<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rick.mitchell</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rick.mitchell"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rick.mitchell"/>
		<updated>2026-04-05T23:21:31Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=255341</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=255341"/>
				<updated>2019-10-08T12:26:28Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2017 risks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;''A complete mapping for the 2013 edition of the OWASP Top 10 can be found [https://www.owasp.org/index.php/ZAPpingTheTop10-2013 here].''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available (based on the Top 10 - 2013 edition): [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A2-Broken_Authentication | A2 Broken Authentication]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control Testing]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A3-Sensitive_Data_Exposure | A3 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A4-XML_External_Entities_(XXE) | A4 XML External Entities (XXE)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Active scan rules [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A5-Broken_Access_Control | A5 Broken Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control Testing]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A6-Security_Misconfiguration | A6 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10-2017_A7-Cross-Site_Scripting_(XSS) | A7 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A8-Insecure_Deserialization | A8 Insecure Deserialization]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; There are two outstanding issues that are relevant to this Top 10 entry: [https://github.com/zaproxy/zaproxy/issues/4112 Insecure deserialization active scanner] &amp;amp; [https://github.com/zaproxy/zaproxy/issues/4509 Java Serialization Handling]&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A10-Insufficient_Logging%26Monitoring | A10 Insufficient Logging &amp;amp; Monitoring]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated / Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The Spider(s), Active Scanner, Fuzzer, and Access Control addon can all be used to generate traffic and &amp;quot;attacks&amp;quot; which are potential sources/causes for logging and alerting. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=255340</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=255340"/>
				<updated>2019-10-08T12:25:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2017 risks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;''A complete mapping for the 2013 edition of the OWASP Top 10 can be found [https://www.owasp.org/index.php/ZAPpingTheTop10-2013 here].''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available (based on the Top 10 - 2013 edition): [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A2-Broken_Authentication | A2 Broken Authentication]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control Testing]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A3-Sensitive_Data_Exposure | A3 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A4-XML_External_Entities_(XXE) | A4 XML External Entities (XXE)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Active scan rules [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A5-Broken_Access_Control | A5 Broken Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control Testing]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A6-Security_Misconfiguration | A6 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10-2017_A7-Cross-Site_Scripting_(XSS) | A7 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A8-Insecure_Deserialization | A8 Insecure Deserialization]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; There are two outstanding issues that are relevant to this Top 10 entry: [https://github.com/zaproxy/zaproxy/issues/4112 Insecure deserialization active scanner] &amp;amp; [https://github.com/zaproxy/zaproxy/issues/4509 Java Serialization Handling]&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A10-Insufficient_Logging%26Monitoring | A10 Insufficient Logging &amp;amp; Monitoring]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated / Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The Spider(s), Active Scanner, Fuzzer, and Access Control addon can all be used to generate traffic and &amp;quot;attacks&amp;quot; which are potential sources/causes for logging and alerting. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=April_2019&amp;diff=250650</id>
		<title>April 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=April_2019&amp;diff=250650"/>
				<updated>2019-04-25T16:58:31Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Fixed worldclock date to align with other content&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Meeting Date:&lt;br /&gt;
April 29&lt;br /&gt;
&lt;br /&gt;
Meeting Time:&lt;br /&gt;
11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=4&amp;amp;day=29&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
Meeting Location:&lt;br /&gt;
Remote&lt;br /&gt;
&lt;br /&gt;
Virtual: &lt;br /&gt;
[https://zoom.us/j/282821949 Zoom Meeting Link]  Meeting ID: 282 821 949 - [https://zoom.us/u/kvUg3969 local dial in numbers]&lt;br /&gt;
&lt;br /&gt;
 AGENDA&lt;br /&gt;
&lt;br /&gt;
 CALL TO ORDER&lt;br /&gt;
&lt;br /&gt;
 CHANGES TO THE AGENDA&lt;br /&gt;
&lt;br /&gt;
 APPROVAL OF MINUTES&lt;br /&gt;
 [https://docs.google.com/document/d/1F5fAPcRlTg9FiRoABCM7fwx02bB94kNFiBwbNDkyLo4/edit?usp=sharing March 2019 Minutes]&lt;br /&gt;
&lt;br /&gt;
 REPORTS&lt;br /&gt;
&lt;br /&gt;
 OLD BUSINESS&lt;br /&gt;
&lt;br /&gt;
 NEW BUSINESS&lt;br /&gt;
&lt;br /&gt;
 COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS&lt;br /&gt;
&lt;br /&gt;
 ADJOURNMENT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Old Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
==New Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=249511</id>
		<title>OWASP Xenotix XSS Exploit Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Xenotix_XSS_Exploit_Framework&amp;diff=249511"/>
				<updated>2019-04-01T12:25:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Add abandonment note&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:20px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Xenotix XSS Exploit Framework==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt; &lt;br /&gt;
'''NOTE: PROJECT DEVELOPMENT AND SUPPORT IS DISCONTINUED''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework#owasp-xenotix-xss-exploit-framework&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Xen6.png|left|550px]]&lt;br /&gt;
'''OWASP Xenotix XSS Exploit Framework''' is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. Xenotix provides Low False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.&lt;br /&gt;
It is claimed to have the world’s 2nd largest XSS Payloads of about 4800+ distinctive XSS Payloads. It is incorporated with a feature rich Information Gathering module for target Reconnaissance. The Exploit Framework includes real world offensive XSS exploitation modules for Penetration Testing and Proof of Concept creation. Say no to alert pop-ups in PoC. Pen testers can now create appealing Proof of Concepts within few clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Xenotix XSS Exploit Framework&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== LICENSING ==&lt;br /&gt;
OWASP Xenotix XSS Exploit Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== PRESENTATIONS ==&lt;br /&gt;
&lt;br /&gt;
'''DEFCON DCG Banglore 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/pwning-with-xss-from-alert-to-reverse-shell-defcon-banglore-2013 OWASP Xenotix XSS Exploit Framework v4 ]&lt;br /&gt;
&lt;br /&gt;
'''BlackHat Europe Arsenal 2013'''&lt;br /&gt;
*Presentation: [https://www.dropbox.com/s/o8adyvtngbszq32/blackhat.zip OWASP Xenotix XSS Exploit Framework v3 ]&lt;br /&gt;
&lt;br /&gt;
'''Nulcon Goa 2013'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/owasp-xenotix-xss-exploit-framework-v3-nullcon-goa-2013 OWASP Xenotix XSS Exploit Framework v3 ]  &lt;br /&gt;
: [[Media: Xenotixxssexploitframeworkbyajinabraham-130820064955-phpapp02.pdf | Download PDF ]]&lt;br /&gt;
&lt;br /&gt;
'''ClubHack 2012'''&lt;br /&gt;
*Presentation: [http://www.slideshare.net/ajin25/xenotix-xss-exploit-framework-clubhack-2012 OWASP Xenotix XSS Exploit Framework v2]&lt;br /&gt;
