XML_Templates_Project OWASP Java XML Templates Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mantra_-_Security_Framework OWASP Mantra Security Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Mutillidae OWASP Mutillidae Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_O2_Platform OWASP O2 Platform]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Vicnum_Project OWASP Vicnum Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Project_Information:template_Yasca_Project OWASP Yasca Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WhatTheFuzz_Project#tab=Project_About OWASP WhatTheFuzz Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Tools_for_Developers_Project OWASP Security Tools for Developers Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OVAL_Content_Project OWASP OVAL Content Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_NAXSI_Project OWASP NAXSI Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Passw3rd_Project OWASP Passw3rd Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_File_Hash_Repository OWASP File Hash Repository]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_WebGoat.NET OWASP WebGoat.NET]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Path_Traverser OWASP Path Traverser]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWASP_Watiqay OWASP Watiqay]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_Security_Shepherd/Roadmap OWASP Security Shepherd]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework OWASP Xenotix XSS Exploit Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mantra_OS OWASP Mantra OS]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_XSSER OWASP XSSER]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Academy_Portal_Project OWASP Academy Portal Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_ASIDE_Project OWASP ASIDE Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iGoat_Project OWASP iGoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Proxy OWASP Proxy Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SamuraiWTF_Project OWASP SamuraiWTF]&lt;br /&gt;
* [https://www.owasp.org/index.php/O-Saft O-Saft]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Crowdtesting OWASP Crowdtesting]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OpenStack_Security_Project OWASP OpenStack Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Desktop_Goat_and_Top_5_Project OWASP Desktop Goat and Top 5 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Bricks OWASP Bricks]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hive_Project OWASP Hive Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Droid_Fusion OWASP Droid Fusion]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_iSABEL_Proxy_Server OWASP iSABEL Proxy Server]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project OWASP Rails Goat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Bywaf_Project OWASP Bywaf Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_S.T.I.N.G_Project OWASP S.T.I.N.G Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Fuzzing_Framework_Project OWASP Application Fuzzing Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_VaultDB_Project OWASP VaultDB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WS_Amplification_DoS_Project OWASP WS-Amplification DoS Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project OWASP Mutillidae 2 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Skanda_SSRF_Exploitation_Framework OWASP Skanda - SSRF Exploitation Framework]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP SeraphimDroid Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Unmaskme_Project OWASP Unmaskme Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Androick_Project OWASP Androïck Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_SafeNuGet_Project OWASP SafeNuGet Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_WebSandBox_Project OWASP WebSandBox Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_HA_Vulnerability_Scanner_Project OWASP HA Vulnerability Scanner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Dependency_Track_Project OWASP Dependency Track Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_PHP_Portscanner_Project OWASP PHP Portscaner Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer OWASP Java HTML Sanitizer Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Pygoat_Project OWASP Pygoat Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Python_Security_Project OWASP Python Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Knocking_Project OWASP Web Knocking Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Financial_Information_Exchange_Security_Project OWASP Financial Information Exchange Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_STeBB_Project OWASP STeBB Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_NINJA_PingU_Project OWASP NINJA PingU Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Encoder_Comparison_Reference_Project OWASP Encoder Comparison Reference Project]&lt;br /&gt;
&lt;br /&gt;
==Documentation==&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project OWASP Code Review Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Codes_of_Conduct OWASP Codes of Conduct]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Guide_Project OWASP Development Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model OWASP Software Assurance Maturity Model(SAMM)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top Ten Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series OWASP AppSec Tutorial Series]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project OWASP AppSensor Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CTF_Project OWASP CTF Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Legal_Project OWASP Legal Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Podcast OWASP Podcast Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Virtual_Patching_Best_Practices Virtual Patching Best Practices]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Data_Exchange_Format_Project OWASP Data Exchange Format Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Cheat_Sheets OWASP Cheat Sheets Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Proactive_Controls OWASP Proactive Controls]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_J2EE_Secure_Development_Curriculum OWASP Java/J2EE Secure Development Curriculum]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Baseline_Project OWASP Security Baseline Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Software_Security_Assurance_Process OWASP Software Security Assurance Process]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Accessibility_Project#tab=Project_About OWASP Web Application Security Accessibility Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Requirements_Project OWASP Application Security Requirements Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Common_Numbering_Project OWASP Common Numbering Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Assessment_Standards_Project OWASP Application Security Assessment Standards Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Skills_Assessment OWASP Application Security Skills Assessment]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_CBT_Project OWASP Computer Based Training Project (OWASP CBT Project)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Enterprise_Application_Security_Project OWASP Enterprise Application Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Exams_Project OWASP Exams Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Projects/OWASP_GoatDroid_Project OWASP GoatDroid Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_RFP-Criteria OWASP Request For Proposal]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_University_Challenge OWASP University Challenge]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Hacking_Lab OWASP Hacking-Lab]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Awareness_Top_10_E-learning_Project OWASP Application Security Awareness Top 10 E-learning Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Periodic_Table_of_Vulnerabilities OWASP Periodic Table of Vulnerabilities]&lt;br /&gt;
* [https://www.owasp.org/index.php/WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]&lt;br /&gt;
* [https://www.owasp.org/index.php/ESAPI_Swingset OWASP ESAPI Swingset Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Press OWASP Press]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_CISO_Survey OWASP CISO Survey]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Application_Security_Guide_For_CISOs_Project OWASP Application Security Guide For CISOs]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Scada_Security_Project OWASP Scada Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Secure_Application_Design_Project OWASP Secure Application Design Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10_Fuer_Entwickler_Project OWASP Top 10 Fuer Entwickler Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Good_Component_Practices_Project OWASP Good Component Practices Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Application_Security_Quick_Reference_Guide_Project OWASP Web Application Security Quick Reference Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Windows_Binary_Executable_Files_Security_Checks_Project OWASP Windows Binary Executable Files Security Checks Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Wordpress_Security_Checklist_Project OWASP Wordpress Security Checklist Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project OWASP Supporting Legacy Web Applications in the Current Environment Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Principles_Project OWASP Security Principles Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Ruby_on_Rails_and_friends_Security_Guide OWASP Ruby on Rails and friends Security Guide Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Framework_Security_Project OWASP Framework Security Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Media_Project OWASP Media Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Global_Chapter_Meetings_Project OWASP Global Chapter Meetings Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project OWASP Vulnerable Web Applications Directory Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project OWASP Game Security Framework Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Security_Labeling_System_Project OWASP Security Labeling System Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_IoTs_Project OWASP IoTs Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Insecure_Web_Components_Project OWASP Insecure Web Components Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project OWASP Reverse Engineering and Code Modification Prevention Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Student_Chapters_Program OWASP Student Chapters Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Education_Project OWASP Education Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Speakers_Project OWASP Speakers Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project OWASP Internet of Things Top Ten Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_.NET_Project OWASP .NET Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Research_Book_Project OWASP Research Book Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Open_Cyber_Security_Framework_Project OWASP Open Cyber Security Framework Project]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=170138</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=170138"/>
				<updated>2014-03-14T16:46:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Submit an Incident ==&lt;br /&gt;
[https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S1257901DGNM Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [18 Feb 2014] WHID Becomes an OWASP Project&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What incidents are included in the Web Hacking Incidents Database?&lt;br /&gt;
: The Web Hacking Incident Database only tracks media reported security incidents that can be associated with a web application security vulnerability. We also try to limit the database only to targeted attacks, though the distinction between targeted and non-targeted attacks is grey. The database does not include known vulnerabilities in web based applications, an area well covered by other databases such as CVE, OSVDB or the  Bugtraq vulnerabilities database. Neither does the database include incidents in which web site were breached using operating system or network layer vulnerabilities. We also consider most web site defacements as non targeted attacks and do not include them in the database. For information about web site defacements refer to zone-h.&lt;br /&gt;
: As those criteria are somewhat subjective, we welcome comments on the inclusion or exclusion of publicized security breaches.&lt;br /&gt;
 &lt;br /&gt;
; Were there only few dozen web hacks last year?&lt;br /&gt;
: The criteria for inclusion in WHID are very strict. The goal is to list only incidents that are related to web application layer vulnerabilities/attacks. The goal is to show that application layer security is a risk we cannot ignore anymore.&lt;br /&gt;
: Keep in mind, that while there are countless website hacks and defacements most are not reported. Even for those reported most of the time it is difficult to tell how exactly they occurred.&lt;br /&gt;
: Specifically addressing the defacement incidents reported in zone-h, bear in mind that in nearly all of these incidents there is no public information on the way in which they were carried. Additionally, many defacements are not targeted and are the result of a wide scan for vulnerable sites and therefore we do not normally include defacements in WHID.&lt;br /&gt;
 &lt;br /&gt;
; Why can't I find a well known incident in the database?&lt;br /&gt;
: The reason is probably that the incident did not occur due to a web application vulnerability, or that we do not know how did it happen. For example probably the most well known information security breach ever, the CardSystems incident was added only in April 2006, nearly a year after it was initially publicized. While we always suspected that it was a web hack and industry rumors hinted that, no public information regarding the way in which the hack was done was available until April 2006. Actually the CardSystems incident was brought in previous versions of this FAQ as an example of an incident that we would like to add to WHID but cannot. For other hacks such information is not available and may not become available in the future.&lt;br /&gt;
 &lt;br /&gt;
; How reliable are the incidents reported at WHID?&lt;br /&gt;
: The data collected is NOT reported directly to WASC but is rather collected from public sources, mostly technical media, mailing list post and researchers advisories. As a result the reliability of the reported information depends on the source. Since the source (or sources) is included with each entry, the reader can assess its reliability independently. We do however assess the source before including an incident in the database and if for whatever reason something we added to the database is found to be erroneous, we remove it, though this has ever happened to date.&lt;br /&gt;
: For media reported incidents, we're trusting that the reporter or news outlet verified the information. For mailing list reported incidents and research advisories, these issues are normally quickly confirmed our refuted by other subscribers or by the offended vendor. In case of doubt evaluate the level of information provided in the disclosure and the publishing history of the researcher.&lt;br /&gt;
 &lt;br /&gt;
; Breach vs. Disclosure&lt;br /&gt;
: The database includes two types of incidents: &amp;quot;breach&amp;quot; or &amp;quot;disclosure&amp;quot;. Breaches are incidents in which a web site was compromised, while disclosures are incidents in which a researcher published a vulnerability in a web site. In other words, breaches are incidents in which we know bad guys took advantage of a vulnerability, while disclosures are incidents in which we hope the good guys were first.&lt;br /&gt;
 &lt;br /&gt;
; The &amp;quot;Unknown&amp;quot; Threat Classification&lt;br /&gt;
: All incidents are classified according to the Web Application Security Consortium Threat Classification (WASC-TC). This classification sheds light on the nature of the security vulnerability in the web application.&lt;br /&gt;
: Some of the incidents are classified as &amp;quot;Unknown&amp;quot;. You may wonder why were these incidents included in the list, as there is no way to know that the hacker exploited a web application vulnerability. In some cases the public information available indicates that the incident exploited a web application vulnerability, and in others we deducted from the available information.&lt;br /&gt;
 &lt;br /&gt;
; How can I contribute?&lt;br /&gt;
: The Web Hacking Incidents Database (WHID) is a community effort.  The information is provided under the open source Creative Common License, which in very simple words says that anyone can use the information for whatever need as long as the source is mentioned.&lt;br /&gt;
: You can help make WHID better. You don't need to invest a lot of time:&lt;br /&gt;
* If you encounter a new Web incident, please use one of the following methods to notify the WHID project team:&lt;br /&gt;
** Send an email to - owaspwhid_at_owasp.org&lt;br /&gt;
** Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
** Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
* As we natively speak English we miss alot in non English speaking countries so we are especially looking for non English sources. As long as they can be translated using Google translate of a similar service, we can include it.&lt;br /&gt;
* If you want to contribute more, become a WHID editor. Send an e-mail to the project leader with a few words (and preferably a link) about yourself and sign up to this site. We will activate your account and enable you to edit incidents. We need you to:&lt;br /&gt;
** Classify incidents a backlog of incidents from 2nd half of 2013.&lt;br /&gt;
** You can help by Proofing/editing the descriptions and classifications.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* [https://twitter.com/oshezaf Ofer Shezaf]&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* If you would like to have WRITE access so you can add entries directly to WHID in Google FusionTables, contact the project team and we will add your Gmail account.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=169488</id>
		<title>GSoC2014 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=169488"/>
				<updated>2014-03-05T14:42:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges ==&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Challenge Sandbox ===&lt;br /&gt;
&lt;br /&gt;
Now, in order to create a challenge, one has to validate the solution with regular expressions (or just plaintext comparison) and report success or failure to the backend,&lt;br /&gt;
we'd like the ability to write a normal vulnerable web application as a challenge and leave it to hackademic to make sure that the server is not affected.&lt;br /&gt;
Since this is probably the most difficult task proposed, if you are considering it, please get in touch with us early on so we can discuss about it and plan it correctly.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
''' *Administrator's point of view* '''&lt;br /&gt;
&lt;br /&gt;
Create an infrastructure that spawns virtual environments for users while keeping the load reasonable on the server(s).&lt;br /&gt;
Or configure apache,php,mysql in a way that allows for multiple instances of the programms to run in parallel completely seperated from the rest of the server.&lt;br /&gt;
The student is expected to provide configuration scripts that do the above&lt;br /&gt;
&lt;br /&gt;
''' *Coder's Way* '''&lt;br /&gt;
&lt;br /&gt;
This is better explained with an example:&lt;br /&gt;
In order to create an sql injection challenge one should be able to call a common unsecure mysql execute statement function.&lt;br /&gt;
The student can override common functions like this providing their own implementation of a very temporary database (based on flat files or nosql solutions e.t.c.).&lt;br /&gt;
The new functions should be able to detect the sqli and apply its results in a secure way(if the student drops a table no actual tables should be dropped but the table should not be visible to the student anymore).&lt;br /&gt;
&lt;br /&gt;
''' * Your solution here * '''&lt;br /&gt;
&lt;br /&gt;
The above solutions are by no way complete,their intention is to start you thinking.&lt;br /&gt;
This is a difficult task so if you consider takling it talk to us early on so we can reach a good solution which is possible in the GSoC timeframe.&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to run a big enough subset of OWASP WebGoat PHP with minimal modification as a Hackademic Challenge&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - CMS improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The new CMS was created during last year's GSOC. We have received feedback from users that suggest various improvements regarding functionality e.g. better user, teacher and challenges management. There are also some security improvements that are needed and in general any functionality that adds up to the educational nature of the project is more than welcome.&lt;br /&gt;
&lt;br /&gt;
Ideas on this project:&lt;br /&gt;
&lt;br /&gt;
* ''' Template''' *&lt;br /&gt;
&lt;br /&gt;
Since it's creation the project has received a good number of new features, but the visual/ux/ui part has never gotten much love.&lt;br /&gt;
It would be good if we had a new template with proper ui design.&lt;br /&gt;
&lt;br /&gt;
* '''Questionaire creation plugin''' *&lt;br /&gt;
&lt;br /&gt;
We'd like the admin to be able to create questionaires, assign rules for each question (e.g. correct answer +2pts incorrect answer -2, no answer 0)  and assign them to students as homework/exams.&lt;br /&gt;
The grading can either be done automatically (for multiple choice) or be submitted to the creator of the questionaire.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to show different articles on the user's home screen''' &lt;br /&gt;
&lt;br /&gt;
Now each user is served the latest article in her/his home screen. We need the ability for either  the teacher/admin to be able to define what article each class is served.&lt;br /&gt;
&lt;br /&gt;
* '''Gamification of the user's progress''' *&lt;br /&gt;
&lt;br /&gt;
A series of plugins and a template which allow the user to earn badges as they solve challenges and a better visual representation of their progress.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to define series of challenges'''&lt;br /&gt;
&lt;br /&gt;
The teacher/admin should be able to define a series of challenges (e.g. 2,5,3,1) which are meant to be solved in that order and if one is not solved then the student can't try the next one.&lt;br /&gt;
&lt;br /&gt;
* ''' Tagging of articles, users, challenges '''&lt;br /&gt;
&lt;br /&gt;
A user should be able to put tags on articles and challenges if he is a student and on users, classes, articles and challenges if he is a teacher.&lt;br /&gt;
Also the user should be able to search according to the tags.&lt;br /&gt;
&lt;br /&gt;
* '''Your idea here''' &lt;br /&gt;
&lt;br /&gt;
We welcome new ideas to make the project look awesome.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New features  and security improvements on the CMS part of the project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP and HTML. Good understanding of Application Security and related vulnerabilities if you undertake security improvements. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
===OWASP WebGoatPHP===&lt;br /&gt;
'''Description:'''&lt;br /&gt;
[[Webgoat]] is a deliberately insecure open source software made by OWASP using Java programming language. It has a set of challenges and steps, each providing the user with one or more web application vulnerability which user tries to solve. There are also hints and auto-detection of correct solutions. &lt;br /&gt;
Since Java is not the most common web application programming language, and it doesn't have many of the bugs other languages such as PHP have when it comes to security, OWASP has [[OWASP_WebGoat_Reboot2012|dedicated in 2012]] an amount of $5000 for promotion of WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about WebGoatPHP, I suggest downloading and giving WebGoat a try. It is one of OWASP prides (about 200000 downloads).&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' WebGoatPHP will be a deliberately insecure PHP web application which operates in different modes. A contest mode where challenges are selected by an admin and the system starts a contest. Admins can open up hints for participants and manage everything. A workshop mode, where the educator has control of the most of application features, as well as feedback of user activities and is ideal for learning environments, and a single mode where someone can browse challenges and solve them.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' You just need to know PHP. You are supposed to define flawed systems, which is not the hardest thing. Familiarity with web application security and SQL is recommended.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
==OWASP CSRF Guard==&lt;br /&gt;
===OWASP CSRF Guard===&lt;br /&gt;
'''Description:''' [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] is a complicated yet very effective web attack. The most important thing about CSRF is that it's hard to properly defend against it, specially when it comes to Web 2 and AJAX. We have had discussions on means of mitigating CSRF for years at OWASP, and are now ready to develop libraries for it. Many of the key ideas of this library can be found at [http://www.cs.sunysb.edu/~rpelizzi/jcsrf.pdf].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' A transparent Apache 2 module properly mitigating all POST CSRF attacks, as well as a lightweight PHP library doing the same.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisites:''' Knowing CSRF and at least one way to defend against it, PHP, C/C++, Linux.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP PHP Security Project==&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' Result of this project is much more security among PHP applications. Most PHP applications are vulnerable and there's no central approach to secure them (due to open source nature). Many people look at OWASP for such information.&lt;br /&gt;
&lt;br /&gt;
Last year, we got GSoC people working on OWASP PHPSEC, and we were the most active OWASP project. A lot of the libraries are in place, and this year, we will mostly work on the framework.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Anyone with adequate PHP programming language experience (possibly web application development in PHP).  There are hard and easy parts of this project. For tougher parts, familiarity with security concepts, advanced SQL, and advanced PHP and web server configuration is required. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary , Johanna Curiel&lt;br /&gt;
