<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rdsece</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rdsece"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rdsece"/>
		<updated>2026-05-20T11:48:59Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AltoroMutual&amp;diff=245175</id>
		<title>AltoroMutual</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AltoroMutual&amp;diff=245175"/>
				<updated>2018-11-15T18:29:01Z</updated>
		
		<summary type="html">&lt;p&gt;Rdsece: Spelling Mistake&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
AltoroMutual is an vulnerable-by-design web application created by WatchFire (now AppScan Standard) as a demo test application for their BlackBox Scanner.&lt;br /&gt;
&lt;br /&gt;
===URL===&lt;br /&gt;
The AltoroMutual web application can be reach on http://demo.testfire.net/ and it is commonly used to test BlackBox Scanners (IBM's AppScan Standard Evaluation version is hard-coded to only allow this website)&lt;br /&gt;
&lt;br /&gt;
===Source Code===&lt;br /&gt;
The C# source code for AltoroMutual is currently not publicly available.&lt;br /&gt;
&lt;br /&gt;
===Vulnerabilties===&lt;br /&gt;
There are number of vulnerabilities (as described in the [[OWASP Top 10]]) in this application.&lt;br /&gt;
&lt;br /&gt;
The objective on this WIKI page is to provide detailed explantion of its exploit vector and how it could be protected (WAF or code changes)&lt;br /&gt;
&lt;br /&gt;
====External resources====&lt;br /&gt;
Here are a number of resources that map the current vulnerabilities in AltoroMutual:&lt;br /&gt;
* [http://www.jedimercer.com/filez/WebApp_Throwdown/webapp%20throwdown%20-%20core%20impact.pdf Core Impact Professional assessment report]&lt;br /&gt;
* http://parsonsisconsulting.wordpress.com/2010/11/25/sql-injection-with-02-and-google-database-plugin/&lt;br /&gt;
* http://parsonsisconsulting.wordpress.com/2010/11/24/the-power-of-02-scripting/&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP O2 Platform]]&lt;/div&gt;</summary>
		<author><name>Rdsece</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Rdsece&amp;diff=221102</id>
		<title>User:Rdsece</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Rdsece&amp;diff=221102"/>
				<updated>2016-09-08T07:23:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rdsece: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;My Name is Ramandeep Singh. Pursuing Masters in Information Security from Chicago, USA. Worked as an Information Security Consultant with a Forensic Science Laboratory in India for 2 Years, where I was dealing with the exhibits from Court Of Law, given my expert opinion of more than 500 cases successfully. My major role was to investigate the crime scene, maintaining the chain of custody, then analysis of the Digital evidences seized from the crime scene. I have experience on working with various Digital Forensic Toolkits and Mobile Forensic Toolkits like Encase Forensics, UFED Touch, AccessData FTK etc. Some of my certifications includes CHFI, CEH, CompTIA Security+, CompTIA Networking+,CompTIA A+.&lt;/div&gt;</summary>
		<author><name>Rdsece</name></author>	</entry>

	</feed>