&lt;br /&gt;
== PROJECT LEADER ==&lt;br /&gt;
&lt;br /&gt;
Ajin Abraham | [https://twitter.com/ajinabraham @ajinabraham]&lt;br /&gt;
&lt;br /&gt;
== PROJECT WEBSITE ==&lt;br /&gt;
&lt;br /&gt;
*http://xenotix.in&lt;br /&gt;
&lt;br /&gt;
== AWARDS ==&lt;br /&gt;
&lt;br /&gt;
[[Image:ToolsWatch2014.png |180px | thumb | left |link=http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2014]]&lt;br /&gt;
[[Image:ToolsWatch2013.png |180px | thumb | left |link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | Top 5th Security Tool of 2013]]&lt;br /&gt;
[[Image:CSPF.jpg |180px | thumb | left | Recommended by CSPF]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:175px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== QUICK DOWNLOAD ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dwd.png |200px| link=https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework]]&lt;br /&gt;
&lt;br /&gt;
== NEWS AND EVENTS ==&lt;br /&gt;
* [19 Mar 2014] Xenotix XSS Exploit Framework V6.2 is Released&lt;br /&gt;
* [14 Jan 2015] [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2014, voted by ToolsWatch Readers]&lt;br /&gt;
* [14 Sept 2014] Xenotix XSS Exploit Framework V6 is Released&lt;br /&gt;
* [14 Feb 2014] Xenotix XSS Exploit Framework V5 is Released&lt;br /&gt;
* [16 Dec 2013] [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top 5th Security tool of 2013, voted by ToolsWatch Readers]&lt;br /&gt;
* [10 Nov 2013] [http://holisticinfosec.org/toolsmith/pdf/november2013.pdf OWASP Xenotix in ISSA Journal]&lt;br /&gt;
* [01 Nov 2013] [http://holisticinfosec.blogspot.in/2013/11/toolsmith-owasp-xenotix-xss-exploit.html Toolsmith Tool of the Month]&lt;br /&gt;
&lt;br /&gt;
== RELATED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Xelenium_Project]]&lt;br /&gt;
* [[ZAP]]&lt;br /&gt;
* [[OWASP_XSSER]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CLASSIFICATIONS ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SCANNER MODULES'''&lt;br /&gt;
&lt;br /&gt;
*GET Request Fuzzer&lt;br /&gt;
*POST Request Fuzzer&lt;br /&gt;
*Advanced Request Fuzzer&lt;br /&gt;
*OAuth 1.0a Request Scanner&lt;br /&gt;
*DOM Scanner&lt;br /&gt;
**DOM XSS Analyzer&lt;br /&gt;
**Local DOM XSS Analyzer&lt;br /&gt;
*Hidden Parameter Detector&lt;br /&gt;
&lt;br /&gt;
'''INFORMATION GATHERING MODULES'''&lt;br /&gt;
&lt;br /&gt;
*WAF Fingerprinting&lt;br /&gt;
*Victim Fingerprinting&lt;br /&gt;
**IP to Location&lt;br /&gt;
**IP to GeoLocation&lt;br /&gt;
*Network&lt;br /&gt;
**Network IP (WebRTC)&lt;br /&gt;
**Ping Scan&lt;br /&gt;
**Port Scan&lt;br /&gt;
**Internal Network Scan&lt;br /&gt;
*Browser&lt;br /&gt;
**Fingerprinting&lt;br /&gt;
**Features Detector&lt;br /&gt;
** HSTS+ CSP Visited Sites Grabber&lt;br /&gt;
&lt;br /&gt;
'''EXPLOITATION MODULES'''&lt;br /&gt;
&lt;br /&gt;
*Send Message&lt;br /&gt;
*Cookie Thief&lt;br /&gt;
*Keylogger&lt;br /&gt;
*HTML5 DDoSer&lt;br /&gt;
*Load File&lt;br /&gt;
*Grab Page Screenshot&lt;br /&gt;
*JavaScript Shell&lt;br /&gt;
*Reverse HTTP WebShell&lt;br /&gt;
*Metasploit Browser Exploit&lt;br /&gt;
*Social Engineering&lt;br /&gt;
**Phisher&lt;br /&gt;
**Tabnabbing&lt;br /&gt;
**Live WebCam Screenshot&lt;br /&gt;
**Download Spoofer&lt;br /&gt;
**Geolocation HTML5 API&lt;br /&gt;
**Java Applet Drive-By (Windows)&lt;br /&gt;
**Java Applet Drive-By Reverse Shell (Windows)&lt;br /&gt;
**HTA Network Configuration (Windows, IE)&lt;br /&gt;
**HTA Drive-By (Windows, IE)&lt;br /&gt;
**HTA Drive-By Reverse Shell (Windows, IE)&lt;br /&gt;
*Firefox Addons&lt;br /&gt;
**Reverse TCP Shell Addon (Windows, Persistent)&lt;br /&gt;
**Reverse TCP Shell Addon (Linux, Persistent)&lt;br /&gt;
**Session Stealer Addon (Persistent)&lt;br /&gt;
**Keylogger Addon (Persistent)&lt;br /&gt;
**DDoSer Addon (Persistent)&lt;br /&gt;
**Linux Credential File Stealer Addon (Persistent)&lt;br /&gt;
**Drop and Execute Addon (Persistent)&lt;br /&gt;
&lt;br /&gt;
'''AUXILIARY MODULES'''&lt;br /&gt;
*WebKit Developer Tools&lt;br /&gt;
*Encoder/Decoder&lt;br /&gt;
*JavaScript Encoders&lt;br /&gt;
**JSFuck 6 Char Encoder&lt;br /&gt;
**jjencode Encoder&lt;br /&gt;
**aaencode Encoder&lt;br /&gt;
*JavaScript Beautifier&lt;br /&gt;
*Hash Calculator&lt;br /&gt;
*Hash Detector&lt;br /&gt;
*View Injected JavaScript&lt;br /&gt;
*View XSS Payloads&lt;br /&gt;
&lt;br /&gt;
'''XENOTIX SCRIPTING ENGINE'''&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* IronPython Scripting Support&lt;br /&gt;
* Trident and Gecko Web Engine Support&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Talks =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' NULLCON GOA 2013 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|J1phYXmLX8w}}&lt;br /&gt;
&lt;br /&gt;
''' CLUBHACK 2012 '''&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|NYZLP0q7-y4}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:POST_SCANNER.png|500px|thumb|right|Xenotix POST Request Scanner]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX INFO.png|500px|thumb|left|Xenotix Information Gathering Modules]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:XENOTIX EXPLOITATION.png|thumb|500px|right|Xenotix Exploitation Modules]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:Scripting.png|thumb|500px|left|Xenotix Scripting Engine]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Downloads=&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Get Xenotix Binaries: https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework&lt;br /&gt;
= Documentation =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check: https://www.youtube.com/playlist?list=PLX3EwmWe0cS80ls3TsNiukQD0hfZjLHnP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
''' WHAT'S NEW! '''&lt;br /&gt;
==V6.2 Changes==&lt;br /&gt;
* Added more Payloads&lt;br /&gt;
* New Info Gathering Module HSTS+CSP Visited Sites Detection&lt;br /&gt;
* Bug Fix Hash Calculator&lt;br /&gt;
* Bug Fix - Get Fuzzer&lt;br /&gt;
* Bug Fix IP2Geolocation&lt;br /&gt;
==V6.1 Changes==&lt;br /&gt;
* Bug Fixes&lt;br /&gt;
* Updated QuickPHP Server&lt;br /&gt;
* Local DOM XSS Analyzer&lt;br /&gt;
==V6 Changes==&lt;br /&gt;
{{#ev:youtube|RhGVuus_NJw}}&lt;br /&gt;
* Intelli Fuzzer&lt;br /&gt;
* Context Based Fuzzer&lt;br /&gt;
* Blind Fuzzer&lt;br /&gt;
* HTA Network Configuration&lt;br /&gt;
* HTA Drive-By&lt;br /&gt;
* HTA Drive-By Reverse Shell&lt;br /&gt;
* JSFuck 6 Char Encoder&lt;br /&gt;
* jjencode Encoder&lt;br /&gt;
* aaencode Encoder&lt;br /&gt;
* IP to Location&lt;br /&gt;
* IP to GeoLocation&lt;br /&gt;
* IP Hinting&lt;br /&gt;
* Download Spoofer&lt;br /&gt;
* HTML5 Geolocation API&lt;br /&gt;
* Reverse TCP Shell Addon (Linux)&lt;br /&gt;
* OAuth 1.0a Request Scanner&lt;br /&gt;
* 4800+ Payloads&lt;br /&gt;
* SSL Error Fixed&lt;br /&gt;
&lt;br /&gt;
==V5 Changes==&lt;br /&gt;
* Xenotix Scripting Engine&lt;br /&gt;
* Xenotix API&lt;br /&gt;
* V4.5 Bug Fixes&lt;br /&gt;
* GET Network IP (Information Gathering)&lt;br /&gt;
* QR Code Generator for Xenotix xook&lt;br /&gt;
* HTML5 WebCam Screenshot(Exploitation Module)&lt;br /&gt;
* HTML5 Get Page Screenshot (Exploitation Module)&lt;br /&gt;
* Find Feature in View Source.&lt;br /&gt;
* Improved Payload Count to 1630&lt;br /&gt;
* Name Changes&lt;br /&gt;
 &lt;br /&gt;
==V4.5 Changes==&lt;br /&gt;
&lt;br /&gt;
* JavaScript Beautifier&lt;br /&gt;
* Pause and Resume support for Scan&lt;br /&gt;
* Jump to Payload&lt;br /&gt;
* Cookie Support for POST Request&lt;br /&gt;
* Cookie Support and Custom Headers for Header Scanner &lt;br /&gt;
* Added TRACE method Support&lt;br /&gt;
* Improved Interface&lt;br /&gt;
* Better Proxy Support &lt;br /&gt;
* WAF Fingerprinting&lt;br /&gt;
* Load Files &amp;lt;exploitation module&amp;gt;&lt;br /&gt;
* Hash Calculator&lt;br /&gt;
* Hash Detector&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= XSS Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
[[Image:Xss_protection.png|center]]&lt;br /&gt;
&lt;br /&gt;
The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organization, researchers, websites, and from our own experience.&lt;br /&gt;
This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks. It will also discuss about the existing methods or functions provided by various programming languages to mitigate XSS vulnerability. This document will be updated regularly in order to include updated and correct in information in the domain of XSS Protection.&lt;br /&gt;
&lt;br /&gt;