&lt;br /&gt;
==OWASP RBAC Project==&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 6 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
OWASP provides the RBAC project, as a stand-alone library with very fast access control checks and standard mature code-base. Currently [[PHPRBAC]] which is the PHP version of the RBAC project is released.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' Standard NIST level 2 hierarchical RBAC libraries for different programming languages, specially web-based ones such as C/C++/Java/ASP/ASPX/Python/Perl/etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development schemes, familiarity with one of the programming languages.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
=== OWASP OWTF - Flexible plugin mappings ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWTF plugins are categorized based on [https://www.owasp.org/index.php/OWASP_Testing_Guide_v3_Table_of_Contents OWASP Testing Guide v3] , the aim of this project would be to change the existing codebase to handle multiple standard mappings like [https://www.owasp.org/index.php/OWASP_Testing_Guide_v3_Table_of_Contents OWASP Testing Guide v3], [https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents OWASP Testing Guide v4], [http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53 security controls] (+nice to have: [http://www.pentest-standard.org/index.php/Main_Page PTES], [http://www.isecom.org/research/osstmm.html OSSTMM]) along with the facility to add more standards at a later stage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/7a/owtf/issues/113 Largely from github:]&lt;br /&gt;
&lt;br /&gt;
A huge thank you to Jim Kelly who provided a mapping of the NIST 800-53 security controls to the OWASP Testing Guide!&lt;br /&gt;
&lt;br /&gt;
'''Background:'''&lt;br /&gt;
&lt;br /&gt;
OWTF is currently aligned to the OWASP Testing Guide v3, which is still OK since v4 is far from complete.&lt;br /&gt;
However, we need to make the mapping to standards a bit more flexible because:&lt;br /&gt;
&lt;br /&gt;
1) OWASP is shuffling OWASP Testing Guide codes: This means we should move away from using OWASP codes in plugin names in the future.&lt;br /&gt;
&lt;br /&gt;
2) There are other standards, like the NIST 800-53 security controls, that we should also try to map our plugins to.&lt;br /&gt;
&lt;br /&gt;
[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf The final NIST 800-53 document, from April 2013, can be found here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project overview''':&lt;br /&gt;
&lt;br /&gt;
The idea of this project is to map the existing plugins (we will worry about the OWASP Testing Guide v4 when that is complete) to the NIST 800-53 security controls.&lt;br /&gt;
&lt;br /&gt;
To do this, (alt least) the following is involved:&lt;br /&gt;
&lt;br /&gt;
1) Change the web_testgroups.cfg configuration file to have a NEW column with the relevant code of the associated NIST 800-53 security control (Jim provided a file with this mapping!)&lt;br /&gt;
&lt;br /&gt;
2) Create a lookup config file for NIST 800-53 security control code &amp;lt;-&amp;gt; description pairs&lt;br /&gt;
&lt;br /&gt;
3) Change the OWTF report so that UNDER the OWASP Testing Guide item, we also show the relevant NIST 800-53 security control (BOTH code + description, as we do with the OWASP Testing Guide).&lt;br /&gt;
&lt;br /&gt;
Aesthetics note on point 3): Maybe this could be shown with a smaller font so that it does not take a lot more space?&lt;br /&gt;
&lt;br /&gt;
4) Nice touch: Add the NIST security controls to the advanced OWTF filter so that a user is able to filter by the security controls they are testing&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For more information please see [https://github.com/7a/owtf/issues/113 the github issue]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential project coordination'''&lt;br /&gt;
&lt;br /&gt;
This project should be coordinated with [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_OWTF_-_Free_Passive_Online_scanner_.2B_Remediation_Boilerplate_Templates OWASP OWTF - Free Passive Online scanner + Remediation Boilerplate Templates] if both projects are accepted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python knowledge is very welcome but not strictly necessary if there is will to learn, previous exposure to security concepts and penetration testing is very important in this project but some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Free Passive Online scanner + Remediation Boilerplate Templates ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
&lt;br /&gt;
An unfortunate reality of penetration testing is the amount of time that is gone via reporting. Explaining vulnerabilities to non technical customers is difficult. Conveying the urgency of fixing XSS, CSRF and many other issues tends to be non-trivial. Especially when the overall security background from the customer is poor (which is common).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project aims to:&lt;br /&gt;
* Provide boilerplate '''vulnerability explanations''' which can easily be copy-pasted into real-world reports&lt;br /&gt;
* Provide boilerplate '''vulnerability fixing recommendations''' which can easily be copy-pasted into real-world reports&lt;br /&gt;
For example: Linking to the [https://www.owasp.org/index.php/Cheat_Sheets OWASP CheatSheets], providing platform-specific vulnerability fixing information (i.e. Apache vs. IIS vs. nginx), etc. is important here.&lt;br /&gt;
* Allow penetration testers to '''easily''' customise and work with alternative remediation templates&lt;br /&gt;
* (Obviously) map boilerplate templates to OWTF plugins so that OWTF can show/merge the templates together with the penetration tester notes :).&lt;br /&gt;
* Storing remediation template information in a database would be nice to provide additional flexibility to copy-paste into or even generate a msoft word doc, odt, etc.&lt;br /&gt;
* Implement '''database import/export functionality''' for the boilerplate templates&lt;br /&gt;
* Improve the OWTF interactive report to make this copy-pasting as simple as possible&lt;br /&gt;
* Improve the existing “magic bar” OWTF functionality (in the interactive report), which assembles all penetration tester notes in 1 easy to copy-paste page, so that it assembles the generated report like “vulnerability explanation + penetration tester notes + vulnerability fixing recommendations”.&lt;br /&gt;
* '''Important community features''':&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Making templates available on github.io site'''&lt;br /&gt;
&lt;br /&gt;
OWTF wants to help penetration testers use their time most effectively, '''even if they don’t use OWTF directly''', for this reason, as part of this project, '''we would like to setup a github.io website containing the boiler plate templates'''. [http://koto.github.io/blog-kotowicz-net-examples/cursorjacking/ Something like this], but for OWTF and with the boilerplate templates there.&lt;br /&gt;
&lt;br /&gt;
This achieves a number of positive effects in our opinion:&lt;br /&gt;
&lt;br /&gt;
1) Any penetration tester can easily copy-paste anything from the templates into their report, just using a browser with an internet connection (i.e. even if not using OWTF).&lt;br /&gt;
&lt;br /&gt;
2) The templates will be much more exposed to public scrutiny, which will hopefully improve their quality overtime.&lt;br /&gt;
&lt;br /&gt;
3) Contributions to the templates will be easier, even for people without coding experience&lt;br /&gt;
&lt;br /&gt;
4) If successful, this could be thought of a public wiki to explain vulnerabilities and remediation fixes to customers, which will help penetration testers to focus more on the testing aspects of their engagements. By testing more, penetration testers will be able to find more issues and provide more value for money to their customers, which can only help the greater good in the intertubes :).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Free passive online scanner on github.io site'''&lt;br /&gt;
&lt;br /&gt;
OWTF allows many passive tests, such as those using third party websites like Google, Bing, etc. searches, as well as handy &amp;quot;Search for vulnerability&amp;quot; search boxes (i.e. Fingerprinting plugin). This feature involves the creation of a '''script''' that produces an interactive OWTF report with the intention of hosting it in the github.io site.&lt;br /&gt;
&lt;br /&gt;
The idea here is to have a passive, JavaScript-only interactive report available on the github.io site, so that people can try OWTF '''without installing anything''', simply visiting a URL.&lt;br /&gt;
&lt;br /&gt;
This would be a normal OWTF interactive report where the user can:&lt;br /&gt;
* Enter a target&lt;br /&gt;
* Try passive plugins (only the parts that use no tools)&lt;br /&gt;
* Play with boilerplate templates from the OWTF interactive report&lt;br /&gt;
This would make all the third-party website tests from OWTF usable from any browser, without having to install anything, etc.&lt;br /&gt;
&lt;br /&gt;
The thinking here is that this would make it even easier to use/try OWTF.&lt;br /&gt;
&lt;br /&gt;
'''Script Ideas'''&lt;br /&gt;
&lt;br /&gt;
'''LEGAL CLARIFICATION (Just in case!)''':&lt;br /&gt;
The passive online scanner, simply makes OWTF passive testing '''through third party websites''' more accessible to anybody, however it is the user that must 1) click the link manually + 2) do something bad with that afterwards + 3) doing 1 + 2 WITHOUT permission :). Therefore this passive online scanner does not do anything illegal [http://www.slideshare.net/abrahamaranguren/legal-and-efficient-web-app-testing-without-permission More information about why this is not illegal here] (recommended reading!)&lt;br /&gt;
&lt;br /&gt;
The thought here is to have a script that does something like:&lt;br /&gt;
* Run &amp;quot;owtf.py -t passive http://demo.testfire.net&amp;quot;&lt;br /&gt;
* Modifies the output report to have a big &amp;quot;add target&amp;quot; at the beginning&lt;br /&gt;
* Adds necessary JavaScript to the report, so that demo.testfire.net can be changed to the value of Target field input&lt;br /&gt;
Essentially, anybody would be able to run (most of) the passive stuff in owtf without having anything installed, this applies mostly to third party website testing (i.e. Google/Bing/NIST/etc. searches), but also to leave the whole OWASP Testing Guide there so that people can use the reports from there too.&lt;br /&gt;
&lt;br /&gt;
The placeholder becomes &amp;quot;demo.testfire.net&amp;quot; essentially, of course, things like theHarvester won't work for this, but Google/Bing/etc. searches will work.&lt;br /&gt;
This is somewhat like a JavaScript link generator for OWTF passive plugins, in a sense.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The script would need to &amp;quot;patch&amp;quot; the OWTF report so that the target of choice (i.e. demo.testfire.net) is replaced with a JavaScript function call, probably.&lt;br /&gt;
This might be slightly more complicated: Using JavaScript, the url has to be parsed and broken down into stuff like HOST_IP, HOST_PORT etc..&lt;br /&gt;
However, using JavaScript, we can loop through the DOM and change all links in the OWTF report, to produce the JavaScript-only, &amp;quot;cloud&amp;quot; version, to host on github.io.&lt;br /&gt;
&lt;br /&gt;
This will make the OWASP Testing Guide, OWTF and the boilerplate templates much more accessible to anyone for trial, demonstration and/or learning purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project extent'''&lt;br /&gt;
&lt;br /&gt;
Since OWTF aims to provides coverage of the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing guide] (via web plugins) and the [http://www.pentest-standard.org/index.php/Main_Page Penetration Testing Execution Standard] (PTES) (via net and aux plugins) it is important to realise that a big component of this project is to '''write QUALITY boilerplate templates for a VERY WIDE number of vulnerabilities''' (i.e. all major vulnerabilities!).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential project coordination'''&lt;br /&gt;
&lt;br /&gt;
This project should be coordinated with [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_OWTF_-_Flexible_plugin_mappings OWASP OWTF - Flexible plugin mapping] if both projects are accepted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python knowledge is very welcome but not strictly necessary if there is will to learn, previous exposure to security concepts and penetration testing is very important in this project but some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Automated Vulnerability Severity Rankings ===&lt;br /&gt;
&lt;br /&gt;
'''Background:'''&lt;br /&gt;
&lt;br /&gt;
OWTF aims to provides coverage of the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing guide] (via web plugins) and the [http://www.pentest-standard.org/index.php/Main_Page Penetration Testing Execution Standard] (PTES) (via net and aux plugins).&lt;br /&gt;
&lt;br /&gt;
While most tools focus on fully automated approaches such as “providing the user with a report that cannot be changed”, '''a flawed approach plagued with false positives and false negatives''', OWTF tries to balance automation with the powerful out-of-the-box thinking that only a human can provide.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''High Level Overview / Problem Introduction'''&lt;br /&gt;
&lt;br /&gt;
At the moment in OWTF it is very useful that '''the human can set the severity for each finding manually'''.&lt;br /&gt;
The reasoning here is that the human can take severity context into account, while tools cannot. For example, SQL Injection on a database that has no data, available mechanisms to send http requests/shell commands, etc., '''cannot be ranked as “High” or “Critical”''', the risk in that context is near zero.&lt;br /&gt;
&lt;br /&gt;
All the above being said, '''automated severity rankings are critical for penetration testing efficiency''', this is particularly true when the size of the scope is significant: In a 30 websites assessment, '''if OWTF provided an initial default severity ranking''' (which right now, it does not, a serious limitation), the human should know which of the 30 websites appears to be the weakest and therefore be able to focus their analysis on that based on the partial results from the first 10-30 minutes.&lt;br /&gt;
&lt;br /&gt;
The goal of this project, is therefore to provide the human with an initial automated severity ranking, that the human is able to override, but assists the human to focus analysis on seemingly weaker hosts/websites.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Technical Overview'''&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: An automated severity ranking is an initial “risk guess” based on parsing plugin output.&lt;br /&gt;
&lt;br /&gt;
During analysis of this proposed project we identified some possible implementation approaches:&lt;br /&gt;
&lt;br /&gt;
'''Possible Approach 1) Change all OWTF plugins'''&lt;br /&gt;
&lt;br /&gt;
So that they produce:&lt;br /&gt;
* Their usual output (as currently)&lt;br /&gt;
* '''An initial automated severity ranking (when possible)'''&lt;br /&gt;
&lt;br /&gt;
'''Potential Advantages''':&lt;br /&gt;
&lt;br /&gt;
A big advantage here is logic cohesion, the ranking logic is close to the scanning logic, which makes verification steps perhaps easier to perform (i.e. more context may be available)&lt;br /&gt;
&lt;br /&gt;
'''Potential Drawbacks''':&lt;br /&gt;
&lt;br /&gt;
Parsing plugin output for ranking purposes during plugin execution might slow OWTF, which is a big concern in a project where efficiency is the top goal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Possible Approach 2) Have a background “severity ranker process”'''&lt;br /&gt;
&lt;br /&gt;
The idea here would be to have a process running in the background, plugins do not rank their own output, instead they send a message to the severity ranker process, when this happens, the process parses the output to produce an initial automated ranking.&lt;br /&gt;
&lt;br /&gt;
'''Potential Advantages'''&lt;br /&gt;
&lt;br /&gt;
Plugin ranking happens in the background without slowing OWTF, cool features such as “re-rank this plugin (may send verification tests against target)” become possible from the interactive report via Plug-n-Hack.&lt;br /&gt;
&lt;br /&gt;
'''Potential Drawbacks'''&lt;br /&gt;
&lt;br /&gt;
The ranking logic is de-coupled from the scanning logic (where perhaps more information is available or sending “another request to double-check” might be easier)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Outcome and Reporting Implications'''&lt;br /&gt;
&lt;br /&gt;
At the end of the automated plugin severity rankings OWTF should:&lt;br /&gt;
1- Provide a default, automated, plugin severity ranking for each plugin&lt;br /&gt;
2- Since default severity rankings are less reliable (automated) they will be highlighted as such in the report, for example, providing a confidence percentage or at least a clear visual clue that the ranking is automated such as black/gray background. &lt;br /&gt;
&lt;br /&gt;
If implementing a confidence percentage, OWTF would say &amp;quot;how sure&amp;quot; it is about a given automated ranking. For example &amp;quot;0%&amp;quot; would be &amp;quot;just guessing&amp;quot; and &amp;quot;100%&amp;quot; would be &amp;quot;exploitation verified&amp;quot;.&lt;br /&gt;
3- When the human overrides or confirms the default ranking, the ranking is considered&lt;br /&gt;
&amp;quot;confirmed by a human&amp;quot; (i.e. more reliable) and this highlighting (i.e. black/gray background) is removed&lt;br /&gt;
4- A new filter to group vulnerabilities by target will be provided in the report.&lt;br /&gt;
5- A new filter to group vulnerabilities for all targets will be provided in the report&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential project coordination'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project should be coordinated with [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_OWTF_-_Zest_support_and_ZAP_integration OWASP OWTF - Zest support and ZAP integration] if both projects are accepted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python knowledge is very welcome but not strictly necessary if there is will to learn, previous exposure to security concepts and penetration testing is very important in this project but some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Zest support and ZAP integration ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Zest initiative, this provides a great automated mechanism to replicate exploitation of security vulnerabilities in a format that makes tool communication easier: For example, ZAP supports Zest, so if OWTF can create a Zest script for a vulnerability in an automated fashion, this may in turn be easier to import into ZAP and other tools.&lt;br /&gt;
&lt;br /&gt;
[https://developer.mozilla.org/en-US/docs/Zest More information on Zest can be found here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''High level overview'''&lt;br /&gt;
&lt;br /&gt;
This project, introduces the risk of seriously damaging OWTF performance, therefore, at a high level, we believe there are the following choices:&lt;br /&gt;
&lt;br /&gt;
Choice 1) '''Background execution''' - You try to see if a Zest script can be&lt;br /&gt;
created for each plugin in the *background* while owtf keeps running&lt;br /&gt;
&lt;br /&gt;
Choice 2) '''On-demand execution''' - Using some Plug-n-Hack magic, we could&lt;br /&gt;
have a button in the report saying &amp;quot;Generate Zest Scripts for plugin&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Choice 3) '''Hybrid approach''' - Implement choice 1 + 2, default to choice 2, but have choice 1&lt;br /&gt;
as an option (for example: owtf.py --zest on-demand/background/all)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Other project practicality considerations'''&lt;br /&gt;
&lt;br /&gt;
1) '''Background Zest script generation'''&lt;br /&gt;
&lt;br /&gt;
Makes sense on at least the output of scanner plugins (i.e. w3af finds a vuln, we create the Zest script for that vuln)&lt;br /&gt;
&lt;br /&gt;
2) '''On-demand Zest script generation from plugin output'''&lt;br /&gt;
&lt;br /&gt;
From the report, when you select a plugin, *could* be useful&lt;br /&gt;
&lt;br /&gt;
3) '''On-demand Zest script generation from HTTP transaction'''&lt;br /&gt;
&lt;br /&gt;
Selecting an HTTP transaction from the transaction log + click &amp;quot;generate Zest script&amp;quot; from there would also be very useful&lt;br /&gt;
&lt;br /&gt;
4) '''ZAP integration'''&lt;br /&gt;
&lt;br /&gt;
After generating the Zest script, the next step is to send the Zest script to ZAP, possibly using [http://code.google.com/p/zaproxy/wiki/ApiDetails the ZAP API], and perhaps with some help from [https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ Plug-n-Hack] (which allows us to send commands to our proxy, and from there, we could send commands to ZAP, or alternatively perhaps send commands to ZAP directly via Plug-n-Hack).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential project coordination'''&lt;br /&gt;
&lt;br /&gt;
This project should be coordinated with [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_OWTF_-_Automated_Vulnerability_Severity_Rankings OWASP OWTF - Automated Plugin Severity Rankings] if both projects are accepted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Some previous exposure to security concepts, penetration testing, Python and development in general is important for this project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Improved Proxification and Plug-n-Hack support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with [https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ the Plug-n-Hack standard (PnH)], which allows security tools to provide better interaction with web browsers. For example, it allows us to send commands from the browser to the OWTF proxy, which opens the door to a much better user experience. Please note that '''OWTF already supports Plug-n-Hack Phase 1'''. &lt;br /&gt;
&lt;br /&gt;
'''Overview'''&lt;br /&gt;
&lt;br /&gt;
This project is divided in the following pieces of functionality:&lt;br /&gt;
&lt;br /&gt;
'''1) Plug-n-Hack v2/v3 support'''&lt;br /&gt;
&lt;br /&gt;
There are many other features in Phase 2 that could be implemented and on top of that Plug-n-Hack v3 should be available this summer.&lt;br /&gt;
The aim of this project would be to try to cover as much as possible from the Plug-n-Hack standard as relevant to OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
'''OWTF Plug-n-Hack mode'''&lt;br /&gt;
&lt;br /&gt;
OWTF starts in proxy mode, waiting for instructions, the user can drive OWTF from the browser (i.e. using the browser as a GUI, instead of the command line).&lt;br /&gt;
&lt;br /&gt;
'''OWTF improved report interactivity via Plug-n-Hack'''&lt;br /&gt;
&lt;br /&gt;
Provide new functions from the OWTF interactive report, for example “launch this plugin again”, “send this HTTP request again”, etc.&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=pYFtLA2yTR8 Please see this demo to see the newest Plug-n-Hack additions]&lt;br /&gt;
&lt;br /&gt;
[https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ For more information about plug and hack please see this]&lt;br /&gt;
&lt;br /&gt;
'''2) Improved Tool and Plugin proxification'''&lt;br /&gt;
&lt;br /&gt;
At the moment, not all Tools or plugins are proxified in OWTF. This means that not all plugins send their requests through the OWTF MiTM proxy. This is a problem because OWTF performs analysis on HTTP transactions passively, and right now it cannot see '''all HTTP requests sent''' due to some unproxified tools and plugins.&lt;br /&gt;
&lt;br /&gt;
An additional component of this project is therefore to proxify most of the tools and plugins. This may be possible using a utility like proxychains and/or tweaking the inbound proxy without disturbing current functionality.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Stateful Browser with configurable authentication ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The automated functionality of OWASP OWTF is currently limited to the non-authenticated portion of a website. We would like to implement authentication support through:&lt;br /&gt;
&lt;br /&gt;
1) OWTF parameters&lt;br /&gt;
&lt;br /&gt;
2) Configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What we would like to do here is to leverage the [http://wwwsearch.sourceforge.net/mechanize/ powerful mechanize python library] and build at least support for the following authentication options:&lt;br /&gt;
* Basic authentication [https://github.com/7a/owtf/issues/9 Already implemented here]&lt;br /&gt;
* Cookie based authentication&lt;br /&gt;
* Form-based authentication&lt;br /&gt;
* Client-side certificates&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Other important features'''&lt;br /&gt;
&lt;br /&gt;
* GUI mechanism to make authentication setup (super-)easy for the user via [https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ Plug-n-Hack]&lt;br /&gt;
* Ability to '''keep track of several user roles''' and allow easy switching via [https://developer.mozilla.org/en-US/docs/Plug-n-Hack Plug-n-Hack]&lt;br /&gt;
&lt;br /&gt;
Additionally, we would welcome here a feature to detect when the user has been logged off, to log OWTF back in again before retrying the next request. &amp;lt;-- The proxy is probably a better place to implement this since external tools would also benefit from this. This feature will have to be coordinated with the MiTM proxy feature (already implemented).&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with the mechanize library or HTTP state is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Testing Framework Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Top features'''&lt;br /&gt;
&lt;br /&gt;
In this improvement phase, the Testing Framework should:&lt;br /&gt;
* (Top Prio) Focus more on functional tests&lt;br /&gt;
For example: Improve coverage of OWASP Testing Guide, PTES, etc. (lots of room for improvement there!)&lt;br /&gt;
* (Top Prio) Put together a great wiki documentation section for contributors&lt;br /&gt;
The goal here is to help contributors write tests for the functionality that they implement. This should be as easy as possible.&lt;br /&gt;
* (Top Prio) Fix the current Travis issues :)&lt;br /&gt;
* (Nice to have) Bring the unit tests up to speed with the codebase&lt;br /&gt;
This will be challenging but very worth trying after top priorities.&lt;br /&gt;