VIEW: [https://docs.google.com/viewer?srcid=0B_Ci-1YbMqshWUtlaGRyLVBVd28&amp;amp;amp;pid=explorer&amp;amp;amp;efh=false&amp;amp;amp;a=v&amp;amp;amp;chrome=false&amp;amp;amp;embedded=true THE ULTIMATE XSS PROTECTION CHEAT SHEET FOR DEVELOPERS on Google Docs]&lt;br /&gt;
&lt;br /&gt;
[[Media:Xenotix_XSS_Protection_CheatSheet_For_Developers.pdf| Download PDF from owasp.org]]&lt;br /&gt;
&lt;br /&gt;
= Goodies =		&lt;br /&gt;
== Xenotix Hoodies ==&lt;br /&gt;
[[Image:Xenotix_front.jpg]][[Image:Xenotix_back.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buy Xenotix Hoodies from Paypal [http://opensecurity.in/xenotix-hoodies/ BUY NOW]&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of Xenotix is highly encouraged!&lt;br /&gt;
&lt;br /&gt;
Here are some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Support Us==&lt;br /&gt;
&lt;br /&gt;
*Twitter Page: [https://twitter.com/Xenotix Xenotix on Twitter]&lt;br /&gt;
*Facebook Page: [https://www.facebook.com/xenotix Xenotix on Facebook]&lt;br /&gt;
*Official Page: [[http://www.opensecurity.in/owasp-xenotix-xss-exploit-framework-v4-2013  Xenotix @ OpenSecurity]]&lt;br /&gt;
&lt;br /&gt;
==Feedback &amp;amp; Queries==&lt;br /&gt;
&lt;br /&gt;
* Do you have any issues with it?&lt;br /&gt;
* Do you find any design flows or errors?&lt;br /&gt;
* Do you need help in using it?&lt;br /&gt;
* Do you have something to tell about it?&lt;br /&gt;
&lt;br /&gt;
Then please use this form: https://docs.google.com/forms/d/1RpUhQvuHGvPTl7Gi-EXzecidGvJwKpsRaY9-MeXm1ro/viewform&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
Are you a developer? Do you have some cool ideas to contribute? Get in touch via '''ajin [DOT] abraham [AT] owasp.org''' &lt;br /&gt;
If you actively contribute to Xenotix then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Project|Xenotix XSS Exploit Framework Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Vulnerability_Scanning_Tools&amp;diff=249510</id>
		<title>Category:Vulnerability Scanning Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Vulnerability_Scanning_Tools&amp;diff=249510"/>
				<updated>2019-04-01T12:22:34Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Removing Xenotix which has been abandon&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description  ==&lt;br /&gt;
&lt;br /&gt;
Web Application Vulnerability Scanners are automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as [[Cross-site scripting]], [[SQL Injection]], [[Command Injection]], [[Path Traversal]] and insecure server configuration. This category of tools is frequently referred to as [https://www.techopedia.com/definition/30958/dynamic-application-security-testing-dast Dynamic Application Security Testing] (DAST) Tools. A large number of both commercial and open source tools of this type are available and all of these tools have their own strengths and weaknesses.  If you are interested in the effectiveness of DAST tools, check out the OWASP [[Benchmark]] project, which is scientifically measuring the effectiveness of all types of vulnerability detection tools, including DAST.&lt;br /&gt;
&lt;br /&gt;
Here we provide a list of vulnerability scanning tools currently available in the market.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Disclaimer:''' The tools listing in the table below are presented in alphabetical order. &amp;lt;b&amp;gt;OWASP does not endorse any of the Vendors or Scanning Tools by listing them in the table below. We have made every effort to provide this information as accurately as possible. If you are the vendor of a tool below and think this information is incomplete or incorrect, please send an e-mail to our [mailto:owasp_ha_vulnerability_scanner_project@lists.owasp.org mailing list] and we will make every effort to correct this information.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP is aware of the [http://sectooladdict.blogspot.com/ '''Web Application Vulnerability Scanner Evaluation Project (WAVSEP)'''. WAVSEP] is completely unrelated to OWASP and we do not endorse its results, nor any of the DAST tools it evaluates. However, the results provided by WAVSEP may be helpful to someone interested in researching or selecting free and/or commercial DAST tools for their projects. This project has far more detail on DAST tools and their features than this OWASP DAST page.&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.acunetix.com/ Acunetix WVS] || tool_owner = Acunetix || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.ibm.com/us-en/marketplace/application-security-on-cloud Application Security on Cloud] || tool_owner = IBM || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www-03.ibm.com/software/products/en/appscan-standard AppScan] || tool_owner = IBM || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.trustwave.com/Products/Application-Security/App-Scanner-Family/App-Scanner-Enterprise/ App Scanner] || tool_owner = Trustwave || tool_licence = Commercial || tool_platforms = Windows }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.rapid7.com/products/appspider/ AppSpider] || tool_owner = Rapid7 || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://apptrana.indusface.com/basic/ AppTrana Website Security Scan] || tool_owner = AppTrana || tool_licence = Free || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.arachni-scanner.com/ Arachni] || tool_owner = Arachni|| tool_licence = Free for most use cases || tool_platforms = Most platforms supported}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.scanmyserver.com/ AVDS] || tool_owner = Beyond Security || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = SaaS }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blueclosure.com BlueClosure BC Detect] || tool_owner = BlueClosure || tool_licence = Commercial, 2 weeks trial || tool_platforms = Most platforms supported}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.portswigger.net/ Burp Suite] || tool_owner = PortSwiger || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = Most platforms supported }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://contrastsecurity.com Contrast] || tool_owner = Contrast Security || tool_licence = Commercial / Free (Full featured for 1 App) || tool_platforms = SaaS or On-Premises }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://detectify.com/ Detectify] || tool_owner = Detectify || tool_licence = Commercial || tool_platforms = SaaS }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.digifort.se/en/scanner Digifort- Inspect] || tool_owner = Digifort|| tool_licence = Commercial || tool_platforms = SaaS }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.edgescan.com/ edgescan] || tool_owner = edgescan|| tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.gamasec.com/Gamascan.aspx GamaScan] || tool_owner = GamaSec || tool_licence = Commercial || tool_platforms = Windows }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://rgaucher.info/beta/grabber/ Grabber] || tool_owner = Romain Gaucher || tool_licence = Open Source || tool_platforms = Python 2.4, BeautifulSoup and PyXML}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://gravityscan.com/ Gravityscan] || tool_owner = Defiant, Inc. || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://sourceforge.net/p/grendel/code/ci/c59780bfd41bdf34cc13b27bc3ce694fd3cb7456/tree/ Grendel-Scan] || tool_owner = David Byrne || tool_licence = Open Source || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.golismero.com GoLismero] || tool_owner = GoLismero Team || tool_licence = GPLv2.0 || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.ikare-monitoring.com/ IKare] || tool_owner = ITrust || tool_licence = Commercial || tool_platforms = N/A }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.htbridge.com/immuniweb/ ImmuniWeb] || tool_owner = High-Tech Bridge || tool_licence = Commercial  / Free (Limited Capability)|| tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.indusface.com/index.php/products/web-application-scanning Indusface Web Application Scanning] || tool_owner = Indusface || tool_licence = Commercial / Free Trial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.nstalker.com/ N-Stealth] || tool_owner = N-Stalker || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.tenable.com/products/tenable-io/web-application-scanning/ Nessus] || tool_owner = Tenable || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.mavitunasecurity.com/ Netsparker] || tool_owner = MavitunaSecurity || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.rapid7.com/products/nexpose-community-edition.jsp Nexpose] || tool_owner = Rapid7 || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = Windows/Linux}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.cirt.net/nikto2 Nikto] || tool_owner = CIRT || tool_licence = Open Source|| tool_platforms = Unix/Linux}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.milescan.com/ ParosPro] || tool_owner = MileSCAN || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://probely.com Probe.ly] || tool_owner = Probe.ly || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.websecurify.com/desktop/proxy.html Proxy.app] || tool_owner = Websecurify || tool_licence = Commercial || tool_platforms = Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.qualys.com/products/qg_suite/was/ QualysGuard] || tool_owner = Qualys || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.beyondtrust.com/Products/RetinaNetworkSecurityScanner/ Retina] || tool_owner = BeyondTrust || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.orvant.com Securus] || tool_owner = Orvant, Inc || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.whitehatsec.com/home/services/services.html Sentinel] || tool_owner = WhiteHat Security || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.parasoft.com/products/article.jsp?articleId=3169&amp;amp;redname=webtesting&amp;amp;referred=webtesting SOATest] || tool_owner = Parasoft || tool_licence = Commercial || tool_platforms = Windows / Linux / Solaris}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.tinfoilsecurity.com Tinfoil Security] || tool_owner = Tinfoil Security, Inc. || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS or On-Premises}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.trustwave.com/external-vulnerability-scanning.php Trustkeeper Scanner] || tool_owner = Trustwave SpiderLabs || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://subgraph.com/vega/ Vega] || tool_owner = Subgraph || tool_licence = Open Source || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://wapiti.sourceforge.net/ Wapiti] || tool_owner = Informática Gesfor || tool_licence = Open Source || tool_platforms = Windows, Unix/Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.defensecode.com/webscanner.php Web Security Scanner] || tool_owner = DefenseCode || tool_licence = Commercial || tool_platforms = On-Premises}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.tripwire.com/it-security-software/enterprise-vulnerability-management/web-application-vulnerability-scanning/ WebApp360] || tool_owner = TripWire || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://webcookies.org WebCookies] || tool_owner = WebCookies || tool_licence = Free|| tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www8.hp.com/us/en/software-solutions/software.html?compURI=1341991#.Uuf0KBAo4iw WebInspect] || tool_owner = HP || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.websecurify.com/desktop/webreaver.html WebReaver] || tool_owner = Websecurify || tool_licence = Commercial || tool_platforms = Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.german-websecurity.com/en/products/webscanservice/product-details/overview/ WebScanService] || tool_owner = German Web Security || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://suite.websecurify.com/ Websecurify Suite] || tool_owner = Websecurify || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = Windows, Linux, Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.sensepost.com/research/wikto/ Wikto] || tool_owner = Sensepost || tool_licence = Open Source || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.w3af.org/ w3af] || tool_owner = w3af.org || tool_licence = GPLv2.0 || tool_platforms = Linux and Mac}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project Zed Attack Proxy] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Windows, Unix/Linux and Macintosh}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*[[Source_Code_Analysis_Tools | SAST Tools]] - OWASP page with similar information on Static Application Security Testing (SAST) Tools&lt;br /&gt;
*[[Free for Open Source Application Security Tools]] - OWASP page that lists the Commercial Dynamic Application Security Testing (DAST) tools we know of that are free for Open Source&lt;br /&gt;
*http://sectooladdict.blogspot.com/ - Web Application Vulnerability Scanner Evaluation Project (WAVSEP)&lt;br /&gt;
*http://projects.webappsec.org/Web-Application-Security-Scanner-Evaluation-Criteria - v1.0 (2009)&lt;br /&gt;
*http://www.slideshare.net/lbsuto/accuracy-and-timecostsofwebappscanners - White Paper: Analyzing the Accuracy and Time Costs of WebApplication Security Scanners - By Larry Suto (2010)&lt;br /&gt;
*http://samate.nist.gov/index.php/Web_Application_Vulnerability_Scanners.html - NIST home page which links to: NIST Special Publication 500-269: Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0 (21 August, 2007)&lt;br /&gt;
*http://www.softwareqatest.com/qatweb1.html#SECURITY - A list of Web Site Security Test Tools. (Has both DAST and SAST tools)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=247709</id>
		<title>OWASP Zed Attack Proxy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=247709"/>
				<updated>2019-02-21T20:26:30Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Ohloh &amp;gt; Open Hub&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{{ReviewProject|projectname=zaproxy|language=en}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers[[#Justification|*]]. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.&lt;br /&gt;
&lt;br /&gt;
====ZAP 2.7.0 is now available!====&lt;br /&gt;
&lt;br /&gt;
[[Image:ZAP-Download.png | link=https://github.com/zaproxy/zaproxy/wiki/Downloads]]&lt;br /&gt;
&lt;br /&gt;
====Please help us to make ZAP even better for you by answering the [https://docs.google.com/forms/d/1-k-vcj_sSxlil6XLxCFade-m-IQVeE2h9gduA-2ZPPA/viewform ZAP User Questionnaire]!====&lt;br /&gt;
&lt;br /&gt;
For a quick overview of ZAP and an introduction to the [https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin official ZAP Jenkins plugin] see these tutorial videos on YouTube:&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|eH0RBI0nmww}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|mmHZLSffCUg}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|ztfgip-UhWw}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more videos see the links on the [https://github.com/zaproxy/zaproxy/wiki/Videos wiki videos page].&lt;br /&gt;
&lt;br /&gt;
Interested in a ZAP talk or training event? See the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#tab=Talks talks] tab. Not one near you? Contact a [https://github.com/zaproxy/zaproxy/wiki/ZapEvangelists Zap Evangelist] to arrange one!&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=Zed Attack Proxy&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
For general information about ZAP:&lt;br /&gt;
* [https://twitter.com/zaproxy Twitter] - official ZAP announcements (low volume)&lt;br /&gt;
* [https://zaproxy.blogspot.co.uk/ Blog] - official ZAP blog&lt;br /&gt;
&lt;br /&gt;
For help using ZAP:&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/releases/download/2.6.0/ZAPGettingStartedGuide-2.6.pdf Getting Started Guide (pdf)] - an introductory guide you can print&lt;br /&gt;
* [https://www.youtube.com/playlist?list=PLEBitBW-Hlsv8cEIUntAO8st2UGhmrjUB Tutorial Videos]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki User Guide] - online version of the User Guide included with ZAP&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-users User Group] - ask questions about using ZAP&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Add-ons] - help for the optional add-ons you can install&lt;br /&gt;
* [https://stackoverflow.com/questions/tagged/zap StackOverflow] - because some people use this for all everything ;)&lt;br /&gt;
&lt;br /&gt;
To learn more about ZAP development:&lt;br /&gt;
* [https://github.com/zaproxy Source Code] - for all of the ZAP related projects&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/wiki/Introduction Wiki] - lots of detailed info&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-develop Developer Group] - ask questions about the ZAP internals&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap Crowdin (GUI)] - help translate the ZAP GUI&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help Crowdin (User Guide)] - help translate the ZAP User Guide&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy OpenHub]	- FOSS analytics&lt;br /&gt;