The wiki should be heavily updated so that contributors create their own unit tests easily moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''General background'''&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Python version upgrade and compatibility ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT WARNING: This project is considered to be &amp;lt; 2 weeks of effort BUT can be proposed to complement ANOTHER OWTF idea, the last few weeks of GSoC seems the best moment to start this'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP OWTF works on Python 2.6.5-2.7.3 (might work on surrounding versions too), the aim of this project would be to change the existing codebase so that it additionally works on newer python versions too, for example Python 3.3.&lt;br /&gt;
The intention here is to take advantage of improvements in newer python versions when available while letting OWASP OWTF work on older python versions too (i.e. 2.6.5) if that is the only option available.&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable due to compatibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* Performant and reliable OWASP OWTF execution on multiple python versions, in particular the latest python version (i.e. 3.3.x) as well as the previous 2.6.5-2.7.3 range.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with python version upgrades and python version compatibility implementations, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP PCI TOOLKIT==&lt;br /&gt;
===OWASP PCI TOOLKIT===&lt;br /&gt;
[[File:Pci-toolkit-items-small.gif]]&amp;lt;br&amp;gt; OWASP PCI toolkit is an Open Source project built using Google Engine App, that will help organizations scope the PCI-DSS requirements for their System Components. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.&lt;br /&gt;
&lt;br /&gt;
In order to comply with this standard, organizations need to understand the PCI-DSS requirements. Many of these requirements use OWASP guidelines as their baseline.&lt;br /&gt;
 &lt;br /&gt;
The OWASP PCI toolkit is a project focused on helping organization understand how OWASP guidelines apply to the PCI-DSS requirements.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
4 complete modules built as a Google App Engine: &lt;br /&gt;
http://pci-toolkit.appspot.com/&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Skill Level: Easy-Medium&lt;br /&gt;
Python, HTML, CSS, Google App Engine.&lt;br /&gt;
&lt;br /&gt;
Affinity with financial institutions, Web security and credit card-online transactions&lt;br /&gt;
&lt;br /&gt;
'''OWASP project page:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_PCI_Project&lt;br /&gt;
&lt;br /&gt;
Mentor: Johanna Curiel - emai: firstname.lastname@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat ==&lt;br /&gt;
=== OWASP iGoat ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP iGoat works fine as a full universal iOS app on iPhone and iPads up to iOS 6.x and Xcode 4.x. It needs to be updated to properly function under iOS 7.x and Xcode 5.x, which will require some code maintenance, GUI changes, and so on.&lt;br /&gt;
&lt;br /&gt;
Although it is primarily maintenance items that need the updating, the student will gain an intimate familiarity with how the iGoat platform works, including how to write and plug-in new exercise modules. Writing additional exercises, with all due credit, will also be encouraged in an optional second phase of this project.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP iGoat please see: https://www.owasp.org/index.php/OWASP_iGoat_Project&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* iGoat functions properly in all current aspects under iOS 7.x, compiled under Xcode 5.x.&lt;br /&gt;
* All GUI, buttons, and other presentation layer aspects of iGoat are compliant with iOS 7.x look and feel.&lt;br /&gt;
* (Optionally) write one or more new iGoat exercise modules, based on existing design descriptions to be provided by the project mentor.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
iOS app development in Xcode using Objective C will be quite necessary. Familiarity with iOS 7.x user interface updates additionally helpful.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ken van Wyk - OWASP iGoat Project Leader - Contact: ken@krvw.com'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/ZAP OWASP ZAP] ==&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Advanced access control testing ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Access control testing is typically difficult for security tools to automate. However previous Google Summer of Code projects have added session, authentication, user and role handling to ZAP, which provide an ideal basis for advanced access control testing.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This development would allow (semi) automated access control testing by:&lt;br /&gt;
* Maintaining and displaying different site trees (application maps) for different users/roles&lt;br /&gt;
* Providing tools which access all of the content accessible via one user/role which should not be accessible via another user/role&lt;br /&gt;
* Ideally allow resources to be tied to users/roles to allow enable horizontal privilege testing &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Scripted Add-ons ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP supports all JSR 223 scripting languages, but only for a limited number of purposes. This development would allow 'full' add-ons to be written in any JSR 223 language.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Users will be able to 'full' add-ons in any JSR 233 scripting language&lt;br /&gt;
* A set of example add-ons demonstrating as much functionality as possible should be developed in at least Java Script, Jython and Jruby.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - AMF Support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has only very limited support for AMF and does not provide an effective graphical representation of it. &lt;br /&gt;
This development will add full support for AMF.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* De-serialise and display AMF messages in ZAP graphically (based on existing POC code)&lt;br /&gt;
* Expose the AMF data as parameters so that ZAP can scan them&lt;br /&gt;
* Add new AMF specific scan rules as required&lt;br /&gt;
* Implement in a way that makes it easier for ZAP to support other technologies (such as Java applets, Silverlight) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: Colm O'Flaherty - OWASP ZAP Core team'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Web Service (SOAP) scanning ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has only very limited support for web service scanning and has no understanding of WSDL.&lt;br /&gt;
This development will add full support for exploring and scanning SOAP based web services.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The development will allow ZAP to parse WSDL and populate the Sites tree with all of the end points defined. It should also enhance the ZAP scanning capabilities to specifically attack the end points for as wide a range of vulnerabilities. Test cases should be written in [http://code.google.com/p/wavsep/ wavsep] format and contributed back to that project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - As a long running service ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP started out as a GUI only desktop tool. It now supports a headless 'daemon' mode but it is still not suitable for running as a long running service. This will require much heavier use of the database, and ideally will allow different databases to be used. &lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
ZAP able to run as a (very) long running service. There must be no memory leaks code and ideally there should still be very little latency while proxying through ZAP.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - GUI unit test framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
While ZAP does have some low level unit tests it doesnt have any unit tests for the UI. This means that sometimes changes can break the UI without being immediately apparent.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
A unit test framework which will allow the GUI to be easily tested. A set of unit tests which test the main GUI features and can be easily extended.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/ESAPI OWASP ESAPI] 2.x ==&lt;br /&gt;
=== [https://www.owasp.org/index.php/ESAPI OWASP ESAPI] 2.x - Security Configuration ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
There are currently more than a half-dozen of open Google Issues in ESAPI regarding the security configuration component (e.g., see [http://code.google.com/p/owasp-esapi-java/issues/list?q=component%3DSecurityConfiguration ESAPI Security Configuration Issues]).  &lt;br /&gt;
&lt;br /&gt;
The ESAPI interface for its configuration (SecurityConfiguration) is overly complicated; it has a 'getter' method specific to almost every ESAPI configuration property. The rules for how and where the ESAPI.properties file is found are overly complicated making questions about it one of the most frequently asked questions on forums such as Stack Exchange and the ESAPI mailing lists. This complication leads to a unduly intricate, non-modular reference implementation (DefaultSecurityConfiguration) that makes it difficult to extend in terms of new functionality.&lt;br /&gt;
&lt;br /&gt;
A new, simpler security configuration interface and implementation is needed. Such an implementation would not only be useful for ESAPI 2.x, but could very well be used to build the configurator needed by ESAPI 3.  &lt;br /&gt;
&lt;br /&gt;
As part of this GSoC project, expectations would not only to address as many of the open security configuration issues as possible, but to also go beyond this to allow a framework for additional extensions in terms of functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
1) An improved, but simpler API for the security configuration part of ESAPI.&lt;br /&gt;
2) Alternate configuration stores other than Java properties files (e.g., XML, database), to be supported.&lt;br /&gt;
3) The ability to split the ESAPI configuration data into smaller, more manageable chunks to result in more maintainibility and allow for better enforcement of corporate security policies.&lt;br /&gt;
4) Continued backward compatibility with ESAPI 2.1.x or an extremely simple migration path forward.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prequisite:'''&lt;br /&gt;
&lt;br /&gt;
Since the ESAPI 2.x project is written in Java, a good knowledge of Java is essential. A strong knowledge of JUnit will also be helpful in creating unit test cases. A working knowledge of XML or JDBC may also prove helpful.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Kevin_W._Wall Kevin W. Wall] - OWASP ESAPI for Java Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP Seraphimdroid Project] ==&lt;br /&gt;
=== [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP Seraphimdroid Project] ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
OWASP Seraphimdroid is relatively new OWASP project regarding Android security. Seraphimdroid Android application should become mobile device safeguard, while on the other hand it should also provide user information and knowledge about security risks on his phone (in personalized way). The idea of security guard is based solely on heuristics, that most of the risks costing money and damaging user's privacy can be stopped without huge online database with signatures, and huge malware analysis lab. As part of this GSoC project, focus will be on finding way to stop as many risks that can cost money (premium calls, sms, ussd...) or harm user privacy as possible and to enhance UX of mobile application.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
* Building features for stopping threats that can cost money originating from third party applications (continue where it was stopped)&lt;br /&gt;
* Build and propose features that can stop third party application damage user's privacy by sending user's data out of the mobile device (using internet) &lt;br /&gt;
* Enhance UI/UX&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prequisite:'''&lt;br /&gt;
&lt;br /&gt;
Since the OWASP Seraphimdroid project is written in Java and Android SDK, a good knowledge of Java, Android OS and SDK are essential. Good knowledge of XML and IP protocol can be useful. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Nikola_Milosevic Nikola Milosevic] - OWASP Seraphimdroid Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] ==&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - ModSecurity Ruby API ===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
Adding the capability of rapid prototyping to ModSecurity functionalities trough scripts will open the possibility for easy rules production and customization, It also opens the possibility for a large community such as Ruby developers to create their own customization on the top of ModSecurity and so customize their own rules, analog of today's Lua support.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
An implementation able to handle Ruby scripts which will interact to ModSecurity as Lua does.&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
Embedding Ruby into C++ (ModSecurity is C, using C++ as reference):&lt;br /&gt;
http://aeditor.rubyforge.org/ruby_cplusplus/index.html&lt;br /&gt;
ModSecurity Reference Manual, Lua:&lt;br /&gt;
https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#wiki-SecRuleScript&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
C and Ruby programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - ModSecurity Python API ===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
Adding the capability of rapid prototyping to ModSecurity functionalities trough scripts will open the possibility for easy rules production and customization, It also opens the possibility for a large community such as Python developers to create their own customization on the top of ModSecurity and so customize their own rules, analog of today's Lua support.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
An implementation able to handle Python scripts which will interact to ModSecurity as Lua does.&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
Embedding Python into C/C++:&lt;br /&gt;
http://docs.python.org/3.3/extending/embedding.html&lt;br /&gt;
ModSecurity Reference Manual, Lua:&lt;br /&gt;
https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#wiki-SecRuleScript&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
C and Python programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - Create &amp;quot;Sniffer-Mode&amp;quot; ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' &lt;br /&gt;
&lt;br /&gt;
The ModSecurity code includes a &amp;quot;standalone&amp;quot; version that wraps a light weight Apache/APR around the ModSecurity code.  This is used as the basis for the ports to the IIS/Nginx web server platforms.  The goal for this project task is to extend this standalone version so that it can accept a data feed of network traffic (e.g. libpcap) data as input and apply the ModSecurity CRS rules.  Possible solutions could be:&lt;br /&gt;
* Create a ModSecurity &amp;quot;plugin&amp;quot; for the Snort IDS.&lt;br /&gt;
* Create a ModSecurity &amp;quot;plugin&amp;quot; for the Suricata IDS.&lt;br /&gt;
* Add libpcap sniffer wrapper to standalone ModSecurity code to directly pull data off the wire.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This new sniffer mode would allow organizations to run ModSecurity/OWASP ModSecurity CRS in an out of line mode as they do IDS systems.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - Implement DoS Prevention Code ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' https://github.com/SpiderLabs/ModSecurity/issues/416&lt;br /&gt;
&lt;br /&gt;
Implement a request velocity learning engine to identify dynamic DoS thresholds for both the site and for the particular URL.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new C code in ModSecurity will allow us to add new DoS Protection methods to the OWASP ModSecurity CRS.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - Create a Positive Learning/Profile Engine ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' See this academic/research paper for ideas of the type of learning we are looking for - http://www.cs.ucsb.edu/~vigna/publications/2003_kruegel_vigna_ccs03.pdf&lt;br /&gt;
&lt;br /&gt;
ModSecurity needs a profiling engine that implements the various AppSensor Detection Points - http://blog.spiderlabs.com/2011/08/implementing-appsensor-detection-points-in-modsecurity.html.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new engine will implement more detection points to detect abnormal request attributes.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - Create an Engine to Detect Application Flow Anomalies ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Need an engine that can track normal application flow paths (click-flows) for business logic transactions - such as transferring money from accounts.  After profiling normal application path flows, we want to then be able to alert to anomalies.  This type of logic can help to prevent Banking Trojan attacks.&lt;br /&gt;
&lt;br /&gt;
Example - let's say an application has a multi-step checkout process to purchase an item.  This new engine would be able to profile/learn which URLs are accessed in what order and identify if clients skip steps or jump directly to other URLs in the flow.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The engine will be able to alert on anomalous application flows.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bywaf_Project OWASP ByWaf (CRS)] ==&lt;br /&gt;
=== [https://www.owasp.org/index.php/OWASP_Bywaf_Project OWASP ByWaf (CRS)] - PEP-8 compliant ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Need someone who make our code more pep-8 compliant.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
Get our code with the most common accepted Python convention.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Advanced level in Python&lt;br /&gt;
&lt;br /&gt;
Knowlage in PEP-8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Roey Katz and Rafael Gil - OWASP Bywaf Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/OWASP_Bywaf_Project OWASP ByWaf (CRS)] - Plug-in maker ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Making some plug-ins for penetration testing, all of them with bywaf's template.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The following plug-ins are expected:&lt;br /&gt;
&lt;br /&gt;
SQL Injection&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting&lt;br /&gt;
&lt;br /&gt;
Directory Traversal&lt;br /&gt;
&lt;br /&gt;
WebDav detector&lt;br /&gt;
&lt;br /&gt;
Put detector&lt;br /&gt;
&lt;br /&gt;
Default pages (IIS and Apache)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python&lt;br /&gt;
OWASP TOP TEN&lt;br /&gt;
HTTP and HTML&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Roey Katz and Rafael Gil- OWASP Bywaf Project Leader'''&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=169377</id>
		<title>GSoC2014 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=169377"/>
				<updated>2014-03-04T14:37:20Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OWASP Project Requests==&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Challenge Sandbox ===&lt;br /&gt;
&lt;br /&gt;
Now, in order to create a challenge, one has to validate the solution with regular expressions (or just plaintext comparison) and report success or failure to the backend,&lt;br /&gt;
we'd like the ability to write a normal vulnerable web application as a challenge and leave it to hackademic to make sure that the server is not affected.&lt;br /&gt;
Since this is probably the most difficult task proposed, if you are considering it, please get in touch with us early on so we can discuss about it and plan it correctly.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
''' *Administrator's point of view* '''&lt;br /&gt;
&lt;br /&gt;
Create an infrastructure that spawns virtual environments for users while keeping the load reasonable on the server(s).&lt;br /&gt;
Or configure apache,php,mysql in a way that allows for multiple instances of the programms to run in parallel completely seperated from the rest of the server.&lt;br /&gt;
The student is expected to provide configuration scripts that do the above&lt;br /&gt;
&lt;br /&gt;
''' *Coder's Way* '''&lt;br /&gt;
&lt;br /&gt;
This is better explained with an example:&lt;br /&gt;
In order to create an sql injection challenge one should be able to call a common unsecure mysql execute statement function.&lt;br /&gt;
The student can override common functions like this providing their own implementation of a very temporary database (based on flat files or nosql solutions e.t.c.).&lt;br /&gt;
The new functions should be able to detect the sqli and apply its results in a secure way(if the student drops a table no actual tables should be dropped but the table should not be visible to the student anymore).&lt;br /&gt;
&lt;br /&gt;
''' * Your solution here * '''&lt;br /&gt;
&lt;br /&gt;
The above solutions are by no way complete,their intention is to start you thinking.&lt;br /&gt;
This is a difficult task so if you consider takling it talk to us early on so we can reach a good solution which is possible in the GSoC timeframe.&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to run a big enough subset of OWASP WebGoat PHP with minimal modification as a Hackademic Challenge&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - CMS improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The new CMS was created during last year's GSOC. We have received feedback from users that suggest various improvements regarding functionality e.g. better user, teacher and challenges management. There are also some security improvements that are needed and in general any functionality that adds up to the educational nature of the project is more than welcome.&lt;br /&gt;
&lt;br /&gt;
Ideas on this project:&lt;br /&gt;
&lt;br /&gt;
* ''' Template''' *&lt;br /&gt;
&lt;br /&gt;
Since it's creation the project has received a good number of new features, but the visual/ux/ui part has never gotten much love.&lt;br /&gt;
It would be good if we had a new template with proper ui design.&lt;br /&gt;
&lt;br /&gt;
* '''Questionaire creation plugin''' *&lt;br /&gt;
&lt;br /&gt;
We'd like the admin to be able to create questionaires, assign rules for each question (e.g. correct answer +2pts incorrect answer -2, no answer 0)  and assign them to students as homework/exams.&lt;br /&gt;
The grading can either be done automatically (for multiple choice) or be submitted to the creator of the questionaire.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to show different articles on the user's home screen''' &lt;br /&gt;
&lt;br /&gt;
Now each user is served the latest article in her/his home screen. We need the ability for either  the teacher/admin to be able to define what article each class is served.&lt;br /&gt;
&lt;br /&gt;
* '''Gamification of the user's progress''' *&lt;br /&gt;
&lt;br /&gt;
A series of plugins and a template which allow the user to earn badges as they solve challenges and a better visual representation of their progress.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to define series of challenges'''&lt;br /&gt;
&lt;br /&gt;
The teacher/admin should be able to define a series of challenges (e.g. 2,5,3,1) which are meant to be solved in that order and if one is not solved then the student can't try the next one.&lt;br /&gt;
&lt;br /&gt;
* ''' Tagging of articles, users, challenges '''&lt;br /&gt;
&lt;br /&gt;
A user should be able to put tags on articles and challenges if he is a student and on users, classes, articles and challenges if he is a teacher.&lt;br /&gt;
Also the user should be able to search according to the tags.&lt;br /&gt;
&lt;br /&gt;
* '''Your idea here''' &lt;br /&gt;
&lt;br /&gt;
We welcome new ideas to make the project look awesome.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New features  and security improvements on the CMS part of the project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP and HTML. Good understanding of Application Security and related vulnerabilities if you undertake security improvements. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
===OWASP WebGoatPHP===&lt;br /&gt;
'''Description:'''&lt;br /&gt;
[[Webgoat]] is a deliberately insecure open source software made by OWASP using Java programming language. It has a set of challenges and steps, each providing the user with one or more web application vulnerability which user tries to solve. There are also hints and auto-detection of correct solutions. &lt;br /&gt;
Since Java is not the most common web application programming language, and it doesn't have many of the bugs other languages such as PHP have when it comes to security, OWASP has [[OWASP_WebGoat_Reboot2012|dedicated in 2012]] an amount of $5000 for promotion of WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about WebGoatPHP, I suggest downloading and giving WebGoat a try. It is one of OWASP prides (about 200000 downloads).&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' WebGoatPHP will be a deliberately insecure PHP web application which operates in different modes. A contest mode where challenges are selected by an admin and the system starts a contest. Admins can open up hints for participants and manage everything. A workshop mode, where the educator has control of the most of application features, as well as feedback of user activities and is ideal for learning environments, and a single mode where someone can browse challenges and solve them.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' You just need to know PHP. You are supposed to define flawed systems, which is not the hardest thing. Familiarity with web application security and SQL is recommended.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
===OWASP CSRF Guard===&lt;br /&gt;
'''Description:''' [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] is a complicated yet very effective web attack. The most important thing about CSRF is that it's hard to properly defend against it, specially when it comes to Web 2 and AJAX. We have had discussions on means of mitigating CSRF for years at OWASP, and are now ready to develop libraries for it. Many of the key ideas of this library can be found at [http://www.cs.sunysb.edu/~rpelizzi/jcsrf.pdf].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' A transparent Apache 2 module properly mitigating all POST CSRF attacks, as well as a lightweight PHP library doing the same.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisites:''' Knowing CSRF and at least one way to defend against it, PHP, C/C++, Linux.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' Result of this project is much more security among PHP applications. Most PHP applications are vulnerable and there's no central approach to secure them (due to open source nature). Many people look at OWASP for such information.&lt;br /&gt;
&lt;br /&gt;
Last year, we got GSoC people working on OWASP PHPSEC, and we were the most active OWASP project. A lot of the libraries are in place, and this year, we will mostly work on the framework.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Anyone with adequate PHP programming language experience (possibly web application development in PHP).  There are hard and easy parts of this project. For tougher parts, familiarity with security concepts, advanced SQL, and advanced PHP and web server configuration is required. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary , Johanna Curiel&lt;br /&gt;
&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 6 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
OWASP provides the RBAC project, as a stand-alone library with very fast access control checks and standard mature code-base. Currently [[PHPRBAC]] which is the PHP version of the RBAC project is released.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' Standard NIST level 2 hierarchical RBAC libraries for different programming languages, specially web-based ones such as C/C++/Java/ASP/ASPX/Python/Perl/etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development schemes, familiarity with one of the programming languages.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Flexible plugin mappings ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWTF plugins are categorized based on [https://www.owasp.org/index.php/OWASP_Testing_Guide_v3_Table_of_Contents OWASP Testing Guide v3] , the aim of this project would be to change the existing codebase to handle multiple standard mappings like [https://www.owasp.org/index.php/OWASP_Testing_Guide_v3_Table_of_Contents OWASP Testing Guide v3], [https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents OWASP Testing Guide v4], [http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53 security controls] (+nice to have: [http://www.pentest-standard.org/index.php/Main_Page PTES], [http://www.isecom.org/research/osstmm.html OSSTMM]) along with the facility to add more standards at a later stage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/7a/owtf/issues/113 Largely from github:]&lt;br /&gt;
&lt;br /&gt;
A huge thank you to Jim Kelly who provided a mapping of the NIST 800-53 security controls to the OWASP Testing Guide!&lt;br /&gt;
&lt;br /&gt;
'''Background:'''&lt;br /&gt;
&lt;br /&gt;
OWTF is currently aligned to the OWASP Testing Guide v3, which is still OK since v4 is far from complete.&lt;br /&gt;
However, we need to make the mapping to standards a bit more flexible because:&lt;br /&gt;
&lt;br /&gt;
1) OWASP is shuffling OWASP Testing Guide codes: This means we should move away from using OWASP codes in plugin names in the future.&lt;br /&gt;
&lt;br /&gt;
2) There are other standards, like the NIST 800-53 security controls, that we should also try to map our plugins to.&lt;br /&gt;
&lt;br /&gt;
[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf The final NIST 800-53 document, from April 2013, can be found here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project overview''':&lt;br /&gt;
&lt;br /&gt;
The idea of this project is to map the existing plugins (we will worry about the OWASP Testing Guide v4 when that is complete) to the NIST 800-53 security controls.&lt;br /&gt;
&lt;br /&gt;
To do this, (alt least) the following is involved:&lt;br /&gt;
&lt;br /&gt;
1) Change the web_testgroups.cfg configuration file to have a NEW column with the relevant code of the associated NIST 800-53 security control (Jim provided a file with this mapping!)&lt;br /&gt;
&lt;br /&gt;
2) Create a lookup config file for NIST 800-53 security control code &amp;lt;-&amp;gt; description pairs&lt;br /&gt;
&lt;br /&gt;
3) Change the OWTF report so that UNDER the OWASP Testing Guide item, we also show the relevant NIST 800-53 security control (BOTH code + description, as we do with the OWASP Testing Guide).&lt;br /&gt;
&lt;br /&gt;
Aesthetics note on point 3): Maybe this could be shown with a smaller font so that it does not take a lot more space?&lt;br /&gt;
&lt;br /&gt;
4) Nice touch: Add the NIST security controls to the advanced OWTF filter so that a user is able to filter by the security controls they are testing&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For more information please see [https://github.com/7a/owtf/issues/113 the github issue]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential project coordination'''&lt;br /&gt;
&lt;br /&gt;
This project should be coordinated with [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_OWTF_-_Free_Passive_Online_scanner_.2B_Remediation_Boilerplate_Templates OWASP OWTF - Free Passive Online scanner + Remediation Boilerplate Templates] if both projects are accepted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python knowledge is very welcome but not strictly necessary if there is will to learn, previous exposure to security concepts and penetration testing is very important in this project but some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Free Passive Online scanner + Remediation Boilerplate Templates ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
&lt;br /&gt;
An unfortunate reality of penetration testing is the amount of time that is gone via reporting. Explaining vulnerabilities to non technical customers is difficult. Conveying the urgency of fixing XSS, CSRF and many other issues tends to be non-trivial. Especially when the overall security background from the customer is poor (which is common).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project aims to:&lt;br /&gt;
* Provide boilerplate '''vulnerability explanations''' which can easily be copy-pasted into real-world reports&lt;br /&gt;
* Provide boilerplate '''vulnerability fixing recommendations''' which can easily be copy-pasted into real-world reports&lt;br /&gt;
For example: Linking to the [https://www.owasp.org/index.php/Cheat_Sheets OWASP CheatSheets], providing platform-specific vulnerability fixing information (i.e. Apache vs. IIS vs. nginx), etc. is important here.&lt;br /&gt;
* Allow penetration testers to '''easily''' customise and work with alternative remediation templates&lt;br /&gt;
* (Obviously) map boilerplate templates to OWTF plugins so that OWTF can show/merge the templates together with the penetration tester notes :).&lt;br /&gt;
* Storing remediation template information in a database would be nice to provide additional flexibility to copy-paste into or even generate a msoft word doc, odt, etc.&lt;br /&gt;
* Implement '''database import/export functionality''' for the boilerplate templates&lt;br /&gt;
* Improve the OWTF interactive report to make this copy-pasting as simple as possible&lt;br /&gt;
* Improve the existing “magic bar” OWTF functionality (in the interactive report), which assembles all penetration tester notes in 1 easy to copy-paste page, so that it assembles the generated report like “vulnerability explanation + penetration tester notes + vulnerability fixing recommendations”.&lt;br /&gt;
* '''Important community features''':&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Making templates available on github.io site'''&lt;br /&gt;
&lt;br /&gt;
OWTF wants to help penetration testers use their time most effectively, '''even if they don’t use OWTF directly''', for this reason, as part of this project, '''we would like to setup a github.io website containing the boiler plate templates'''. [http://koto.github.io/blog-kotowicz-net-examples/cursorjacking/ Something like this], but for OWTF and with the boilerplate templates there.&lt;br /&gt;
&lt;br /&gt;
This achieves a number of positive effects in our opinion:&lt;br /&gt;
&lt;br /&gt;
1) Any penetration tester can easily copy-paste anything from the templates into their report, just using a browser with an internet connection (i.e. even if not using OWTF).&lt;br /&gt;
&lt;br /&gt;
2) The templates will be much more exposed to public scrutiny, which will hopefully improve their quality overtime.&lt;br /&gt;
&lt;br /&gt;
3) Contributions to the templates will be easier, even for people without coding experience&lt;br /&gt;
&lt;br /&gt;
4) If successful, this could be thought of a public wiki to explain vulnerabilities and remediation fixes to customers, which will help penetration testers to focus more on the testing aspects of their engagements. By testing more, penetration testers will be able to find more issues and provide more value for money to their customers, which can only help the greater good in the intertubes :).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Free passive online scanner on github.io site'''&lt;br /&gt;
&lt;br /&gt;
OWTF allows many passive tests, such as those using third party websites like Google, Bing, etc. searches, as well as handy &amp;quot;Search for vulnerability&amp;quot; search boxes (i.e. Fingerprinting plugin). This feature involves the creation of a '''script''' that produces an interactive OWTF report with the intention of hosting it in the github.io site.&lt;br /&gt;
&lt;br /&gt;
The idea here is to have a passive, JavaScript-only interactive report available on the github.io site, so that people can try OWTF '''without installing anything''', simply visiting a URL.&lt;br /&gt;
&lt;br /&gt;
This would be a normal OWTF interactive report where the user can:&lt;br /&gt;
* Enter a target&lt;br /&gt;
* Try passive plugins (only the parts that use no tools)&lt;br /&gt;
* Play with boilerplate templates from the OWTF interactive report&lt;br /&gt;
This would make all the third-party website tests from OWTF usable from any browser, without having to install anything, etc.&lt;br /&gt;
&lt;br /&gt;
The thinking here is that this would make it even easier to use/try OWTF.&lt;br /&gt;
&lt;br /&gt;
'''Script Ideas'''&lt;br /&gt;
&lt;br /&gt;
'''LEGAL CLARIFICATION (Just in case!)''':&lt;br /&gt;
The passive online scanner, simply makes OWTF passive testing '''through third party websites''' more accessible to anybody, however it is the user that must 1) click the link manually + 2) do something bad with that afterwards + 3) doing 1 + 2 WITHOUT permission :). Therefore this passive online scanner does not do anything illegal [http://www.slideshare.net/abrahamaranguren/legal-and-efficient-web-app-testing-without-permission More information about why this is not illegal here] (recommended reading!)&lt;br /&gt;
&lt;br /&gt;
The thought here is to have a script that does something like:&lt;br /&gt;
* Run &amp;quot;owtf.py -t passive http://demo.testfire.net&amp;quot;&lt;br /&gt;
* Modifies the output report to have a big &amp;quot;add target&amp;quot; at the beginning&lt;br /&gt;
* Adds necessary JavaScript to the report, so that demo.testfire.net can be changed to the value of Target field input&lt;br /&gt;
Essentially, anybody would be able to run (most of) the passive stuff in owtf without having anything installed, this applies mostly to third party website testing (i.e. Google/Bing/NIST/etc. searches), but also to leave the whole OWASP Testing Guide there so that people can use the reports from there too.&lt;br /&gt;
&lt;br /&gt;
The placeholder becomes &amp;quot;demo.testfire.net&amp;quot; essentially, of course, things like theHarvester won't work for this, but Google/Bing/etc. searches will work.&lt;br /&gt;
This is somewhat like a JavaScript link generator for OWTF passive plugins, in a sense.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The script would need to &amp;quot;patch&amp;quot; the OWTF report so that the target of choice (i.e. demo.testfire.net) is replaced with a JavaScript function call, probably.&lt;br /&gt;
This might be slightly more complicated: Using JavaScript, the url has to be parsed and broken down into stuff like HOST_IP, HOST_PORT etc..&lt;br /&gt;
However, using JavaScript, we can loop through the DOM and change all links in the OWTF report, to produce the JavaScript-only, &amp;quot;cloud&amp;quot; version, to host on github.io.&lt;br /&gt;
&lt;br /&gt;
This will make the OWASP Testing Guide, OWTF and the boilerplate templates much more accessible to anyone for trial, demonstration and/or learning purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project extent'''&lt;br /&gt;
&lt;br /&gt;
Since OWTF aims to provides coverage of the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing guide] (via web plugins) and the [http://www.pentest-standard.org/index.php/Main_Page Penetration Testing Execution Standard] (PTES) (via net and aux plugins) it is important to realise that a big component of this project is to '''write QUALITY boilerplate templates for a VERY WIDE number of vulnerabilities''' (i.e. all major vulnerabilities!).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential project coordination'''&lt;br /&gt;
&lt;br /&gt;
This project should be coordinated with [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_OWTF_-_Flexible_plugin_mappings OWASP OWTF - Flexible plugin mapping] if both projects are accepted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python knowledge is very welcome but not strictly necessary if there is will to learn, previous exposure to security concepts and penetration testing is very important in this project but some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Automated Vulnerability Severity Rankings ===&lt;br /&gt;
&lt;br /&gt;
'''Background:'''&lt;br /&gt;
&lt;br /&gt;
OWTF aims to provides coverage of the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing guide] (via web plugins) and the [http://www.pentest-standard.org/index.php/Main_Page Penetration Testing Execution Standard] (PTES) (via net and aux plugins).&lt;br /&gt;
&lt;br /&gt;
While most tools focus on fully automated approaches such as “providing the user with a report that cannot be changed”, '''a flawed approach plagued with false positives and false negatives''', OWTF tries to balance automation with the powerful out-of-the-box thinking that only a human can provide.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''High Level Overview / Problem Introduction'''&lt;br /&gt;
&lt;br /&gt;
At the moment in OWTF it is very useful that '''the human can set the severity for each finding manually'''.&lt;br /&gt;
The reasoning here is that the human can take severity context into account, while tools cannot. For example, SQL Injection on a database that has no data, available mechanisms to send http requests/shell commands, etc., '''cannot be ranked as “High” or “Critical”''', the risk in that context is near zero.&lt;br /&gt;
&lt;br /&gt;
All the above being said, '''automated severity rankings are critical for penetration testing efficiency''', this is particularly true when the size of the scope is significant: In a 30 websites assessment, '''if OWTF provided an initial default severity ranking''' (which right now, it does not, a serious limitation), the human should know which of the 30 websites appears to be the weakest and therefore be able to focus their analysis on that based on the partial results from the first 10-30 minutes.&lt;br /&gt;
&lt;br /&gt;
The goal of this project, is therefore to provide the human with an initial automated severity ranking, that the human is able to override, but assists the human to focus analysis on seemingly weaker hosts/websites.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Technical Overview'''&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: An automated severity ranking is an initial “risk guess” based on parsing plugin output.&lt;br /&gt;
&lt;br /&gt;
During analysis of this proposed project we identified some possible implementation approaches:&lt;br /&gt;
&lt;br /&gt;
'''Possible Approach 1) Change all OWTF plugins'''&lt;br /&gt;
&lt;br /&gt;
So that they produce:&lt;br /&gt;
* Their usual output (as currently)&lt;br /&gt;
* '''An initial automated severity ranking (when possible)'''&lt;br /&gt;
&lt;br /&gt;
'''Potential Advantages''':&lt;br /&gt;
&lt;br /&gt;
A big advantage here is logic cohesion, the ranking logic is close to the scanning logic, which makes verification steps perhaps easier to perform (i.e. more context may be available)&lt;br /&gt;
&lt;br /&gt;
'''Potential Drawbacks''':&lt;br /&gt;
&lt;br /&gt;
Parsing plugin output for ranking purposes during plugin execution might slow OWTF, which is a big concern in a project where efficiency is the top goal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Possible Approach 2) Have a background “severity ranker process”'''&lt;br /&gt;
&lt;br /&gt;
The idea here would be to have a process running in the background, plugins do not rank their own output, instead they send a message to the severity ranker process, when this happens, the process parses the output to produce an initial automated ranking.&lt;br /&gt;
&lt;br /&gt;
'''Potential Advantages'''&lt;br /&gt;
&lt;br /&gt;
Plugin ranking happens in the background without slowing OWTF, cool features such as “re-rank this plugin (may send verification tests against target)” become possible from the interactive report via Plug-n-Hack.&lt;br /&gt;
&lt;br /&gt;
'''Potential Drawbacks'''&lt;br /&gt;
&lt;br /&gt;
The ranking logic is de-coupled from the scanning logic (where perhaps more information is available or sending “another request to double-check” might be easier)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Outcome and Reporting Implications'''&lt;br /&gt;
&lt;br /&gt;
At the end of the automated plugin severity rankings OWTF should:&lt;br /&gt;
1- Provide a default, automated, plugin severity ranking for each plugin&lt;br /&gt;
2- Since default severity rankings are less reliable (automated) they will be highlighted as such in the report, for example, providing a confidence percentage or at least a clear visual clue that the ranking is automated such as black/gray background. &lt;br /&gt;
&lt;br /&gt;
If implementing a confidence percentage, OWTF would say &amp;quot;how sure&amp;quot; it is about a given automated ranking. For example &amp;quot;0%&amp;quot; would be &amp;quot;just guessing&amp;quot; and &amp;quot;100%&amp;quot; would be &amp;quot;exploitation verified&amp;quot;.&lt;br /&gt;
3- When the human overrides or confirms the default ranking, the ranking is considered&lt;br /&gt;
&amp;quot;confirmed by a human&amp;quot; (i.e. more reliable) and this highlighting (i.e. black/gray background) is removed&lt;br /&gt;
4- A new filter to group vulnerabilities by target will be provided in the report.&lt;br /&gt;
5- A new filter to group vulnerabilities for all targets will be provided in the report&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential project coordination'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This project should be coordinated with [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_OWTF_-_Zest_support_and_ZAP_integration OWASP OWTF - Zest support and ZAP integration] if both projects are accepted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python knowledge is very welcome but not strictly necessary if there is will to learn, previous exposure to security concepts and penetration testing is very important in this project but some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Zest support and ZAP integration ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Zest initiative, this provides a great automated mechanism to replicate exploitation of security vulnerabilities in a format that makes tool communication easier: For example, ZAP supports Zest, so if OWTF can create a Zest script for a vulnerability in an automated fashion, this may in turn be easier to import into ZAP and other tools.&lt;br /&gt;
&lt;br /&gt;
[https://developer.mozilla.org/en-US/docs/Zest More information on Zest can be found here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''High level overview'''&lt;br /&gt;
&lt;br /&gt;
This project, introduces the risk of seriously damaging OWTF performance, therefore, at a high level, we believe there are the following choices:&lt;br /&gt;
&lt;br /&gt;
Choice 1) '''Background execution''' - You try to see if a Zest script can be&lt;br /&gt;
created for each plugin in the *background* while owtf keeps running&lt;br /&gt;
&lt;br /&gt;
Choice 2) '''On-demand execution''' - Using some Plug-n-Hack magic, we could&lt;br /&gt;
have a button in the report saying &amp;quot;Generate Zest Scripts for plugin&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Choice 3) '''Hybrid approach''' - Implement choice 1 + 2, default to choice 2, but have choice 1&lt;br /&gt;
as an option (for example: owtf.py --zest on-demand/background/all)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Other project practicality considerations'''&lt;br /&gt;
&lt;br /&gt;
1) '''Background Zest script generation'''&lt;br /&gt;
&lt;br /&gt;
Makes sense on at least the output of scanner plugins (i.e. w3af finds a vuln, we create the Zest script for that vuln)&lt;br /&gt;
&lt;br /&gt;
2) '''On-demand Zest script generation from plugin output'''&lt;br /&gt;
&lt;br /&gt;
From the report, when you select a plugin, *could* be useful&lt;br /&gt;
&lt;br /&gt;
3) '''On-demand Zest script generation from HTTP transaction'''&lt;br /&gt;
&lt;br /&gt;
Selecting an HTTP transaction from the transaction log + click &amp;quot;generate Zest script&amp;quot; from there would also be very useful&lt;br /&gt;
&lt;br /&gt;
4) '''ZAP integration'''&lt;br /&gt;
&lt;br /&gt;
After generating the Zest script, the next step is to send the Zest script to ZAP, possibly using [http://code.google.com/p/zaproxy/wiki/ApiDetails the ZAP API], and perhaps with some help from [https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ Plug-n-Hack] (which allows us to send commands to our proxy, and from there, we could send commands to ZAP, or alternatively perhaps send commands to ZAP directly via Plug-n-Hack).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential project coordination'''&lt;br /&gt;
&lt;br /&gt;
This project should be coordinated with [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_OWTF_-_Automated_Vulnerability_Severity_Rankings OWASP OWTF - Automated Plugin Severity Rankings] if both projects are accepted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Some previous exposure to security concepts, penetration testing, Python and development in general is important for this project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Improved Proxification and Plug-n-Hack support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with [https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ the Plug-n-Hack standard (PnH)], which allows security tools to provide better interaction with web browsers. For example, it allows us to send commands from the browser to the OWTF proxy, which opens the door to a much better user experience. Please note that '''OWTF already supports Plug-n-Hack Phase 1'''. &lt;br /&gt;
&lt;br /&gt;
'''Overview'''&lt;br /&gt;
&lt;br /&gt;
This project is divided in the following pieces of functionality:&lt;br /&gt;
&lt;br /&gt;
'''1) Plug-n-Hack v2/v3 support'''&lt;br /&gt;
&lt;br /&gt;
There are many other features in Phase 2 that could be implemented and on top of that Plug-n-Hack v3 should be available this summer.&lt;br /&gt;
The aim of this project would be to try to cover as much as possible from the Plug-n-Hack standard as relevant to OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
'''OWTF Plug-n-Hack mode'''&lt;br /&gt;
&lt;br /&gt;
OWTF starts in proxy mode, waiting for instructions, the user can drive OWTF from the browser (i.e. using the browser as a GUI, instead of the command line).&lt;br /&gt;
&lt;br /&gt;
'''OWTF improved report interactivity via Plug-n-Hack'''&lt;br /&gt;
&lt;br /&gt;
Provide new functions from the OWTF interactive report, for example “launch this plugin again”, “send this HTTP request again”, etc.&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=pYFtLA2yTR8 Please see this demo to see the newest Plug-n-Hack additions]&lt;br /&gt;
&lt;br /&gt;
[https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ For more information about plug and hack please see this]&lt;br /&gt;
&lt;br /&gt;
'''2) Improved Tool and Plugin proxification'''&lt;br /&gt;
&lt;br /&gt;
At the moment, not all Tools or plugins are proxified in OWTF. This means that not all plugins send their requests through the OWTF MiTM proxy. This is a problem because OWTF performs analysis on HTTP transactions passively, and right now it cannot see '''all HTTP requests sent''' due to some unproxified tools and plugins.&lt;br /&gt;
&lt;br /&gt;
An additional component of this project is therefore to proxify most of the tools and plugins. This may be possible using a utility like proxychains and/or tweaking the inbound proxy without disturbing current functionality.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Stateful Browser with configurable authentication ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The automated functionality of OWASP OWTF is currently limited to the non-authenticated portion of a website. We would like to implement authentication support through:&lt;br /&gt;
&lt;br /&gt;
1) OWTF parameters&lt;br /&gt;
&lt;br /&gt;
2) Configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What we would like to do here is to leverage the [http://wwwsearch.sourceforge.net/mechanize/ powerful mechanize python library] and build at least support for the following authentication options:&lt;br /&gt;
* Basic authentication [https://github.com/7a/owtf/issues/9 Already implemented here]&lt;br /&gt;
* Cookie based authentication&lt;br /&gt;
* Form-based authentication&lt;br /&gt;
* Client-side certificates&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Other important features'''&lt;br /&gt;
&lt;br /&gt;
* GUI mechanism to make authentication setup (super-)easy for the user via [https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ Plug-n-Hack]&lt;br /&gt;
* Ability to '''keep track of several user roles''' and allow easy switching via [https://developer.mozilla.org/en-US/docs/Plug-n-Hack Plug-n-Hack]&lt;br /&gt;
&lt;br /&gt;
Additionally, we would welcome here a feature to detect when the user has been logged off, to log OWTF back in again before retrying the next request. &amp;lt;-- The proxy is probably a better place to implement this since external tools would also benefit from this. This feature will have to be coordinated with the MiTM proxy feature (already implemented).&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with the mechanize library or HTTP state is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Testing Framework Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Top features'''&lt;br /&gt;
&lt;br /&gt;
In this improvement phase, the Testing Framework should:&lt;br /&gt;
* (Top Prio) Focus more on functional tests&lt;br /&gt;
For example: Improve coverage of OWASP Testing Guide, PTES, etc. (lots of room for improvement there!)&lt;br /&gt;
* (Top Prio) Put together a great wiki documentation section for contributors&lt;br /&gt;
The goal here is to help contributors write tests for the functionality that they implement. This should be as easy as possible.&lt;br /&gt;
* (Top Prio) Fix the current Travis issues :)&lt;br /&gt;
* (Nice to have) Bring the unit tests up to speed with the codebase&lt;br /&gt;