* [https://www.bountysource.com/teams/zap/issues BountySource] - Vote on ZAP issues (you can also donate money here, but 10% taken out)&lt;br /&gt;
&lt;br /&gt;
===Justification===&lt;br /&gt;
Justification for the statements made in the tagline at the top;)&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
* ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2016 [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2013 [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy Code Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap ZAP core i18n Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help ZAP help i18n Contributors]&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zaproxy/zaproxy/wiki/Downloads Download OWASP ZAP!]&lt;br /&gt;
&lt;br /&gt;
== Donate to ZAP ==&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; style=&amp;quot;width: auto; margin-left: auto; margin-right: auto;&amp;quot;&amp;gt;{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=Zed Attack Proxy }}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#News News] and [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
== Change Log ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/commits/develop zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/commits/master zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Code Repo ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/ zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/ zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
Questions? Please ask on the [http://groups.google.com/group/zaproxy-users ZAP User Group]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
Co-Project Leaders&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Ricardo.Pereira Ricardo Pereira] [mailto:ricardo.pereira@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Rick.mitchell Rick Mitchell] [mailto:rick.mitchell+wiki@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project OWASP WTE]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
&lt;br /&gt;
== Open Hub Stats ==&lt;br /&gt;
&lt;br /&gt;
*https://www.openhub.net/p/zaproxy&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;2&amp;quot; width=&amp;quot;200&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0 Apache 2 License]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotAddAlert.png|||400px|ZAP Add Alert Screen Shot]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHelp.png||400px|left|ZAP Help Screen Shot]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHistoryFilter.png|thumb|400px|left|ZAP History Filter Screen Shot]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotSearchTab.png|thumb|400px|left|ZAP Search Tab Screen Shot]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/Talks | Talks}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= News =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/News | News}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= ZAP Gear =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Yes, you can now buy ZAP related gear!&lt;br /&gt;
&lt;br /&gt;
All of the artwork for ZAP swag is released under the Creative Common License and can be downloaded from the [https://github.com/zaproxy/zap-swag zap-swag] repo.&lt;br /&gt;
&lt;br /&gt;
You can of course use the artwork from this repo with any other online store that you like.&lt;br /&gt;
&lt;br /&gt;
A range of products can be purchased from [http://www.redbubble.com/people/zaproxy Redbubble]&lt;br /&gt;
&lt;br /&gt;
Stickers can be purchased from [https://www.stickermule.com/uk/user/1070684077/stickers Stickermule]&lt;br /&gt;
&lt;br /&gt;
T-shirts can be purchased from [http://www.cafepress.com/zaproxy Cafepress]&lt;br /&gt;
&lt;br /&gt;
[[Image:zap-tshirt-cp.PNG | link=http://www.cafepress.com/zaproxy]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Supporters =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ZAP is developed by a worldwide [https://github.com/zaproxy/zap-core-help/wiki/HelpCredits team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:&lt;br /&gt;
&lt;br /&gt;
* [http://www.mozilla.org Mozilla]&lt;br /&gt;
* [http://www.linuxfoundation.org/ The Linux Foundation]&lt;br /&gt;
* [https://segment.com/ Segment]&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.sage.co.uk Sage]&lt;br /&gt;
* [http://www.google.com Google]&lt;br /&gt;
* [http://www.microsoft.com Microsoft]&lt;br /&gt;
* [http://www.hacktics.com/ Hacktics, Ernst &amp;amp; Young]&lt;br /&gt;
* [http://www.dinosec.com/ DinoSec]&lt;br /&gt;
* [http://www.denimgroup.com Denim Group]&lt;br /&gt;
* [http://www.aspectsecurity.com/ Aspect Security]&lt;br /&gt;
* [http://secureideas.net SecureIdeas]&lt;br /&gt;
* [http://utilisec.com UtiliSec]&lt;br /&gt;
* [http://www.encription.co.uk/ encription]&lt;br /&gt;
* [https://www.accenture.com/us-en/digital-index.aspx Accenture Digital]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Functionality =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's functionality:'''&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle Proxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Traditional] and AJAX spiders&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Automated scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsBruteforce Forced browsing]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/SmartCards Smartcard and Client Digital Certificates support]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsWebsocketIntroduction Web sockets] support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Support for a wide range of scripting languages]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki//HelpAddonsPlugnhackPlugnhack Plug-n-Hack support]&lt;br /&gt;
* Authentication and session support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsApi Powerful REST based API]&lt;br /&gt;
* Automatic updating option&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Integrated and growing marketplace of add-ons]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Features =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's features:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]&lt;br /&gt;
* Cross platform (it even runs on a [https://github.com/zaproxy/zaproxy/wiki/zappi Raspberry Pi!])&lt;br /&gt;
* Easy to install (using a [https://www.ej-technologies.com/products/install4j/overview.html multi-platform installer builder])&lt;br /&gt;
* Completely free (no paid for 'Pro' version)&lt;br /&gt;
* Ease of use a priority&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpIntro Comprehensive help pages]&lt;br /&gt;
* Fully internationalized&lt;br /&gt;
* Translated into over 20 languages&lt;br /&gt;
* Community based, with involvement actively encouraged&lt;br /&gt;
* Under active development by an international team of volunteers&lt;br /&gt;
&lt;br /&gt;
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Languages =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ZAP supports the following languages:'''&lt;br /&gt;
&lt;br /&gt;
* English&lt;br /&gt;
* Arabic&lt;br /&gt;
* Bosnian&lt;br /&gt;
* Brazilian Portuguese&lt;br /&gt;
* Chinese&lt;br /&gt;
* Danish&lt;br /&gt;
* Filipino&lt;br /&gt;
* French&lt;br /&gt;
* German&lt;br /&gt;
* Greek&lt;br /&gt;
* Hungarian&lt;br /&gt;
* Indonesian&lt;br /&gt;
* Italian&lt;br /&gt;
* Japanese&lt;br /&gt;
* Korean&lt;br /&gt;
* Persian&lt;br /&gt;
* Polish&lt;br /&gt;
* Russian&lt;br /&gt;
* Sinhala&lt;br /&gt;
* Spanish&lt;br /&gt;
* Urdu &lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to help improve these translations or add new ones right now!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Release 2.6.0==&lt;br /&gt;
ZAP 2.6.0 has been released, this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_6_0&lt;br /&gt;
&lt;br /&gt;
==Release 2.7.0==&lt;br /&gt;
ZAP 2.7.0 has been released (Nov 2017), this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_7_0&lt;br /&gt;
&lt;br /&gt;
It requires Java 8 (minimum) and supports Selenium 3.&lt;br /&gt;
&lt;br /&gt;
==Release 2.8.0==&lt;br /&gt;
ZAP 2.8.0 does not yet have a planned release date, but is likely to be around the beginning of 2018 or (more likely) the middle of 2018.&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of ZAP is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Feature Requests==&lt;br /&gt;
&lt;br /&gt;
Please raise new feature requests as enhancement requests here: https://github.com/zaproxy/zaproxy/issues&lt;br /&gt;