This will be challenging but very worth trying after top priorities.&lt;br /&gt;
The wiki should be heavily updated so that contributors create their own unit tests easily moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''General background'''&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Python version upgrade and compatibility ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT WARNING: This project is considered to be &amp;lt; 2 weeks of effort BUT can be proposed to complement ANOTHER OWTF idea, the last few weeks of GSoC seems the best moment to start this'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP OWTF works on Python 2.6.5-2.7.3 (might work on surrounding versions too), the aim of this project would be to change the existing codebase so that it additionally works on newer python versions too, for example Python 3.3.&lt;br /&gt;
The intention here is to take advantage of improvements in newer python versions when available while letting OWASP OWTF work on older python versions too (i.e. 2.6.5) if that is the only option available.&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable due to compatibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* Performant and reliable OWASP OWTF execution on multiple python versions, in particular the latest python version (i.e. 3.3.x) as well as the previous 2.6.5-2.7.3 range.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with python version upgrades and python version compatibility implementations, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP PCI TOOLKIT===&lt;br /&gt;
[[File:Pci-toolkit-items-small.gif]]&amp;lt;br&amp;gt; OWASP PCI toolkit is an Open Source project built using Google Engine App, that will help organizations scope the PCI-DSS requirements for their System Components. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.&lt;br /&gt;
&lt;br /&gt;
In order to comply with this standard, organizations need to understand the PCI-DSS requirements. Many of these requirements use OWASP guidelines as their baseline.&lt;br /&gt;
 &lt;br /&gt;
The OWASP PCI toolkit is a project focused on helping organization understand how OWASP guidelines apply to the PCI-DSS requirements.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
4 complete modules built as a Google App Engine: &lt;br /&gt;
http://pci-toolkit.appspot.com/&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Skill Level: Easy-Medium&lt;br /&gt;
Python, HTML, CSS, Google App Engine.&lt;br /&gt;
&lt;br /&gt;
Affinity with financial institutions, Web security and credit card-online transactions&lt;br /&gt;
&lt;br /&gt;
'''OWASP project page:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_PCI_Project&lt;br /&gt;
&lt;br /&gt;
Mentor: Johanna Curiel - emai: firstname.lastname@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP iGoat ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP iGoat works fine as a full universal iOS app on iPhone and iPads up to iOS 6.x and Xcode 4.x. It needs to be updated to properly function under iOS 7.x and Xcode 5.x, which will require some code maintenance, GUI changes, and so on.&lt;br /&gt;
&lt;br /&gt;
Although it is primarily maintenance items that need the updating, the student will gain an intimate familiarity with how the iGoat platform works, including how to write and plug-in new exercise modules. Writing additional exercises, with all due credit, will also be encouraged in an optional second phase of this project.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP iGoat please see: https://www.owasp.org/index.php/OWASP_iGoat_Project&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* iGoat functions properly in all current aspects under iOS 7.x, compiled under Xcode 5.x.&lt;br /&gt;
* All GUI, buttons, and other presentation layer aspects of iGoat are compliant with iOS 7.x look and feel.&lt;br /&gt;
* (Optionally) write one or more new iGoat exercise modules, based on existing design descriptions to be provided by the project mentor.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
iOS app development in Xcode using Objective C will be quite necessary. Familiarity with iOS 7.x user interface updates additionally helpful.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ken van Wyk - OWASP iGoat Project Leader - Contact: ken@krvw.com'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Advanced access control testing ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Access control testing is typically difficult for security tools to automate. However previous Google Summer of Code projects have added session, authentication, user and role handling to ZAP, which provide an ideal basis for advanced access control testing.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This development would allow (semi) automated access control testing by:&lt;br /&gt;
* Maintaining and displaying different site trees (application maps) for different users/roles&lt;br /&gt;
* Providing tools which access all of the content accessible via one user/role which should not be accessible via another user/role&lt;br /&gt;
* Ideally allow resources to be tied to users/roles to allow enable horizontal privilege testing &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Scripted Add-ons ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP supports all JSR 223 scripting languages, but only for a limited number of purposes. This development would allow 'full' add-ons to be written in any JSR 223 language.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Users will be able to 'full' add-ons in any JSR 233 scripting language&lt;br /&gt;
* A set of example add-ons demonstrating as much functionality as possible should be developed in at least Java Script, Jython and Jruby.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - AMF Support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has only very limited support for AMF and does not provide an effective graphical representation of it. &lt;br /&gt;
This development will add full support for AMF.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* De-serialise and display AMF messages in ZAP graphically (based on existing POC code)&lt;br /&gt;
* Expose the AMF data as parameters so that ZAP can scan them&lt;br /&gt;
* Add new AMF specific scan rules as required&lt;br /&gt;
* Implement in a way that makes it easier for ZAP to support other technologies (such as Java applets, Silverlight) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: Colm O'Flaherty - OWASP ZAP Core team'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Web Service (SOAP) scanning ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has only very limited support for web service scanning and has no understanding of WSDL.&lt;br /&gt;
This development will add full support for exploring and scanning SOAP based web services.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The development will allow ZAP to parse WSDL and populate the Sites tree with all of the end points defined. It should also enhance the ZAP scanning capabilities to specifically attack the end points for as wide a range of vulnerabilities. Test cases should be written in [http://code.google.com/p/wavsep/ wavsep] format and contributed back to that project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - As a long running service ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP started out as a GUI only desktop tool. It now supports a headless 'daemon' mode but it is still not suitable for running as a long running service. This will require much heavier use of the database, and ideally will allow different databases to be used. &lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
ZAP able to run as a (very) long running service. There must be no memory leaks code and ideally there should still be very little latency while proxying through ZAP.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - GUI unit test framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
While ZAP does have some low level unit tests it doesnt have any unit tests for the UI. This means that sometimes changes can break the UI without being immediately apparent.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
A unit test framework which will allow the GUI to be easily tested. A set of unit tests which test the main GUI features and can be easily extended.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ESAPI OWASP ESAPI] 2.x - Security Configuration ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
There are currently more than a half-dozen of open Google Issues in ESAPI regarding the security configuration component (e.g., see [http://code.google.com/p/owasp-esapi-java/issues/list?q=component%3DSecurityConfiguration ESAPI Security Configuration Issues]).  &lt;br /&gt;
&lt;br /&gt;
The ESAPI interface for its configuration (SecurityConfiguration) is overly complicated; it has a 'getter' method specific to almost every ESAPI configuration property. The rules for how and where the ESAPI.properties file is found are overly complicated making questions about it one of the most frequently asked questions on forums such as Stack Exchange and the ESAPI mailing lists. This complication leads to a unduly intricate, non-modular reference implementation (DefaultSecurityConfiguration) that makes it difficult to extend in terms of new functionality.&lt;br /&gt;
&lt;br /&gt;
A new, simpler security configuration interface and implementation is needed. Such an implementation would not only be useful for ESAPI 2.x, but could very well be used to build the configurator needed by ESAPI 3.  &lt;br /&gt;
&lt;br /&gt;
As part of this GSoC project, expectations would not only to address as many of the open security configuration issues as possible, but to also go beyond this to allow a framework for additional extensions in terms of functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
1) An improved, but simpler API for the security configuration part of ESAPI.&lt;br /&gt;
2) Alternate configuration stores other than Java properties files (e.g., XML, database), to be supported.&lt;br /&gt;
3) The ability to split the ESAPI configuration data into smaller, more manageable chunks to result in more maintainibility and allow for better enforcement of corporate security policies.&lt;br /&gt;
4) Continued backward compatibility with ESAPI 2.1.x or an extremely simple migration path forward.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prequisite:'''&lt;br /&gt;
&lt;br /&gt;
Since the ESAPI 2.x project is written in Java, a good knowledge of Java is essential. A strong knowledge of JUnit will also be helpful in creating unit test cases. A working knowledge of XML or JDBC may also prove helpful.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Kevin_W._Wall Kevin W. Wall] - OWASP ESAPI for Java Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP Seraphimdroid Project] ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
OWASP Seraphimdroid is relatively new OWASP project regarding Android security. Seraphimdroid Android application should become mobile device safeguard, while on the other hand it should also provide user information and knowledge about security risks on his phone (in personalized way). The idea of security guard is based solely on heuristics, that most of the risks costing money and damaging user's privacy can be stopped without huge online database with signatures, and huge malware analysis lab. As part of this GSoC project, focus will be on finding way to stop as many risks that can cost money (premium calls, sms, ussd...) or harm user privacy as possible and to enhance UX of mobile application.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
* Building features for stopping threats that can cost money originating from third party applications (continue where it was stopped)&lt;br /&gt;
* Build and propose features that can stop third party application damage user's privacy by sending user's data out of the mobile device (using internet) &lt;br /&gt;
* Enhance UI/UX&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prequisite:'''&lt;br /&gt;
&lt;br /&gt;
Since the OWASP Seraphimdroid project is written in Java and Android SDK, a good knowledge of Java, Android OS and SDK are essential. Good knowledge of XML and IP protocol can be useful. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Nikola_Milosevic Nikola Milosevic] - OWASP Seraphimdroid Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - ModSecurity Ruby API ===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
Adding the capability of rapid prototyping to ModSecurity functionalities trough scripts will open the possibility for easy rules production and customization, It also opens the possibility for a large community such as Ruby developers to create their own customization on the top of ModSecurity and so customize their own rules, analog of today's Lua support.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
An implementation able to handle Ruby scripts which will interact to ModSecurity as Lua does.&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
Embedding Ruby into C++ (ModSecurity is C, using C++ as reference):&lt;br /&gt;
http://aeditor.rubyforge.org/ruby_cplusplus/index.html&lt;br /&gt;
ModSecurity Reference Manual, Lua:&lt;br /&gt;
https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#wiki-SecRuleScript&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
C and Ruby programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - ModSecurity Python API ===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
Adding the capability of rapid prototyping to ModSecurity functionalities trough scripts will open the possibility for easy rules production and customization, It also opens the possibility for a large community such as Python developers to create their own customization on the top of ModSecurity and so customize their own rules, analog of today's Lua support.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
An implementation able to handle Python scripts which will interact to ModSecurity as Lua does.&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
Embedding Python into C/C++:&lt;br /&gt;
http://docs.python.org/3.3/extending/embedding.html&lt;br /&gt;
ModSecurity Reference Manual, Lua:&lt;br /&gt;
https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#wiki-SecRuleScript&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
C and Python programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - Create &amp;quot;Sniffer-Mode&amp;quot; ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' &lt;br /&gt;
&lt;br /&gt;
The ModSecurity code includes a &amp;quot;standalone&amp;quot; version that wraps a light weight Apache/APR around the ModSecurity code.  This is used as the basis for the ports to the IIS/Nginx web server platforms.  The goal for this project task is to extend this standalone version so that it can accept a data feed of network traffic (e.g. libpcap) data as input and apply the ModSecurity CRS rules.  Possible solutions could be:&lt;br /&gt;
* Create a ModSecurity &amp;quot;plugin&amp;quot; for the Snort IDS.&lt;br /&gt;
* Create a ModSecurity &amp;quot;plugin&amp;quot; for the Suricata IDS.&lt;br /&gt;
* Add libpcap sniffer wrapper to standalone ModSecurity code to directly pull data off the wire.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This new sniffer mode would allow organizations to run ModSecurity/OWASP ModSecurity CRS in an out of line mode as they do IDS systems.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - Implement DoS Prevention Code ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' https://github.com/SpiderLabs/ModSecurity/issues/416&lt;br /&gt;
&lt;br /&gt;
Implement a request velocity learning engine to identify dynamic DoS thresholds for both the site and for the particular URL.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new C code in ModSecurity will allow us to add new DoS Protection methods to the OWASP ModSecurity CRS.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - Create a Positive Learning/Profile Engine ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' See this academic/research paper for ideas of the type of learning we are looking for - http://www.cs.ucsb.edu/~vigna/publications/2003_kruegel_vigna_ccs03.pdf&lt;br /&gt;
&lt;br /&gt;
ModSecurity needs a profiling engine that implements the various AppSensor Detection Points - http://blog.spiderlabs.com/2011/08/implementing-appsensor-detection-points-in-modsecurity.html.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new engine will implement more detection points to detect abnormal request attributes.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - Create an Engine to Detect Application Flow Anomalies ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Need an engine that can track normal application flow paths (click-flows) for business logic transactions - such as transferring money from accounts.  After profiling normal application path flows, we want to then be able to alert to anomalies.  This type of logic can help to prevent Banking Trojan attacks.&lt;br /&gt;
&lt;br /&gt;
Example - let's say an application has a multi-step checkout process to purchase an item.  This new engine would be able to profile/learn which URLs are accessed in what order and identify if clients skip steps or jump directly to other URLs in the flow.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The engine will be able to alert on anomalous application flows.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=169097</id>
		<title>GSoC2014 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=169097"/>
				<updated>2014-02-28T01:26:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OWASP Project Requests==&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Challenge Sandbox ===&lt;br /&gt;
&lt;br /&gt;
Now, in order to create a challenge, one has to validate the solution with regular expressions (or just plaintext comparison) and report success or failure to the backend,&lt;br /&gt;
we'd like the ability to write a normal vulnerable web application as a challenge and leave it to hackademic to make sure that the server is not affected.&lt;br /&gt;
Since this is probably the most difficult task proposed, if you are considering it, please get in touch with us early on so we can discuss about it and plan it correctly.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
''' *Administrator's point of view* '''&lt;br /&gt;
&lt;br /&gt;
Create an infrastructure that spawns virtual environments for users while keeping the load reasonable on the server(s).&lt;br /&gt;
Or configure apache,php,mysql in a way that allows for multiple instances of the programms to run in parallel completely seperated from the rest of the server.&lt;br /&gt;
The student is expected to provide configuration scripts that do the above&lt;br /&gt;
&lt;br /&gt;
''' *Coder's Way* '''&lt;br /&gt;
&lt;br /&gt;
This is better explained with an example:&lt;br /&gt;
In order to create an sql injection challenge one should be able to call a common unsecure mysql execute statement function.&lt;br /&gt;
The student can override common functions like this providing their own implementation of a very temporary database (based on flat files or nosql solutions e.t.c.).&lt;br /&gt;
The new functions should be able to detect the sqli and apply its results in a secure way(if the student drops a table no actual tables should be dropped but the table should not be visible to the student anymore).&lt;br /&gt;
&lt;br /&gt;
''' * Your solution here * '''&lt;br /&gt;
&lt;br /&gt;
The above solutions are by no way complete,their intention is to start you thinking.&lt;br /&gt;
This is a difficult task so if you consider takling it talk to us early on so we can reach a good solution which is possible in the GSoC timeframe.&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to run a big enough subset of OWASP WebGoat PHP with minimal modification as a Hackademic Challenge&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - CMS improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The new CMS was created during last year's GSOC. We have received feedback from users that suggest various improvements regarding functionality e.g. better user, teacher and challenges management. There are also some security improvements that are needed and in general any functionality that adds up to the educational nature of the project is more than welcome.&lt;br /&gt;
&lt;br /&gt;
Ideas on this project:&lt;br /&gt;
&lt;br /&gt;
* ''' Template''' *&lt;br /&gt;
&lt;br /&gt;
Since it's creation the project has received a good number of new features, but the visual/ux/ui part has never gotten much love.&lt;br /&gt;
It would be good if we had a new template with proper ui design.&lt;br /&gt;
&lt;br /&gt;
* '''Questionaire creation plugin''' *&lt;br /&gt;
&lt;br /&gt;
We'd like the admin to be able to create questionaires, assign rules for each question (e.g. correct answer +2pts incorrect answer -2, no answer 0)  and assign them to students as homework/exams.&lt;br /&gt;
The grading can either be done automatically (for multiple choice) or be submitted to the creator of the questionaire.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to show different articles on the user's home screen''' &lt;br /&gt;
&lt;br /&gt;
Now each user is served the latest article in her/his home screen. We need the ability for either  the teacher/admin to be able to define what article each class is served.&lt;br /&gt;
&lt;br /&gt;
* '''Gamification of the user's progress''' *&lt;br /&gt;
&lt;br /&gt;
A series of plugins and a template which allow the user to earn badges as they solve challenges and a better visual representation of their progress.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to define series of challenges'''&lt;br /&gt;
&lt;br /&gt;
The teacher/admin should be able to define a series of challenges (e.g. 2,5,3,1) which are meant to be solved in that order and if one is not solved then the student can't try the next one.&lt;br /&gt;
&lt;br /&gt;
* ''' Tagging of articles, users, challenges '''&lt;br /&gt;
&lt;br /&gt;
A user should be able to put tags on articles and challenges if he is a student and on users, classes, articles and challenges if he is a teacher.&lt;br /&gt;
Also the user should be able to search according to the tags.&lt;br /&gt;
&lt;br /&gt;
* '''Your idea here''' &lt;br /&gt;
&lt;br /&gt;
We welcome new ideas to make the project look awesome.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New features  and security improvements on the CMS part of the project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP and HTML. Good understanding of Application Security and related vulnerabilities if you undertake security improvements. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
===OWASP WebGoatPHP===&lt;br /&gt;
'''Description:'''&lt;br /&gt;
[[Webgoat]] is a deliberately insecure open source software made by OWASP using Java programming language. It has a set of challenges and steps, each providing the user with one or more web application vulnerability which user tries to solve. There are also hints and auto-detection of correct solutions. &lt;br /&gt;
Since Java is not the most common web application programming language, and it doesn't have many of the bugs other languages such as PHP have when it comes to security, OWASP has [[OWASP_WebGoat_Reboot2012|dedicated in 2012]] an amount of $5000 for promotion of WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about WebGoatPHP, I suggest downloading and giving WebGoat a try. It is one of OWASP prides (about 200000 downloads).&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' WebGoatPHP will be a deliberately insecure PHP web application which operates in different modes. A contest mode where challenges are selected by an admin and the system starts a contest. Admins can open up hints for participants and manage everything. A workshop mode, where the educator has control of the most of application features, as well as feedback of user activities and is ideal for learning environments, and a single mode where someone can browse challenges and solve them.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' You just need to know PHP. You are supposed to define flawed systems, which is not the hardest thing. Familiarity with web application security and SQL is recommended.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
===OWASP CSRF Guard===&lt;br /&gt;
'''Description:''' [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] is a complicated yet very effective web attack. The most important thing about CSRF is that it's hard to properly defend against it, specially when it comes to Web 2 and AJAX. We have had discussions on means of mitigating CSRF for years at OWASP, and are now ready to develop libraries for it. Many of the key ideas of this library can be found at [http://www.cs.sunysb.edu/~rpelizzi/jcsrf.pdf].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' A transparent Apache 2 module properly mitigating all POST CSRF attacks, as well as a lightweight PHP library doing the same.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisites:''' Knowing CSRF and at least one way to defend against it, PHP, C/C++, Linux.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' Result of this project is much more security among PHP applications. Most PHP applications are vulnerable and there's no central approach to secure them (due to open source nature). Many people look at OWASP for such information.&lt;br /&gt;
&lt;br /&gt;
Last year, we got GSoC people working on OWASP PHPSEC, and we were the most active OWASP project. A lot of the libraries are in place, and this year, we will mostly work on the framework.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Anyone with adequate PHP programming language experience (possibly web application development in PHP).  There are hard and easy parts of this project. For tougher parts, familiarity with security concepts, advanced SQL, and advanced PHP and web server configuration is required. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary , Johanna Curiel&lt;br /&gt;
&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 6 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
OWASP provides the RBAC project, as a stand-alone library with very fast access control checks and standard mature code-base. Currently [[PHPRBAC]] which is the PHP version of the RBAC project is released.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' Standard NIST level 2 hierarchical RBAC libraries for different programming languages, specially web-based ones such as C/C++/Java/ASP/ASPX/Python/Perl/etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development schemes, familiarity with one of the programming languages.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Zest support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Zest iniciative, this provides a great automated mechanism to replicate exploitation of security vulnerabilities in a format that makes tool communication easier: For example, ZAP supports Zest, so if OWTF can create a Zest script for a vulnerability in an automated fashion, this may in turn be easier to import into ZAP and other tools.&lt;br /&gt;