&lt;br /&gt;
If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use the [http://groups.google.com/group/zaproxy-users zaproxy-users Google Group] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What features could be made easier to use?&lt;br /&gt;
* How could the help pages be improved? &lt;br /&gt;
&lt;br /&gt;
==Log issues==&lt;br /&gt;
&lt;br /&gt;
Have you had a problem using ZAP?&lt;br /&gt;
&lt;br /&gt;
If so and its not already been logged then please [https://github.com/zaproxy/zaproxy/issues report it]&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
&lt;br /&gt;
Are you fluent in another language? Can you help translate ZAP into that language?&lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to do that!&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
If you fancy having a go at adding functionality to ZAP then please get in touch via the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group].&lt;br /&gt;
&lt;br /&gt;
Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!&lt;br /&gt;
&lt;br /&gt;
If you actively contribute to ZAP then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|Zed Attack Proxy Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool|OWASP Release Quality Tool]]&lt;br /&gt;
[[Category:OWASP_Download]]&lt;br /&gt;
[[Category:Popular]]&lt;br /&gt;
[[Category:SAMM-ST-2]]&lt;br /&gt;
[[Category:Flagship Projects|Zap]]&lt;br /&gt;
[[Category:OWASP Zed Attack Proxy|Zap]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=247693</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=247693"/>
				<updated>2019-02-20T13:31:38Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Tweak heading format&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF (draft)==&lt;br /&gt;
Idea 1: &lt;br /&gt;
&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
Idea 2: &lt;br /&gt;
&lt;br /&gt;
We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Dashboard / Gui (done)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
* [https://github.com/sananthu Ananthu S] - (Mentor)&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledge base should be extending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=247089</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=247089"/>
				<updated>2019-02-04T14:12:24Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Formatting tweaks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF (draft)==&lt;br /&gt;
Idea 1: &lt;br /&gt;
&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
Idea 2: &lt;br /&gt;
&lt;br /&gt;
We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Dashboard / Gui (done)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
==='''Mentors '''=== &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
* [https://github.com/sananthu Ananthu S] - (Mentor)&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledge base should be extending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=244727</id>
		<title>OWASP Zed Attack Proxy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=244727"/>
				<updated>2018-10-30T15:45:11Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Update rightnav donate button&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{{ReviewProject|projectname=zaproxy|language=en}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers[[#Justification|*]]. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.&lt;br /&gt;
&lt;br /&gt;
====ZAP 2.7.0 is now available!====&lt;br /&gt;
&lt;br /&gt;
[[Image:ZAP-Download.png | link=https://github.com/zaproxy/zaproxy/wiki/Downloads]]&lt;br /&gt;
&lt;br /&gt;
====Please help us to make ZAP even better for you by answering the [https://docs.google.com/forms/d/1-k-vcj_sSxlil6XLxCFade-m-IQVeE2h9gduA-2ZPPA/viewform ZAP User Questionnaire]!====&lt;br /&gt;
&lt;br /&gt;
For a quick overview of ZAP and an introduction to the [https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin official ZAP Jenkins plugin] see these tutorial videos on YouTube:&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|eH0RBI0nmww}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|mmHZLSffCUg}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more videos see the links on the [https://github.com/zaproxy/zaproxy/wiki/Videos wiki videos page].&lt;br /&gt;
&lt;br /&gt;
Interested in a ZAP talk or training event? See the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#tab=Talks talks] tab. Not one near you? Contact a [https://github.com/zaproxy/zaproxy/wiki/ZapEvangelists Zap Evangelist] to arrange one!&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=Zed Attack Proxy&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
For general information about ZAP:&lt;br /&gt;
* [https://twitter.com/zaproxy Twitter] - official ZAP announcements (low volume)&lt;br /&gt;
* [https://zaproxy.blogspot.co.uk/ Blog] - official ZAP blog&lt;br /&gt;
&lt;br /&gt;
For help using ZAP:&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/releases/download/2.6.0/ZAPGettingStartedGuide-2.6.pdf Getting Started Guide (pdf)] - an introductory guide you can print&lt;br /&gt;
* [https://www.youtube.com/playlist?list=PLEBitBW-Hlsv8cEIUntAO8st2UGhmrjUB Tutorial Videos]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki User Guide] - online version of the User Guide included with ZAP&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-users User Group] - ask questions about using ZAP&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Add-ons] - help for the optional add-ons you can install&lt;br /&gt;
* [https://stackoverflow.com/questions/tagged/zap StackOverflow] - because some people use this for all everything ;)&lt;br /&gt;
&lt;br /&gt;
To learn more about ZAP development:&lt;br /&gt;
* [https://github.com/zaproxy Source Code] - for all of the ZAP related projects&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/wiki/Introduction Wiki] - lots of detailed info&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-develop Developer Group] - ask questions about the ZAP internals&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap Crowdin (GUI)] - help translate the ZAP GUI&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help Crowdin (User Guide)] - help translate the ZAP User Guide&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy OpenHub]	- FOSS analytics&lt;br /&gt;
* [https://www.bountysource.com/teams/zap/issues BountySource] - Vote on ZAP issues (you can also donate money here, but 10% taken out)&lt;br /&gt;
&lt;br /&gt;
===Justification===&lt;br /&gt;
Justification for the statements made in the tagline at the top;)&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
* ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2016 [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2013 [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy Code Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap ZAP core i18n Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help ZAP help i18n Contributors]&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zaproxy/zaproxy/wiki/Downloads Download OWASP ZAP!]&lt;br /&gt;
&lt;br /&gt;
== Donate to ZAP ==&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; style=&amp;quot;width: auto; margin-left: auto; margin-right: auto;&amp;quot;&amp;gt;{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=Zed Attack Proxy }}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#News News] and [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
== Change Log ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/commits/develop zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/commits/master zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Code Repo ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/ zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/ zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
Questions? Please ask on the [http://groups.google.com/group/zaproxy-users ZAP User Group]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
Co-Project Leaders&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Ricardo.Pereira Ricardo Pereira] [mailto:ricardo.pereira@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Rick.mitchell Rick Mitchell] [mailto:rick.mitchell+wiki@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project OWASP WTE]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.openhub.net/p/zaproxy&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| cellpadding=&amp;quot;2&amp;quot; width=&amp;quot;200&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0 Apache 2 License]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotAddAlert.png|||400px|ZAP Add Alert Screen Shot]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHelp.png||400px|left|ZAP Help Screen Shot]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHistoryFilter.png|thumb|400px|left|ZAP History Filter Screen Shot]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotSearchTab.png|thumb|400px|left|ZAP Search Tab Screen Shot]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/Talks | Talks}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= News =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/News | News}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= ZAP Gear =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Yes, you can now buy ZAP related gear!&lt;br /&gt;
&lt;br /&gt;
All of the artwork for ZAP swag is released under the Creative Common License and can be downloaded from the [https://github.com/zaproxy/zap-swag zap-swag] repo.&lt;br /&gt;
&lt;br /&gt;
You can of course use the artwork from this repo with any other online store that you like.&lt;br /&gt;
&lt;br /&gt;
A range of products can be purchased from [http://www.redbubble.com/people/zaproxy Redbubble]&lt;br /&gt;
&lt;br /&gt;
Stickers can be purchased from [https://www.stickermule.com/uk/user/1070684077/stickers Stickermule]&lt;br /&gt;
&lt;br /&gt;
T-shirts can be purchased from [http://www.cafepress.com/zaproxy Cafepress]&lt;br /&gt;
&lt;br /&gt;
[[Image:zap-tshirt-cp.PNG | link=http://www.cafepress.com/zaproxy]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Supporters =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ZAP is developed by a worldwide [https://github.com/zaproxy/zap-core-help/wiki/HelpCredits team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:&lt;br /&gt;
&lt;br /&gt;
* [http://www.mozilla.org Mozilla]&lt;br /&gt;
* [http://www.linuxfoundation.org/ The Linux Foundation]&lt;br /&gt;
* [https://segment.com/ Segment]&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.sage.co.uk Sage]&lt;br /&gt;
* [http://www.google.com Google]&lt;br /&gt;
* [http://www.microsoft.com Microsoft]&lt;br /&gt;
* [http://www.hacktics.com/ Hacktics, Ernst &amp;amp; Young]&lt;br /&gt;
* [http://www.dinosec.com/ DinoSec]&lt;br /&gt;
* [http://www.denimgroup.com Denim Group]&lt;br /&gt;
* [http://www.aspectsecurity.com/ Aspect Security]&lt;br /&gt;
* [http://secureideas.net SecureIdeas]&lt;br /&gt;
* [http://utilisec.com UtiliSec]&lt;br /&gt;
* [http://www.encription.co.uk/ encription]&lt;br /&gt;
* [https://www.accenture.com/us-en/digital-index.aspx Accenture Digital]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Functionality =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's functionality:'''&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle Proxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Traditional] and AJAX spiders&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Automated scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsBruteforce Forced browsing]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/SmartCards Smartcard and Client Digital Certificates support]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsWebsocketIntroduction Web sockets] support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Support for a wide range of scripting languages]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki//HelpAddonsPlugnhackPlugnhack Plug-n-Hack support]&lt;br /&gt;
* Authentication and session support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsApi Powerful REST based API]&lt;br /&gt;
* Automatic updating option&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Integrated and growing marketplace of add-ons]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Features =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's features:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]&lt;br /&gt;
* Cross platform (it even runs on a [https://github.com/zaproxy/zaproxy/wiki/zappi Raspberry Pi!])&lt;br /&gt;
* Easy to install (using a [https://www.ej-technologies.com/products/install4j/overview.html multi-platform installer builder])&lt;br /&gt;
* Completely free (no paid for 'Pro' version)&lt;br /&gt;
* Ease of use a priority&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpIntro Comprehensive help pages]&lt;br /&gt;
* Fully internationalized&lt;br /&gt;
* Translated into over 20 languages&lt;br /&gt;
* Community based, with involvement actively encouraged&lt;br /&gt;
* Under active development by an international team of volunteers&lt;br /&gt;
&lt;br /&gt;
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Languages =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ZAP supports the following languages:'''&lt;br /&gt;
&lt;br /&gt;
* English&lt;br /&gt;
* Arabic&lt;br /&gt;
* Bosnian&lt;br /&gt;
* Brazilian Portuguese&lt;br /&gt;
* Chinese&lt;br /&gt;
* Danish&lt;br /&gt;
* Filipino&lt;br /&gt;
* French&lt;br /&gt;
* German&lt;br /&gt;
* Greek&lt;br /&gt;
* Hungarian&lt;br /&gt;
* Indonesian&lt;br /&gt;
* Italian&lt;br /&gt;
* Japanese&lt;br /&gt;
* Korean&lt;br /&gt;
* Persian&lt;br /&gt;
* Polish&lt;br /&gt;
* Russian&lt;br /&gt;
* Sinhala&lt;br /&gt;
* Spanish&lt;br /&gt;
* Urdu &lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to help improve these translations or add new ones right now!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Release 2.6.0==&lt;br /&gt;
ZAP 2.6.0 has been released, this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_6_0&lt;br /&gt;
&lt;br /&gt;
==Release 2.7.0==&lt;br /&gt;
ZAP 2.7.0 has been released (Nov 2017), this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_7_0&lt;br /&gt;
&lt;br /&gt;
It requires Java 8 (minimum) and supports Selenium 3.&lt;br /&gt;
&lt;br /&gt;
==Release 2.8.0==&lt;br /&gt;
ZAP 2.8.0 does not yet have a planned release date, but is likely to be around the beginning of 2018 or (more likely) the middle of 2018.&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of ZAP is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Feature Requests==&lt;br /&gt;
&lt;br /&gt;
Please raise new feature requests as enhancement requests here: https://github.com/zaproxy/zaproxy/issues&lt;br /&gt;
&lt;br /&gt;
If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use the [http://groups.google.com/group/zaproxy-users zaproxy-users Google Group] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What features could be made easier to use?&lt;br /&gt;
* How could the help pages be improved? &lt;br /&gt;
&lt;br /&gt;
==Log issues==&lt;br /&gt;
&lt;br /&gt;
Have you had a problem using ZAP?&lt;br /&gt;
&lt;br /&gt;
If so and its not already been logged then please [https://github.com/zaproxy/zaproxy/issues report it]&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
&lt;br /&gt;
Are you fluent in another language? Can you help translate ZAP into that language?&lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to do that!&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
If you fancy having a go at adding functionality to ZAP then please get in touch via the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group].&lt;br /&gt;
&lt;br /&gt;
Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!&lt;br /&gt;
&lt;br /&gt;
If you actively contribute to ZAP then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|Zed Attack Proxy Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool|OWASP Release Quality Tool]]&lt;br /&gt;
[[Category:OWASP_Download]]&lt;br /&gt;
[[Category:Popular]]&lt;br /&gt;
[[Category:SAMM-ST-2]]&lt;br /&gt;
[[Category:Flagship Projects|Zap]]&lt;br /&gt;
[[Category:OWASP Zed Attack Proxy|Zap]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Abuse_Case_Cheat_Sheet&amp;diff=243718</id>
		<title>Abuse Case Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Abuse_Case_Cheat_Sheet&amp;diff=243718"/>
				<updated>2018-09-25T18:46:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Minor changes to the second half of the document.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
__TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Often when the security level of an application is mentioned in requirements, the following ''expressions'' are meet:&lt;br /&gt;
* ''The application must be secure''.&lt;br /&gt;
* ''The application must defend against all attacks targeting this category of application''.&lt;br /&gt;