&lt;br /&gt;
[https://developer.mozilla.org/en-US/docs/Zest More information on Zest can be found here]&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Some previous exposure to security concepts, penetration testing, Python and development in general is important for this project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Improved Plug-n-Hack support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Plug-n-Hack standard, this provides greatly improved interaction with the web browser.&lt;br /&gt;
Although OWTF already supports Plug-n-Hack for MiTM purposes, there are many other features that could be implemented to leaverage Plug-n-Hack.&lt;br /&gt;
The aim of this project would be to try to cover as much as possible from the Plug-n-Hack standard as relevant to OWTF.&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=pYFtLA2yTR8 Please see this demo to see the newest Plug-n-Hack additions]&lt;br /&gt;
&lt;br /&gt;
[https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ For more information about plug and hack please see this]&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Stateful Browser with configurable authentication ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The automated functionality of OWASP OWTF is currently limited to the non-authenticated portion of a website. We would like to implement authentication support through:&lt;br /&gt;
&lt;br /&gt;
1) OWTF parameters&lt;br /&gt;
&lt;br /&gt;
2) Configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What we would like to do here is to leverage the [http://wwwsearch.sourceforge.net/mechanize/ powerful mechanize python library] and build at least support for the following authentication options:&lt;br /&gt;
* Basic authentication [https://github.com/7a/owtf/issues/9 Already implemented here]&lt;br /&gt;
* Cookie based authentication&lt;br /&gt;
* Form-based authentication&lt;br /&gt;
&lt;br /&gt;
Additionally, we would welcome here a feature to detect when the user has been logged off, to log OWTF back in again before retrying the next request. &amp;lt;-- The proxy is probably a better place to implement this since external tools would also benefit from this. This feature will have to be coordinated with the MiTM proxy feature (already implemented).&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with the mechanize library or HTTP state is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - SQL database ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF scans may take a large amount of disk space due to saving information in text files, we would like to add an option to use a SQL database, probably using the sqlalchemy python library.&lt;br /&gt;
* Keep the current text file format as an option&lt;br /&gt;
* Add a database storage option using the sqlalchemy library &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Reliability: Both with the sql database option and the text file options.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, sqlalchemy experience would be beneficial for this&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Unit Test Framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Python version upgrade and compatibility ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP OWTF works on Python 2.6.5-2.7.3 (might work on surrounding versions too), the aim of this project would be to change the existing codebase so that it additionally works on newer python versions too, for example Python 3.3.&lt;br /&gt;
The intention here is to take advantage of improvements in newer python versions when available while letting OWASP OWTF work on older python versions too (i.e. 2.6.5) if that is the only option available.&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable due to compatibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and reliable OWASP OWTF execution on multiple python versions, in particular the latest python version (i.e. 3.3.x) as well as the previous 2.6.5-2.7.3 range.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with python version upgrades and python version compatibility implementations, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
===OWASP PCI TOOLKIT===&lt;br /&gt;
[[File:Pci-toolkit-items-small.gif]]&amp;lt;br&amp;gt; OWASP PCI toolkit is an Open Source project built using Google Engine App, that will help organizations scope the PCI-DSS requirements for their System Components. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.&lt;br /&gt;
&lt;br /&gt;
In order to comply with this standard, organizations need to understand the PCI-DSS requirements. Many of these requirements use OWASP guidelines as their baseline.&lt;br /&gt;
 &lt;br /&gt;
The OWASP PCI toolkit is a project focused on helping organization understand how OWASP guidelines apply to the PCI-DSS requirements.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
4 complete modules built as a Google App Engine: &lt;br /&gt;
http://pci-toolkit.appspot.com/&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Skill Level: Easy-Medium&lt;br /&gt;
Python, HTML, CSS, Google App Engine.&lt;br /&gt;
&lt;br /&gt;
Affinity with financial institutions, Web security and credit card-online transactions&lt;br /&gt;
&lt;br /&gt;
'''OWASP project page:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_PCI_Project&lt;br /&gt;
&lt;br /&gt;
Mentor: Johanna Curiel - emai: firstname.lastname@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP iGoat ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP iGoat works fine as a full universal iOS app on iPhone and iPads up to iOS 6.x and Xcode 4.x. It needs to be updated to properly function under iOS 7.x and Xcode 5.x, which will require some code maintenance, GUI changes, and so on.&lt;br /&gt;
&lt;br /&gt;
Although it is primarily maintenance items that need the updating, the student will gain an intimate familiarity with how the iGoat platform works, including how to write and plug-in new exercise modules. Writing additional exercises, with all due credit, will also be encouraged in an optional second phase of this project.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP iGoat please see: https://www.owasp.org/index.php/OWASP_iGoat_Project&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* iGoat functions properly in all current aspects under iOS 7.x, compiled under Xcode 5.x.&lt;br /&gt;
* All GUI, buttons, and other presentation layer aspects of iGoat are compliant with iOS 7.x look and feel.&lt;br /&gt;
* (Optionally) write one or more new iGoat exercise modules, based on existing design descriptions to be provided by the project mentor.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
iOS app development in Xcode using Objective C will be quite necessary. Familiarity with iOS 7.x user interface updates additionally helpful.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ken van Wyk - OWASP iGoat Project Leader - Contact: ken@krvw.com'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Advanced access control testing ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Access control testing is typically difficult for security tools to automate. However previous Google Summer of Code projects have added session, authentication, user and role handling to ZAP, which provide an ideal basis for advanced access control testing.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This development would allow (semi) automated access control testing by:&lt;br /&gt;
* Maintaining and displaying different site trees (application maps) for different users/roles&lt;br /&gt;
* Providing tools which access all of the content accessible via one user/role which should not be accessible via another user/role&lt;br /&gt;
* Ideally allow resources to be tied to users/roles to allow enable horizontal privilege testing &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Scripted Add-ons ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP supports all JSR 223 scripting languages, but only for a limited number of purposes. This development would allow 'full' add-ons to be written in any JSR 223 language.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Users will be able to 'full' add-ons in any JSR 233 scripting language&lt;br /&gt;
* A set of example add-ons demonstrating as much functionality as possible should be developed in at least Java Script, Jython and Jruby.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - AMF Support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has only very limited support for AMF and does not provide an effective graphical representation of it. &lt;br /&gt;
This development will add full support for AMF.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* De-serialise and display AMF messages in ZAP graphically (based on existing POC code)&lt;br /&gt;
* Expose the AMF data as parameters so that ZAP can scan them&lt;br /&gt;
* Add new AMF specific scan rules as required&lt;br /&gt;
* Implement in a way that makes it easier for ZAP to support other technologies (such as Java applets, Silverlight) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: Colm O'Flaherty - OWASP ZAP Core team'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Web Service (SOAP) scanning ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has only very limited support for web service scanning and has no understanding of WSDL.&lt;br /&gt;
This development will add full support for exploring and scanning SOAP based web services.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The development will allow ZAP to parse WSDL and populate the Sites tree with all of the end points defined. It should also enhance the ZAP scanning capabilities to specifically attack the end points for as wide a range of vulnerabilities. Test cases should be written in [http://code.google.com/p/wavsep/ wavsep] format and contributed back to that project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - As a long running service ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP started out as a GUI only desktop tool. It now supports a headless 'daemon' mode but it is still not suitable for running as a long running service. This will require much heavier use of the database, and ideally will allow different databases to be used. &lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
ZAP able to run as a (very) long running service. There must be no memory leaks code and ideally there should still be very little latency while proxying through ZAP.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - GUI unit test framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
While ZAP does have some low level unit tests it doesnt have any unit tests for the UI. This means that sometimes changes can break the UI without being immediately apparent.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
A unit test framework which will allow the GUI to be easily tested. A set of unit tests which test the main GUI features and can be easily extended.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ESAPI OWASP ESAPI] 2.x - Security Configuration ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
There are currently more than a half-dozen of open Google Issues in ESAPI regarding the security configuration component (e.g., see [http://code.google.com/p/owasp-esapi-java/issues/list?q=component%3DSecurityConfiguration ESAPI Security Configuration Issues]).  &lt;br /&gt;
&lt;br /&gt;
The ESAPI interface for its configuration (SecurityConfiguration) is overly complicated; it has a 'getter' method specific to almost every ESAPI configuration property. The rules for how and where the ESAPI.properties file is found are overly complicated making questions about it one of the most frequently asked questions on forums such as Stack Exchange and the ESAPI mailing lists. This complication leads to a unduly intricate, non-modular reference implementation (DefaultSecurityConfiguration) that makes it difficult to extend in terms of new functionality.&lt;br /&gt;
&lt;br /&gt;
A new, simpler security configuration interface and implementation is needed. Such an implementation would not only be useful for ESAPI 2.x, but could very well be used to build the configurator needed by ESAPI 3.  &lt;br /&gt;
&lt;br /&gt;
As part of this GSoC project, expectations would not only to address as many of the open security configuration issues as possible, but to also go beyond this to allow a framework for additional extensions in terms of functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
1) An improved, but simpler API for the security configuration part of ESAPI.&lt;br /&gt;
2) Alternate configuration stores other than Java properties files (e.g., XML, database), to be supported.&lt;br /&gt;
3) The ability to split the ESAPI configuration data into smaller, more manageable chunks to result in more maintainibility and allow for better enforcement of corporate security policies.&lt;br /&gt;
4) Continued backward compatibility with ESAPI 2.1.x or an extremely simple migration path forward.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prequisite:'''&lt;br /&gt;
&lt;br /&gt;
Since the ESAPI 2.x project is written in Java, a good knowledge of Java is essential. A strong knowledge of JUnit will also be helpful in creating unit test cases. A working knowledge of XML or JDBC may also prove helpful.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Kevin_W._Wall Kevin W. Wall] - OWASP ESAPI for Java Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP Seraphimdroid Project] ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
OWASP Seraphimdroid is relatively new OWASP project regarding Android security. Seraphimdroid Android application should become mobile device safeguard, while on the other hand it should also provide user information and knowledge about security risks on his phone (in personalized way). The idea of security guard is based solely on heuristics, that most of the risks costing money and damaging user's privacy can be stopped without huge online database with signatures, and huge malware analysis lab. As part of this GSoC project, focus will be on finding way to stop as many risks that can cost money (premium calls, sms, ussd...) or harm user privacy as possible and to enhance UX of mobile application.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
* Building features for stopping threats that can cost money originating from third party applications (continue where it was stopped)&lt;br /&gt;
* Build and propose features that can stop third party application damage user's privacy by sending user's data out of the mobile device (using internet) &lt;br /&gt;
* Enhance UI/UX&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prequisite:'''&lt;br /&gt;
&lt;br /&gt;
Since the OWASP Seraphimdroid project is written in Java and Android SDK, a good knowledge of Java, Android OS and SDK are essential. Good knowledge of XML and IP protocol can be useful. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Nikola_Milosevic Nikola Milosevic] - OWASP Seraphimdroid Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity Core Rule Set (CRS) - Create &amp;quot;Sniffer-Mode&amp;quot; ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' &lt;br /&gt;
&lt;br /&gt;
The ModSecurity code includes a &amp;quot;standalone&amp;quot; version that wraps a light weight Apache/APR around the ModSecurity code.  This is used as the basis for the ports to the IIS/Nginx web server platforms.  The goal for this project task is to extend this standalone version so that it can accept a data feed of network traffic (e.g. libpcap) data as input and apply the ModSecurity CRS rules.  Possible solutions could be:&lt;br /&gt;
* Create a ModSecurity &amp;quot;plugin&amp;quot; for the Snort IDS.&lt;br /&gt;
* Create a ModSecurity &amp;quot;plugin&amp;quot; for the Suricata IDS.&lt;br /&gt;
* Add libpcap sniffer wrapper to standalone ModSecurity code to directly pull data off the wire.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This new sniffer mode would allow organizations to run ModSecurity/OWASP ModSecurity CRS in an out of line mode as they do IDS systems.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity Core Rule Set (CRS) - Implement DoS Prevention Code ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' https://github.com/SpiderLabs/ModSecurity/issues/416&lt;br /&gt;
&lt;br /&gt;
Implement a request velocity learning engine to identify dynamic DoS thresholds for both the site and for the particular URL.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new C code in ModSecurity will allow us to add new DoS Protection methods to the OWASP ModSecurity CRS.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity Core Rule Set (CRS) - Create a Positive Learning/Profile Engine ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' See this academic/research paper for ideas of the type of learning we are looking for - http://www.cs.ucsb.edu/~vigna/publications/2003_kruegel_vigna_ccs03.pdf&lt;br /&gt;
&lt;br /&gt;
ModSecurity needs a profiling engine that implements the various AppSensor Detection Points - http://blog.spiderlabs.com/2011/08/implementing-appsensor-detection-points-in-modsecurity.html.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new engine will implement more detection points to detect abnormal request attributes.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity Core Rule Set (CRS) - Create an Engine to Detect Application Flow Anomalies ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Need an engine that can track normal application flow paths (click-flows) for business logic transactions - such as transferring money from accounts.  After profiling normal application path flows, we want to then be able to alert to anomalies.  This type of logic can help to prevent Banking Trojan attacks.&lt;br /&gt;
&lt;br /&gt;
Example - let's say an application has a multi-step checkout process to purchase an item.  This new engine would be able to profile/learn which URLs are accessed in what order and identify if clients skip steps or jump directly to other URLs in the flow.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The engine will be able to alert on anomalous application flows.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=169093</id>
		<title>GSoC2014 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=169093"/>
				<updated>2014-02-27T18:53:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OWASP Project Requests==&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Challenge Sandbox ===&lt;br /&gt;
&lt;br /&gt;
Now, in order to create a challenge, one has to validate the solution with regular expressions (or just plaintext comparison) and report success or failure to the backend,&lt;br /&gt;
we'd like the ability to write a normal vulnerable web application as a challenge and leave it to hackademic to make sure that the server is not affected.&lt;br /&gt;
Since this is probably the most difficult task proposed, if you are considering it, please get in touch with us early on so we can discuss about it and plan it correctly.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
''' *Administrator's point of view* '''&lt;br /&gt;
&lt;br /&gt;
Create an infrastructure that spawns virtual environments for users while keeping the load reasonable on the server(s).&lt;br /&gt;
Or configure apache,php,mysql in a way that allows for multiple instances of the programms to run in parallel completely seperated from the rest of the server.&lt;br /&gt;
The student is expected to provide configuration scripts that do the above&lt;br /&gt;
&lt;br /&gt;
''' *Coder's Way* '''&lt;br /&gt;
&lt;br /&gt;
This is better explained with an example:&lt;br /&gt;
In order to create an sql injection challenge one should be able to call a common unsecure mysql execute statement function.&lt;br /&gt;
The student can override common functions like this providing their own implementation of a very temporary database (based on flat files or nosql solutions e.t.c.).&lt;br /&gt;
The new functions should be able to detect the sqli and apply its results in a secure way(if the student drops a table no actual tables should be dropped but the table should not be visible to the student anymore).&lt;br /&gt;
&lt;br /&gt;
''' * Your solution here * '''&lt;br /&gt;
&lt;br /&gt;
The above solutions are by no way complete,their intention is to start you thinking.&lt;br /&gt;
This is a difficult task so if you consider takling it talk to us early on so we can reach a good solution which is possible in the GSoC timeframe.&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to run a big enough subset of OWASP WebGoat PHP with minimal modification as a Hackademic Challenge&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - CMS improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The new CMS was created during last year's GSOC. We have received feedback from users that suggest various improvements regarding functionality e.g. better user, teacher and challenges management. There are also some security improvements that are needed and in general any functionality that adds up to the educational nature of the project is more than welcome.&lt;br /&gt;
&lt;br /&gt;
Ideas on this project:&lt;br /&gt;
&lt;br /&gt;
* ''' Template''' *&lt;br /&gt;
&lt;br /&gt;
Since it's creation the project has received a good number of new features, but the visual/ux/ui part has never gotten much love.&lt;br /&gt;
It would be good if we had a new template with proper ui design.&lt;br /&gt;
&lt;br /&gt;
* '''Questionaire creation plugin''' *&lt;br /&gt;
&lt;br /&gt;
We'd like the admin to be able to create questionaires, assign rules for each question (e.g. correct answer +2pts incorrect answer -2, no answer 0)  and assign them to students as homework/exams.&lt;br /&gt;
The grading can either be done automatically (for multiple choice) or be submitted to the creator of the questionaire.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to show different articles on the user's home screen''' &lt;br /&gt;
&lt;br /&gt;
Now each user is served the latest article in her/his home screen. We need the ability for either  the teacher/admin to be able to define what article each class is served.&lt;br /&gt;
&lt;br /&gt;
* '''Gamification of the user's progress''' *&lt;br /&gt;
&lt;br /&gt;
A series of plugins and a template which allow the user to earn badges as they solve challenges and a better visual representation of their progress.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to define series of challenges'''&lt;br /&gt;
&lt;br /&gt;
The teacher/admin should be able to define a series of challenges (e.g. 2,5,3,1) which are meant to be solved in that order and if one is not solved then the student can't try the next one.&lt;br /&gt;
&lt;br /&gt;
* ''' Tagging of articles, users, challenges '''&lt;br /&gt;
&lt;br /&gt;
A user should be able to put tags on articles and challenges if he is a student and on users, classes, articles and challenges if he is a teacher.&lt;br /&gt;
Also the user should be able to search according to the tags.&lt;br /&gt;
&lt;br /&gt;
* '''Your idea here''' &lt;br /&gt;
&lt;br /&gt;
We welcome new ideas to make the project look awesome.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New features  and security improvements on the CMS part of the project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP and HTML. Good understanding of Application Security and related vulnerabilities if you undertake security improvements. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
===OWASP WebGoatPHP===&lt;br /&gt;
'''Description:'''&lt;br /&gt;
[[Webgoat]] is a deliberately insecure open source software made by OWASP using Java programming language. It has a set of challenges and steps, each providing the user with one or more web application vulnerability which user tries to solve. There are also hints and auto-detection of correct solutions. &lt;br /&gt;
Since Java is not the most common web application programming language, and it doesn't have many of the bugs other languages such as PHP have when it comes to security, OWASP has [[OWASP_WebGoat_Reboot2012|dedicated in 2012]] an amount of $5000 for promotion of WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about WebGoatPHP, I suggest downloading and giving WebGoat a try. It is one of OWASP prides (about 200000 downloads).&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' WebGoatPHP will be a deliberately insecure PHP web application which operates in different modes. A contest mode where challenges are selected by an admin and the system starts a contest. Admins can open up hints for participants and manage everything. A workshop mode, where the educator has control of the most of application features, as well as feedback of user activities and is ideal for learning environments, and a single mode where someone can browse challenges and solve them.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' You just need to know PHP. You are supposed to define flawed systems, which is not the hardest thing. Familiarity with web application security and SQL is recommended.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
===OWASP CSRF Guard===&lt;br /&gt;
'''Description:''' [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] is a complicated yet very effective web attack. The most important thing about CSRF is that it's hard to properly defend against it, specially when it comes to Web 2 and AJAX. We have had discussions on means of mitigating CSRF for years at OWASP, and are now ready to develop libraries for it. Many of the key ideas of this library can be found at [http://www.cs.sunysb.edu/~rpelizzi/jcsrf.pdf].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' A transparent Apache 2 module properly mitigating all POST CSRF attacks, as well as a lightweight PHP library doing the same.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisites:''' Knowing CSRF and at least one way to defend against it, PHP, C/C++, Linux.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' Result of this project is much more security among PHP applications. Most PHP applications are vulnerable and there's no central approach to secure them (due to open source nature). Many people look at OWASP for such information.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Anyone with adequate PHP programming language experience (possibly web application development in PHP).  There are hard and easy parts of this project. For tougher parts, familiarity with security concepts, advanced SQL, and advanced PHP and web server configuration is required. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary , Johanna Curiel&lt;br /&gt;
&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 6 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
OWASP provides the RBAC project, as a stand-alone library with very fast access control checks and standard mature code-base. Currently [[PHPRBAC]] which is the PHP version of the RBAC project is released.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' Standard NIST level 2 hierarchical RBAC libraries for different programming languages, specially web-based ones such as C/C++/Java/ASP/ASPX/Python/Perl/etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development schemes, familiarity with one of the programming languages.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Zest support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Zest iniciative, this provides a great automated mechanism to replicate exploitation of security vulnerabilities in a format that makes tool communication easier: For example, ZAP supports Zest, so if OWTF can create a Zest script for a vulnerability in an automated fashion, this may in turn be easier to import into ZAP and other tools.&lt;br /&gt;
&lt;br /&gt;
[https://developer.mozilla.org/en-US/docs/Zest More information on Zest can be found here]&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Some previous exposure to security concepts, penetration testing, Python and development in general is important for this project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Improved Plug-n-Hack support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Plug-n-Hack standard, this provides greatly improved interaction with the web browser.&lt;br /&gt;
Although OWTF already supports Plug-n-Hack for MiTM purposes, there are many other features that could be implemented to leaverage Plug-n-Hack.&lt;br /&gt;
The aim of this project would be to try to cover as much as possible from the Plug-n-Hack standard as relevant to OWTF.&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=pYFtLA2yTR8 Please see this demo to see the newest Plug-n-Hack additions]&lt;br /&gt;
&lt;br /&gt;
[https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ For more information about plug and hack please see this]&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Stateful Browser with configurable authentication ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The automated functionality of OWASP OWTF is currently limited to the non-authenticated portion of a website. We would like to implement authentication support through:&lt;br /&gt;
&lt;br /&gt;
1) OWTF parameters&lt;br /&gt;
&lt;br /&gt;
2) Configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What we would like to do here is to leverage the [http://wwwsearch.sourceforge.net/mechanize/ powerful mechanize python library] and build at least support for the following authentication options:&lt;br /&gt;
* Basic authentication [https://github.com/7a/owtf/issues/9 Already implemented here]&lt;br /&gt;
* Cookie based authentication&lt;br /&gt;
* Form-based authentication&lt;br /&gt;
&lt;br /&gt;
Additionally, we would welcome here a feature to detect when the user has been logged off, to log OWTF back in again before retrying the next request. &amp;lt;-- The proxy is probably a better place to implement this since external tools would also benefit from this. This feature will have to be coordinated with the MiTM proxy feature (already implemented).&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with the mechanize library or HTTP state is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - SQL database ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF scans may take a large amount of disk space due to saving information in text files, we would like to add an option to use a SQL database, probably using the sqlalchemy python library.&lt;br /&gt;
* Keep the current text file format as an option&lt;br /&gt;
* Add a database storage option using the sqlalchemy library &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Reliability: Both with the sql database option and the text file options.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, sqlalchemy experience would be beneficial for this&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Unit Test Framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Python version upgrade and compatibility ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP OWTF works on Python 2.6.5-2.7.3 (might work on surrounding versions too), the aim of this project would be to change the existing codebase so that it additionally works on newer python versions too, for example Python 3.3.&lt;br /&gt;
The intention here is to take advantage of improvements in newer python versions when available while letting OWASP OWTF work on older python versions too (i.e. 2.6.5) if that is the only option available.&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable due to compatibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and reliable OWASP OWTF execution on multiple python versions, in particular the latest python version (i.e. 3.3.x) as well as the previous 2.6.5-2.7.3 range.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with python version upgrades and python version compatibility implementations, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
===OWASP PCI TOOLKIT===&lt;br /&gt;
[[File:Pci-toolkit-items-small.gif]]&amp;lt;br&amp;gt; OWASP PCI toolkit is an Open Source project built using Google Engine App, that will help organizations scope the PCI-DSS requirements for their System Components. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.&lt;br /&gt;
&lt;br /&gt;
In order to comply with this standard, organizations need to understand the PCI-DSS requirements. Many of these requirements use OWASP guidelines as their baseline.&lt;br /&gt;
 &lt;br /&gt;
The OWASP PCI toolkit is a project focused on helping organization understand how OWASP guidelines apply to the PCI-DSS requirements.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
4 complete modules built as a Google App Engine: &lt;br /&gt;
http://pci-toolkit.appspot.com/&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Skill Level: Easy-Medium&lt;br /&gt;
Python, HTML, CSS, Google App Engine.&lt;br /&gt;
&lt;br /&gt;
Affinity with financial institutions, Web security and credit card-online transactions&lt;br /&gt;
&lt;br /&gt;
'''OWASP project page:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_PCI_Project&lt;br /&gt;
&lt;br /&gt;
Mentor: Johanna Curiel - emai: firstname.lastname@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP iGoat ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP iGoat works fine as a full universal iOS app on iPhone and iPads up to iOS 6.x and Xcode 4.x. It needs to be updated to properly function under iOS 7.x and Xcode 5.x, which will require some code maintenance, GUI changes, and so on.&lt;br /&gt;
&lt;br /&gt;
Although it is primarily maintenance items that need the updating, the student will gain an intimate familiarity with how the iGoat platform works, including how to write and plug-in new exercise modules. Writing additional exercises, with all due credit, will also be encouraged in an optional second phase of this project.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP iGoat please see: https://www.owasp.org/index.php/OWASP_iGoat_Project&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* iGoat functions properly in all current aspects under iOS 7.x, compiled under Xcode 5.x.&lt;br /&gt;
* All GUI, buttons, and other presentation layer aspects of iGoat are compliant with iOS 7.x look and feel.&lt;br /&gt;
* (Optionally) write one or more new iGoat exercise modules, based on existing design descriptions to be provided by the project mentor.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
iOS app development in Xcode using Objective C will be quite necessary. Familiarity with iOS 7.x user interface updates additionally helpful.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ken van Wyk - OWASP iGoat Project Leader - Contact: ken@krvw.com'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Advanced access control testing ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Access control testing is typically difficult for security tools to automate. However previous Google Summer of Code projects have added session, authentication, user and role handling to ZAP, which provide an ideal basis for advanced access control testing.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This development would allow (semi) automated access control testing by:&lt;br /&gt;
* Maintaining and displaying different site trees (application maps) for different users/roles&lt;br /&gt;
* Providing tools which access all of the content accessible via one user/role which should not be accessible via another user/role&lt;br /&gt;
* Ideally allow resources to be tied to users/roles to allow enable horizontal privilege testing &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Scripted Add-ons ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP supports all JSR 223 scripting languages, but only for a limited number of purposes. This development would allow 'full' add-ons to be written in any JSR 223 language.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Users will be able to 'full' add-ons in any JSR 233 scripting language&lt;br /&gt;
* A set of example add-ons demonstrating as much functionality as possible should be developed in at least Java Script, Jython and Jruby.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - AMF Support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has only very limited support for AMF and does not provide an effective graphical representation of it. &lt;br /&gt;
This development will add full support for AMF.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* De-serialise and display AMF messages in ZAP graphically (based on existing POC code)&lt;br /&gt;
* Expose the AMF data as parameters so that ZAP can scan them&lt;br /&gt;
* Add new AMF specific scan rules as required&lt;br /&gt;
* Implement in a way that makes it easier for ZAP to support other technologies (such as Java applets, Silverlight) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: Colm O'Flaherty - OWASP ZAP Core team'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - Web Service (SOAP) scanning ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has only very limited support for web service scanning and has no understanding of WSDL.&lt;br /&gt;
This development will add full support for exploring and scanning SOAP based web services.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The development will allow ZAP to parse WSDL and populate the Sites tree with all of the end points defined. It should also enhance the ZAP scanning capabilities to specifically attack the end points for as wide a range of vulnerabilities. Test cases should be written in [http://code.google.com/p/wavsep/ wavsep] format and contributed back to that project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - As a long running service ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP started out as a GUI only desktop tool. It now supports a headless 'daemon' mode but it is still not suitable for running as a long running service. This will require much heavier use of the database, and ideally will allow different databases to be used. &lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
ZAP able to run as a (very) long running service. There must be no memory leaks code and ideally there should still be very little latency while proxying through ZAP.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ZAP OWASP ZAP] - GUI unit test framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
While ZAP does have some low level unit tests it doesnt have any unit tests for the UI. This means that sometimes changes can break the UI without being immediately apparent.&lt;br /&gt;
&lt;br /&gt;
ZAP is the [https://www.ohloh.net/orgs/OWASP most active OWASP project] and was voted the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ most popular security tool of 2013] by ToolsWatch.org reeaders.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
A unit test framework which will allow the GUI to be easily tested. A set of unit tests which test the main GUI features and can be easily extended.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Simon_Bennetts Simon Bennetts] - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/ESAPI OWASP ESAPI] 2.x - Security Configuration ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
There are currently more than a half-dozen of open Google Issues in ESAPI regarding the security configuration component (e.g., see [http://code.google.com/p/owasp-esapi-java/issues/list?q=component%3DSecurityConfiguration ESAPI Security Configuration Issues]).  &lt;br /&gt;
&lt;br /&gt;
The ESAPI interface for its configuration (SecurityConfiguration) is overly complicated; it has a 'getter' method specific to almost every ESAPI configuration property. The rules for how and where the ESAPI.properties file is found are overly complicated making questions about it one of the most frequently asked questions on forums such as Stack Exchange and the ESAPI mailing lists. This complication leads to a unduly intricate, non-modular reference implementation (DefaultSecurityConfiguration) that makes it difficult to extend in terms of new functionality.&lt;br /&gt;
&lt;br /&gt;
A new, simpler security configuration interface and implementation is needed. Such an implementation would not only be useful for ESAPI 2.x, but could very well be used to build the configurator needed by ESAPI 3.  &lt;br /&gt;
&lt;br /&gt;
As part of this GSoC project, expectations would not only to address as many of the open security configuration issues as possible, but to also go beyond this to allow a framework for additional extensions in terms of functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
1) An improved, but simpler API for the security configuration part of ESAPI.&lt;br /&gt;
2) Alternate configuration stores other than Java properties files (e.g., XML, database), to be supported.&lt;br /&gt;
3) The ability to split the ESAPI configuration data into smaller, more manageable chunks to result in more maintainibility and allow for better enforcement of corporate security policies.&lt;br /&gt;
4) Continued backward compatibility with ESAPI 2.1.x or an extremely simple migration path forward.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prequisite:'''&lt;br /&gt;
&lt;br /&gt;
Since the ESAPI 2.x project is written in Java, a good knowledge of Java is essential. A strong knowledge of JUnit will also be helpful in creating unit test cases. A working knowledge of XML or JDBC may also prove helpful.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Kevin_W._Wall Kevin W. Wall] - OWASP ESAPI for Java Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP Seraphimdroid Project] ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
OWASP Seraphimdroid is relatively new OWASP project regarding Android security. Seraphimdroid Android application should become mobile device safeguard, while on the other hand it should also provide user information and knowledge about security risks on his phone (in personalized way). The idea of security guard is based solely on heuristics, that most of the risks costing money and damaging user's privacy can be stopped without huge online database with signatures, and huge malware analysis lab. As part of this GSoC project, focus will be on finding way to stop as many risks that can cost money (premium calls, sms, ussd...) or harm user privacy as possible and to enhance UX of mobile application.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
* Building features for stopping threats that can cost money originating from third party applications (continue where it was stopped)&lt;br /&gt;
* Build and propose features that can stop third party application damage user's privacy by sending user's data out of the mobile device (using internet) &lt;br /&gt;
* Enhance UI/UX&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prequisite:'''&lt;br /&gt;
&lt;br /&gt;
Since the OWASP Seraphimdroid project is written in Java and Android SDK, a good knowledge of Java, Android OS and SDK are essential. Good knowledge of XML and IP protocol can be useful. &lt;br /&gt;
&lt;br /&gt;
'''Mentor: [https://www.owasp.org/index.php/User:Nikola_Milosevic Nikola Milosevic] - OWASP Seraphimdroid Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity Core Rule Set (CRS) - Create &amp;quot;Sniffer-Mode&amp;quot; ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' &lt;br /&gt;
&lt;br /&gt;
The ModSecurity code includes a &amp;quot;standalone&amp;quot; version that wraps a light weight Apache/APR around the ModSecurity code.  This is used as the basis for the ports to the IIS/Nginx web server platforms.  The goal for this project task is to extend this standalone version so that it can accept a data feed of network traffic (e.g. libpcap) data as input and apply the ModSecurity CRS rules.  Possible solutions could be:&lt;br /&gt;
* Create a ModSecurity &amp;quot;plugin&amp;quot; for the Snort IDS.&lt;br /&gt;
* Create a ModSecurity &amp;quot;plugin&amp;quot; for the Suricata IDS.&lt;br /&gt;
* Add libpcap sniffer wrapper to standalone ModSecurity code to directly pull data off the wire.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This new sniffer mode would allow organizations to run ModSecurity/OWASP ModSecurity CRS in an out of line mode as they do IDS systems.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity Core Rule Set (CRS) - Implement DoS Prevention Code ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' https://github.com/SpiderLabs/ModSecurity/issues/416&lt;br /&gt;
&lt;br /&gt;
Implement a request velocity learning engine to identify dynamic DoS thresholds for both the site and for the particular URL.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new C code in ModSecurity will allow us to add new DoS Protection methods to the OWASP ModSecurity CRS.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity CRS - Create a Positive Learning/Profile Engine ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' See this academic/research paper for ideas of the type of learning we are looking for - http://www.cs.ucsb.edu/~vigna/publications/2003_kruegel_vigna_ccs03.pdf&lt;br /&gt;
&lt;br /&gt;
ModSecurity needs a profiling engine that implements the various AppSensor Detection Points - http://blog.spiderlabs.com/2011/08/implementing-appsensor-detection-points-in-modsecurity.html.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new engine will implement more detection points to detect abnormal request attributes.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity Core Rule Set (CRS) - Create an Engine to Detect Application Flow Anomalies ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Need an engine that can track normal application flow paths (click-flows) for business logic transactions - such as transferring money from accounts.  After profiling normal application path flows, we want to then be able to alert to anomalies.  This type of logic can help to prevent Banking Trojan attacks.&lt;br /&gt;
&lt;br /&gt;
Example - let's say an application has a multi-step checkout process to purchase an item.  This new engine would be able to profile/learn which URLs are accessed in what order and identify if clients skip steps or jump directly to other URLs in the flow.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The engine will be able to alert on anomalous application flows.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Felipe Zimmerle Costa and Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=168928</id>
		<title>OWASP WASC Distributed Web Honeypots Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=168928"/>
				<updated>2014-02-24T23:32:02Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Distributed Web Honeypots Project==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP WASC Distributed Web Honeypots Project is to identify emerging attacks against web applications and report them to the community including automated scanning activity, probes, as well as, targeted attacks against specific web apps.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The goal of the Distributed Web Honeypot (DWH) Project is to identify emerging attacks against web applications and report them to the community.  This may include automated scanning activity, probes, as well as, targeted attacks against specific web sites or applications.  The scope of this project has recently been expanded to include deployment of both standard web application honeypots and/or open proxy honeypots.  Project participants may choose whether they want to run their honeypot as an open proxy or a stand-alone sensor.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This project fills a need in the web application Defender's community to have detailed data about mass web application scanning attacks such as those being operated by Botnets.  This project will provide detailed data about attacks and their origins.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is free to use. It is licensed under the Apache 2.0 License.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP WASC Distributed Web Honeypots Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project provides:&lt;br /&gt;
&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
* [http://prezi.com/dvvv2gdpezzz/wasc-projects-overview/ Web Hacking Intelligence Gathering (Prezi)]&lt;br /&gt;
* [http://www.owasp.org/images/c/c5/OWASP-WASCAppSec2007SanJose_WASCOpenProxyHoneyPotUpdate.ppt Open Proxy Honeypot Project Update (2007)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Ryan Barnett&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_distributed_web_honeypots_project Sign-up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_distributed_web_honeypots_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [http://www.internetnews.com/security/article.php/3832131/WASC+Honeypot+Opens+Up+With+Open+Source.htm WASC Honeypot Opens Up With Open Source (InternetNews)]&lt;br /&gt;
* [http://news.techworld.com/security/10663/researchers-eye-open-proxy-attacks/ Researchers eye open-proxy attacks (TechWorld)]&lt;br /&gt;
* [http://www.infoworld.com/print/34304 Malware honeypots wait for '08 (InfoWorld)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= How to Participate =&lt;br /&gt;
There are two ways to participate:&lt;br /&gt;
&lt;br /&gt;
== Deploy a honeypot sensor ==&lt;br /&gt;
You can participate by deploying the Web Honyepot sensor on your own network. We has created a VMware image of the standard sensor. This image includes all of the software to quickly get your sensor up and running with little configuration on the end user's part. You must contact the project leader via email in order to participate. You will then receive the link location to download the VMware image.  You will need to have the free version of VMware player or Server.  If you would like to deploy a honeypot sensor, include the following details in your email to the project leader: &lt;br /&gt;
&lt;br /&gt;
* Sensor Point of Contact (POC) name&lt;br /&gt;
* Source IP address that the logs will be coming from&lt;br /&gt;
* Geographic location (Country, State, Locality)&lt;br /&gt;
* Network Block Owner&lt;br /&gt;
&lt;br /&gt;
The Project Leader will send back an email with instructions for downloading the VMware honeypot image data and the OS root credentials. The VMware host is configured with dhcp, so after you login, verify that the host has successfully obtained an IP address. The Project Leader will also provide you with the ModSecurity log agent credentials you will need to authenticate when sending your log data. ModSecurity uses a C program called mlogc located in the /usr/local/apache/conf/ directory. This program will take the data generated by the ModSecurity concurrent audit log and uses HTTP PUT requests to upload the individual audit_log files to the central console host. Each honeypot sensor will have a unique username/password combination. The file that you will need to update is /opt/wasc-honeypot/etc/mlogc.conf.  The final step is to start up the apache web server - /etc/init.d/wasc-honeypot-ctl.sh start. You should then review the log files to ensure that they everything is working properly. &lt;br /&gt;
&lt;br /&gt;
== Data analysis ==&lt;br /&gt;
Even if you do not deploy a honeypot sensor, we need help with data analysis for the capture traffic.  We will provide access to the ModSecurity AuditConsole web interface to all project participants.  The AuditConsole has built in searching and reporting functions that may be used for batch analysis.  We will provide all project participants with a reporting procedure so that we have a consistent process for vetting data prior to releasing to the public.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Are there any legal issues I should be concerned with?&lt;br /&gt;
: The short answer is '''yes''' - if you choose to run your honeypot as an open proxy server. There are some legal issues to be aware of in this type of honeypot setup where we will be capturing third party user information.  The Honeynet Project has excellent information on the challenges and issues surrounding due diligence in deploying honeypots/honeynets. Refer to this paper on Honeynets. In their book Know Your Enemy they have an entire chapter dedicated to Legal Issues.  It is this concern over increased risk why we expanded the project scope to allow for deployment of stand alone web sites instead of running it as an open proxy.&lt;br /&gt;
&lt;br /&gt;
; Should I run this on my production environment?&lt;br /&gt;
: That depends on your risk tolerance and whether or not you want to run the honeypot as an open proxy.  If your organization is willing to approve it, then the program itself is a virtual host and will run under any host that runs VMware.  We have many varied organizations participating ranging from universities, ISPs and government networks. &lt;br /&gt;
&lt;br /&gt;
; Can I run the sensor at home?&lt;br /&gt;
: Sure, many participants are running the sensors from their home network.  You shoud, however, consult your ISP's AUP info before deploying any web servers.  There may be conflicts with your ISP allowing inbound HTTP traffic however the honeypots are pre-configured to listen on common proxy ports including 8000, 8080 and 3128. &lt;br /&gt;
&lt;br /&gt;
; Should I announce the honeypot IP address on public lists?&lt;br /&gt;
: That is up to you however be aware that if the sensor IP address becomes posted to pubic open proxy lists that more than likely your sensor will become flooded with SPAMMER traffic.&lt;br /&gt;
&lt;br /&gt;
; What prerequisites do I need to participate?&lt;br /&gt;
: An understanding of ModSecurity functionality will help to understand the rules and logs being generated.  Review the following:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual ModSecurity Reference Manual]&lt;br /&gt;
* [https://github.com/SpiderLabs/ModSecurity/wiki/ModSecurity-2-Data-Formats ModSecurity Audit Log Format]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
The main roadmap item is to solicit more participants to deploy Sensors to collect data.&lt;br /&gt;
The main deliverables for this project are: 1) Real-world web attack data, 2) Real-time web attack data and 3) Technical details that can be leveraged by the OWASP Defenders community to help protect their websites. Think of this project as somewhat similar to the SANS Dshield project where the community correlates data and can also obtain reputation services for blocking IP addresses, etc...&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Distributed_Web_Honeypots_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=168927</id>
		<title>OWASP WASC Distributed Web Honeypots Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Distributed_Web_Honeypots_Project&amp;diff=168927"/>
				<updated>2014-02-24T23:25:34Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Distributed Web Honeypots Project==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP WASC Distributed Web Honeypots Project is to identify emerging attacks against web applications and report them to the community including automated scanning activity, probes, as well as, targeted attacks against specific web apps.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The goal of the Distributed Web Honeypot (DWH) Project is to identify emerging attacks against web applications and report them to the community.  This may include automated scanning activity, probes, as well as, targeted attacks against specific web sites or applications.  The scope of this project has recently been expanded to include deployment of both standard web application honeypots and/or open proxy honeypots.  Project participants may choose whether they want to run their honeypot as an open proxy or a stand-alone sensor.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This project fills a need in the web application Defender's community to have detailed data about mass web application scanning attacks such as those being operated by Botnets.  This project will provide detailed data about attacks and their origins.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is free to use. It is licensed under the Apache 2.0 License.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP WASC Distributed Web Honeypots Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project provides:&lt;br /&gt;
&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
* [http://prezi.com/dvvv2gdpezzz/wasc-projects-overview/ Web Hacking Intelligence Gathering (Prezi)]&lt;br /&gt;
* [http://www.owasp.org/images/c/c5/OWASP-WASCAppSec2007SanJose_WASCOpenProxyHoneyPotUpdate.ppt Open Proxy Honeypot Project Update (2007)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Ryan Barnett&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_distributed_web_honeypots_project Sign-up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_distributed_web_honeypots_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [http://www.internetnews.com/security/article.php/3832131/WASC+Honeypot+Opens+Up+With+Open+Source.htm WASC Honeypot Opens Up With Open Source (InternetNews)]&lt;br /&gt;
* [http://news.techworld.com/security/10663/researchers-eye-open-proxy-attacks/ Researchers eye open-proxy attacks (TechWorld)]&lt;br /&gt;
* [http://www.infoworld.com/print/34304 Malware honeypots wait for '08 (InfoWorld)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The OWASP WASC Distributed Web Honeypots Project is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
The main roadmap item is to solicit more participants to deploy Sensors to collect data.&lt;br /&gt;
The main deliverables for this project are: 1) Real-world web attack data, 2) Real-time web attack data and 3) Technical details that can be leveraged by the OWASP Defenders community to help protect their websites. Think of this project as somewhat similar to the SANS Dshield project where the community correlates data and can also obtain reputation services for blocking IP addresses, etc...&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Distributed_Web_Honeypots_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168423</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168423"/>
				<updated>2014-02-18T21:46:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Submit an Incident ==&lt;br /&gt;
[https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S283929Jw2s Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [18 Feb 2014] WHID Becomes an OWASP Project&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What incidents are included in the Web Hacking Incidents Database?&lt;br /&gt;
: The Web Hacking Incident Database only tracks media reported security incidents that can be associated with a web application security vulnerability. We also try to limit the database only to targeted attacks, though the distinction between targeted and non-targeted attacks is grey. The database does not include known vulnerabilities in web based applications, an area well covered by other databases such as CVE, OSVDB or the  Bugtraq vulnerabilities database. Neither does the database include incidents in which web site were breached using operating system or network layer vulnerabilities. We also consider most web site defacements as non targeted attacks and do not include them in the database. For information about web site defacements refer to zone-h.&lt;br /&gt;
: As those criteria are somewhat subjective, we welcome comments on the inclusion or exclusion of publicized security breaches.&lt;br /&gt;
 &lt;br /&gt;
; Were there only few dozen web hacks last year?&lt;br /&gt;
: The criteria for inclusion in WHID are very strict. The goal is to list only incidents that are related to web application layer vulnerabilities/attacks. The goal is to show that application layer security is a risk we cannot ignore anymore.&lt;br /&gt;
: Keep in mind, that while there are countless website hacks and defacements most are not reported. Even for those reported most of the time it is difficult to tell how exactly they occurred.&lt;br /&gt;
: Specifically addressing the defacement incidents reported in zone-h, bear in mind that in nearly all of these incidents there is no public information on the way in which they were carried. Additionally, many defacements are not targeted and are the result of a wide scan for vulnerable sites and therefore we do not normally include defacements in WHID.&lt;br /&gt;
 &lt;br /&gt;
; Why can't I find a well known incident in the database?&lt;br /&gt;
: The reason is probably that the incident did not occur due to a web application vulnerability, or that we do not know how did it happen. For example probably the most well known information security breach ever, the CardSystems incident was added only in April 2006, nearly a year after it was initially publicized. While we always suspected that it was a web hack and industry rumors hinted that, no public information regarding the way in which the hack was done was available until April 2006. Actually the CardSystems incident was brought in previous versions of this FAQ as an example of an incident that we would like to add to WHID but cannot. For other hacks such information is not available and may not become available in the future.&lt;br /&gt;
 &lt;br /&gt;
; How reliable are the incidents reported at WHID?&lt;br /&gt;
: The data collected is NOT reported directly to WASC but is rather collected from public sources, mostly technical media, mailing list post and researchers advisories. As a result the reliability of the reported information depends on the source. Since the source (or sources) is included with each entry, the reader can assess its reliability independently. We do however assess the source before including an incident in the database and if for whatever reason something we added to the database is found to be erroneous, we remove it, though this has ever happened to date.&lt;br /&gt;
: For media reported incidents, we're trusting that the reporter or news outlet verified the information. For mailing list reported incidents and research advisories, these issues are normally quickly confirmed our refuted by other subscribers or by the offended vendor. In case of doubt evaluate the level of information provided in the disclosure and the publishing history of the researcher.&lt;br /&gt;
 &lt;br /&gt;
; Breach vs. Disclosure&lt;br /&gt;
: The database includes two types of incidents: &amp;quot;breach&amp;quot; or &amp;quot;disclosure&amp;quot;. Breaches are incidents in which a web site was compromised, while disclosures are incidents in which a researcher published a vulnerability in a web site. In other words, breaches are incidents in which we know bad guys took advantage of a vulnerability, while disclosures are incidents in which we hope the good guys were first.&lt;br /&gt;
 &lt;br /&gt;
; The &amp;quot;Unknown&amp;quot; Threat Classification&lt;br /&gt;
: All incidents are classified according to the Web Application Security Consortium Threat Classification (WASC-TC). This classification sheds light on the nature of the security vulnerability in the web application.&lt;br /&gt;
: Some of the incidents are classified as &amp;quot;Unknown&amp;quot;. You may wonder why were these incidents included in the list, as there is no way to know that the hacker exploited a web application vulnerability. In some cases the public information available indicates that the incident exploited a web application vulnerability, and in others we deducted from the available information.&lt;br /&gt;
 &lt;br /&gt;
; How can I contribute?&lt;br /&gt;
: The Web Hacking Incidents Database (WHID) is a community effort.  The information is provided under the open source Creative Common License, which in very simple words says that anyone can use the information for whatever need as long as the source is mentioned.&lt;br /&gt;
: You can help make WHID better. You don't need to invest a lot of time:&lt;br /&gt;
* If you encounter a new Web incident, please use one of the following methods to notify the WHID project team:&lt;br /&gt;
** Send an email to - owaspwhid_at_owasp.org&lt;br /&gt;
** Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
** Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
* As we natively speak English we miss alot in non English speaking countries so we are especially looking for non English sources. As long as they can be translated using Google translate of a similar service, we can include it.&lt;br /&gt;
* If you want to contribute more, become a WHID editor. Send an e-mail to the project leader with a few words (and preferably a link) about yourself and sign up to this site. We will activate your account and enable you to edit incidents. We need you to:&lt;br /&gt;
** Classify incidents a backlog of incidents from 2nd half of 2013.&lt;br /&gt;
** You can help by Proofing/editing the descriptions and classifications.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* [https://twitter.com/oshezaf Ofer Shezaf]&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* If you would like to have WRITE access so you can add entries directly to WHID in Google FusionTables, contact the project team and we will add your Gmail account.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168421</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168421"/>
				<updated>2014-02-18T21:39:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Submit an Incident ==&lt;br /&gt;
[https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S283929Jw2s Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [18 Feb 2014] WHID Becomes an OWASP Project&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What incidents are included in the Web Hacking Incidents Database?&lt;br /&gt;
: The Web Hacking Incident Database only tracks media reported security incidents that can be associated with a web application security vulnerability. We also try to limit the database only to targeted attacks, though the distinction between targeted and non-targeted attacks is grey. The database does not include known vulnerabilities in web based applications, an area well covered by other databases such as CVE, OSVDB or the  Bugtraq vulnerabilities database. Neither does the database include incidents in which web site were breached using operating system or network layer vulnerabilities. We also consider most web site defacements as non targeted attacks and do not include them in the database. For information about web site defacements refer to zone-h.&lt;br /&gt;
: As those criteria are somewhat subjective, we welcome comments on the inclusion or exclusion of publicized security breaches.&lt;br /&gt;
 &lt;br /&gt;
; Were there only few dozen web hacks last year?&lt;br /&gt;
: The criteria for inclusion in WHID are very strict. The goal is to list only incidents that are related to web application layer vulnerabilities/attacks. The goal is to show that application layer security is a risk we cannot ignore anymore.&lt;br /&gt;
: Keep in mind, that while there are countless website hacks and defacements most are not reported. Even for those reported most of the time it is difficult to tell how exactly they occurred.&lt;br /&gt;
: Specifically addressing the defacement incidents reported in zone-h, bear in mind that in nearly all of these incidents there is no public information on the way in which they were carried. Additionally, many defacements are not targeted and are the result of a wide scan for vulnerable sites and therefore we do not normally include defacements in WHID.&lt;br /&gt;
 &lt;br /&gt;
; Why can't I find a well known incident in the database?&lt;br /&gt;
: The reason is probably that the incident did not occur due to a web application vulnerability, or that we do not know how did it happen. For example probably the most well known information security breach ever, the CardSystems incident was added only in April 2006, nearly a year after it was initially publicized. While we always suspected that it was a web hack and industry rumors hinted that, no public information regarding the way in which the hack was done was available until April 2006. Actually the CardSystems incident was brought in previous versions of this FAQ as an example of an incident that we would like to add to WHID but cannot. For other hacks such information is not available and may not become available in the future.&lt;br /&gt;
 &lt;br /&gt;
; How reliable are the incidents reported at WHID?&lt;br /&gt;
: The data collected is NOT reported directly to WASC but is rather collected from public sources, mostly technical media, mailing list post and researchers advisories. As a result the reliability of the reported information depends on the source. Since the source (or sources) is included with each entry, the reader can assess its reliability independently. We do however assess the source before including an incident in the database and if for whatever reason something we added to the database is found to be erroneous, we remove it, though this has ever happened to date.&lt;br /&gt;
: For media reported incidents, we're trusting that the reporter or news outlet verified the information. For mailing list reported incidents and research advisories, these issues are normally quickly confirmed our refuted by other subscribers or by the offended vendor. In case of doubt evaluate the level of information provided in the disclosure and the publishing history of the researcher.&lt;br /&gt;
 &lt;br /&gt;
; Breach vs. Disclosure&lt;br /&gt;
: The database includes two types of incidents: &amp;quot;breach&amp;quot; or &amp;quot;disclosure&amp;quot;. Breaches are incidents in which a web site was compromised, while disclosures are incidents in which a researcher published a vulnerability in a web site. In other words, breaches are incidents in which we know bad guys took advantage of a vulnerability, while disclosures are incidents in which we hope the good guys were first.&lt;br /&gt;
 &lt;br /&gt;
; The &amp;quot;Unknown&amp;quot; Threat Classification&lt;br /&gt;
: All incidents are classified according to the Web Application Security Consortium Threat Classification (WASC-TC). This classification sheds light on the nature of the security vulnerability in the web application.&lt;br /&gt;
: Some of the incidents are classified as &amp;quot;Unknown&amp;quot;. You may wonder why were these incidents included in the list, as there is no way to know that the hacker exploited a web application vulnerability. In some cases the public information available indicates that the incident exploited a web application vulnerability, and in others we deducted from the available information.&lt;br /&gt;
 &lt;br /&gt;
; How can I contribute?&lt;br /&gt;
: The Web Hacking Incidents Database (WHID) is a community effort.  The information is provided under the open source Creative Common License, which in very simple words says that anyone can use the information for whatever need as long as the source is mentioned.&lt;br /&gt;
: You can help make WHID better. You don't need to invest a lot of time:&lt;br /&gt;
* If you encounter a new Web incident, please use one of the following methods to notify the WHID project team:&lt;br /&gt;
** Send an email to - owaspwhid_at_owasp.org&lt;br /&gt;
** Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
** Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
* As we natively speak English we miss alot in non English speaking countries so we are especially looking for non English sources. As long as they can be translated using Google translate of a similar service, we can include it.&lt;br /&gt;
* If you want to contribute more, become a WHID editor. Send an e-mail to the project leader with a few words (and preferably a link) about yourself and sign up to this site. We will activate your account and enable you to edit incidents. We need you to:&lt;br /&gt;
** Classify incidents a backlog of incidents from 2nd half of 2013.&lt;br /&gt;
** You can help by Proofing/editing the descriptions and classifications.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* [https://twitter.com/oshezaf Ofer Shezaf]&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* If you would like to have WRITE access so you can add entries directly to WHID in Google FusionTables, contact the project team and we will add your Gmail account.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168418</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168418"/>
				<updated>2014-02-18T21:23:37Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Volunteers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Submit an Incident ==&lt;br /&gt;
[https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S283929Jw2s Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [18 Feb 2014] WHID Becomes an OWASP Project&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How is WHID different than the OWASP Top 10?&lt;br /&gt;
: The OWASP Top 10 Risks applies a community-based Threat Model discussion to estimate the top risks to web applications.  OWASP WHID, on the other hand, focuses mainly on '''Attack Liklihood''' rather than '''Vulnerability Prevalence'''.&lt;br /&gt;
&lt;br /&gt;
; How do I submit a WHID Incident?&lt;br /&gt;
: If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* [https://twitter.com/oshezaf Ofer Shezaf]&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* If you would like to have WRITE access so you can add entries directly to WHID in Google FusionTables, contact the project team and we will add your Gmail account.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168417</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168417"/>
				<updated>2014-02-18T21:18:23Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Submit an Incident ==&lt;br /&gt;
[https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S283929Jw2s Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [18 Feb 2014] WHID Becomes an OWASP Project&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How is WHID different than the OWASP Top 10?&lt;br /&gt;
: The OWASP Top 10 Risks applies a community-based Threat Model discussion to estimate the top risks to web applications.  OWASP WHID, on the other hand, focuses mainly on '''Attack Liklihood''' rather than '''Vulnerability Prevalence'''.&lt;br /&gt;
&lt;br /&gt;
; How do I submit a WHID Incident?&lt;br /&gt;
: If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* If you would like to have WRITE access so you can add entries directly to WHID in Google FusionTables, contact the project team and we will add your Gmail account.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168412</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168412"/>
				<updated>2014-02-18T20:10:28Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S283929Jw2s Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [18 Feb 2014] WHID Becomes an OWASP Project&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How is WHID different than the OWASP Top 10?&lt;br /&gt;
: The OWASP Top 10 Risks applies a community-based Threat Model discussion to estimate the top risks to web applications.  OWASP WHID, on the other hand, focuses mainly on '''Attack Liklihood''' rather than '''Vulnerability Prevalence'''.&lt;br /&gt;
&lt;br /&gt;
; How do I submit a WHID Incident?&lt;br /&gt;
: If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* If you would like to have WRITE access so you can add entries directly to WHID in Google FusionTables, contact the project team and we will add your Gmail account.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168411</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168411"/>
				<updated>2014-02-18T20:05:55Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S283929Jw2s Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [18 Feb 2014] WHID Becomes an OWASP Project&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How is WHID different than the OWASP Top 10?&lt;br /&gt;
: The OWASP Top 10 Risks applies a community-based Threat Model discussion to estimate the top risks to web applications.  OWASP WHID, on the other hand, focuses mainly on '''Attack Liklihood''' rather than '''Vulnerability Prevalence'''.&lt;br /&gt;
&lt;br /&gt;
; How do I submit a WHID Incident?&lt;br /&gt;
: If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168410</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168410"/>
				<updated>2014-02-18T20:04:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S283929Jw2s Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How is WHID different than the OWASP Top 10?&lt;br /&gt;
: The OWASP Top 10 Risks applies a community-based Threat Model discussion to estimate the top risks to web applications.  OWASP WHID, on the other hand, focuses mainly on '''Attack Liklihood''' rather than '''Vulnerability Prevalence'''.&lt;br /&gt;
&lt;br /&gt;
; How do I submit a WHID Incident?&lt;br /&gt;
: If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
* We are always looking for new methods of identifying real-world web compromise data sources. If you have any ideas, please contact us.&lt;br /&gt;
* We are also looking for new ways to store and analyze the data.  Currently we utilize [http://tables.googlelabs.com/ Google's FusionTables] to store our raw data.  If you have recommendations for improvements, please let us know.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WHID is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168407</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168407"/>
				<updated>2014-02-18T20:00:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* Volunteers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S283929Jw2s Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How is WHID different than the OWASP Top 10?&lt;br /&gt;
: The OWASP Top 10 Risks applies a community-based Threat Model discussion to estimate the top risks to web applications.  OWASP WHID, on the other hand, focuses mainly on '''Attack Liklihood''' rather than '''Vulnerability Prevalence'''.&lt;br /&gt;
&lt;br /&gt;
; How do I submit a WHID Incident?&lt;br /&gt;
: If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WHID project is only as good as it's entries.  The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Jason Coleman&lt;br /&gt;
* [https://twitter.com/jeremiahg Jeremiah Grossman]&lt;br /&gt;
* [https://twitter.com/robertauger Robert Auger]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168405</id>
		<title>OWASP WASC Web Hacking Incidents Database Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WASC_Web_Hacking_Incidents_Database_Project&amp;diff=168405"/>
				<updated>2014-02-18T19:57:59Z</updated>
		
		<summary type="html">&lt;p&gt;Rcbarnett: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WASC Web Hacking Incidents Database Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WHID? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WHID  provides:&lt;br /&gt;
&lt;br /&gt;
* Statistics of real-world web hacking incidents.&lt;br /&gt;
* Threat-Views:&lt;br /&gt;
** Consultant - Attack&lt;br /&gt;
** Developer - Weakness&lt;br /&gt;
** Business Owner - Outcome&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/c/c3/AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt OWASP AppSecDC 2010 Preso - PPT]&lt;br /&gt;
*[http://vimeo.com/19337407 OWASP AppSecDC 2010 Preso - Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rcbarnett Ryan Barnett]&lt;br /&gt;
&lt;br /&gt;
== Mail-List ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_wasc_web_hacking_incidents_database_project Sign-Up]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp_wasc_web_hacking_incidents_database_project/ Archive]&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
* [https://twitter.com/owaspwhid @owaspwhid]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col3%2C+count()+from+930451++group+by++col3+skip+0+limit+40&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Attack Methods]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col4%2C+count()+from+930451++group+by++col4+skip+0+limit+20&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top App Weaknesses]&lt;br /&gt;
* [http://www.google.com/fusiontables/embedviz?gco_chartArea=%7B%22top%22%3A%2230%22%7D&amp;amp;containerId=gviz_canvas&amp;amp;q=select+col5%2C+count()+from+930451++group+by++col5+skip+0+limit+24&amp;amp;viz=GVIZ&amp;amp;t=PIE&amp;amp;width=1200&amp;amp;height=900 Top Outcomes]&lt;br /&gt;
* [https://www.google.com/fusiontables/DataSource?snapid=S283929Jw2s Full WHID (Google Fusion Tables)]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_WHID Mapping OWASP Top 10 to WHID]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How is WHID different than the OWASP Top 10?&lt;br /&gt;
: The OWASP Top 10 Risks applies a community-based Threat Model discussion to estimate the top risks to web applications.  OWASP WHID, on the other hand, focuses mainly on '''Attack Liklihood''' rather than '''Vulnerability Prevalence'''.&lt;br /&gt;
&lt;br /&gt;
; How do I submit a WHID Incident?&lt;br /&gt;
: If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send an email to - owaspwhid_at_owasp.org&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WASC_Web_Hacking_Incidents_Database_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rcbarnett</name></author>	</entry>

	</feed>