* ''The application must defend against attacks from the OWASP TOP 10''&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
These security requirements are too generic and useless for a development team...&lt;br /&gt;
&lt;br /&gt;
To build a secure application, from an pragmatic point of view, it is important to identify the attacks which the application must defend against according to its business and technical context.&lt;br /&gt;
&lt;br /&gt;
= Objective =&lt;br /&gt;
&lt;br /&gt;
The objective of this cheat sheet is to provide a explanation about what an '''Abuse Case''' is, why abuse cases are important when considering the security of an application and, finally, to provide a proposal for a pragmatic approach to built a list of abuse cases and track them for every feature planned to be implemented as part of an application whatever project mode used (waterfall or agile). &lt;br /&gt;
&lt;br /&gt;
'''Important note about this Cheat Sheet:'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
The main objective is to provide a pragmatic approach in order to allow a company or a project team to start building and handling the list of abuse cases and then customize the elements proposed to its context/culture in order to, finally, build its own method. &lt;br /&gt;
&lt;br /&gt;
This cheat sheet can be seen like a getting started tutorial.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Context &amp;amp; approach =&lt;br /&gt;
&lt;br /&gt;
== Why clearly identify the attacks? ==&lt;br /&gt;
&lt;br /&gt;
Clearly identifying the attacks against which the application must defend is essential in order to enable the following steps in a project or sprint:&lt;br /&gt;
* Evaluate the business risk for each of the identified attacks in order perform a selection according to the business risk and the project/sprint budget.&lt;br /&gt;
* Derive security requirements and add them into the project specification or sprint's user stories acceptance criteria.&lt;br /&gt;
* Estimate the overhead to provision in the initial project/sprint charge that will be necessary to implement the countermeasures.&lt;br /&gt;
* About countermeasures: Allow the project team to define them and in which location they are appropriate (network, infrastructure, code...) to be positioned.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Notion of Abuse Case ==&lt;br /&gt;
&lt;br /&gt;
In order to help build the list of attacks, the notion of '''Abuse Case''' exists.&lt;br /&gt;
&lt;br /&gt;
An '''Abuse Case''' can be defined as:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;A way to use a feature that was not expected by the implementer, allowing an attacker to influence the feature or outcome of use of the feature based on the attacker action (or input).&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Synopsys define an '''Abuse Case'' like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;Misuse and abuse cases describe how users misuse or exploit the weaknesses of controls in software features to attack an application. &lt;br /&gt;
This can lead to tangible business impact when a direct attack against business functionalities, which may bring in revenue or provide positive user experience, are attacked. &lt;br /&gt;
Abuse cases can also be an effective way to drive security requirements that lead to proper protection of these critical business use cases.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Synopsys source: https://www.synopsys.com/blogs/software-security/abuse-cases-can-drive-security-requirements/&lt;br /&gt;
&lt;br /&gt;
Another definition of Abuse Case by Cigital: https://cigital.com/papers/download/misuse-bp.pdf&lt;br /&gt;
&lt;br /&gt;
== How to define the list of Abuse Cases? ==&lt;br /&gt;
&lt;br /&gt;
There are many different ways to define the list of abuse cases for a feature (that can be mapped to a user story in agile mode).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project [[OWASP_SAMM_Project|OWASP Open SAMM]] proposes the following approach in the ''Activity A'' of the Security Practice ''Threat Assessment'' for the Maturity level 2:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Further considering the threats to the organization, conduct a more formal analysis to determine potential misuse or abuse of functionality. Typically, this process begins with identification of normal usage scenarios, e.g. use-case diagrams if available.&lt;br /&gt;
&lt;br /&gt;
If a formal abuse-case technique isn’t used, generate a set of abuse-cases for each scenario by starting with a statement of normal usage and brainstorming ways in which the statement might be negated, in whole or in part. The simplest way to get started is to insert the word “no” or “not” into the usage statement in as many ways as possible, typically around nouns and verbs. Each usage scenario should generate several possible abuse-case statements.&lt;br /&gt;
&lt;br /&gt;
Further elaborate the abuse-case statements to include any application-specific concerns based on the business function of the software. The ultimate goal is for the completed set of abuse statements to form a model for usage patterns that should be disallowed by the software. If desired, these abuse cases can be combined with existing threat models.&lt;br /&gt;
&lt;br /&gt;
After initial creation, abuse-case models should be updated for active projects during the design phase. For existing projects, new requirements should be analyzed for potential abuse, and existing projects should opportunistically build abuse-cases for established functionality where practical. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Open SAMM source: [[SAMM_-_Threat_Assessment_-_2|Threat Assessment Level 2 Actvity A]]&lt;br /&gt;
&lt;br /&gt;
Another way to achieve the building of the list can be the following (more ground and collaborative oriented):&lt;br /&gt;
&lt;br /&gt;
Make a workshop that includes people with the following profiles: &lt;br /&gt;
* '''Business analyst''': Will be the business key people that will describe each feature from a business point of view.&lt;br /&gt;
* '''Risk analyst''': Will be the company's risk personnel that will evaluate the business risk from a proposed attack (sometimes it is the '''Business analyst''' depending on the company).&lt;br /&gt;
* '''Offsensive guy (Pentester or Application Security guy with offensive mindset)''': Will be the ''attacker'' that will propose all attacks that he can perform on the business feature that will be presented to him. If the company does not have this profile then it is possible to ask an intervention of an external specialist (Pentester or AppSec consultant from a security firm). If possible, include 2 offensives guys (ex: 1 Pentester + 1 AppSec) in order to increase the number of possible attacks that will be identified and considered.&lt;br /&gt;
* '''Technical leaders of the projects''': Will be the project technical people and will allow technical exchange about attacks and countermeasures identified during the workshop.&lt;br /&gt;
* '''Quality assurance analyst or functional tester''': Personnel that may have a good sense of how the application/functionality is intended to work (positive testing) and what things cause it to fail (failure cases).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
During this workshop (duration will depend on the size of the feature list, but 4 hours is a good start) all business features that will be part of the project or the sprint will be processed. The output of the workshop will be a list of attacks (abuse cases) for all business features. All abuse cases will have a risk rating that will allow for filtering and prioritization.&lt;br /&gt;
&lt;br /&gt;
It is important to take in account '''Technical''' and '''Business''' kind of abuse cases and mark them accordingly.&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
* Technical flagged abuse case: Add Cross Site Scripting injection into a comment input field.&lt;br /&gt;
* Business flagged abuse case: Ability to modify arbitrary the price of an article in a online shop prior to pass an order causing the user to pay a lower amount for the wanted article.&lt;br /&gt;
&lt;br /&gt;
== When to define the list of Abuse Cases? ==&lt;br /&gt;
&lt;br /&gt;
On agile project, the definition workshop must be made after the meeting in which User Stories are associated to a Sprint.&lt;br /&gt;
&lt;br /&gt;
On waterfall project, the definition workshop must be made when business feature to implements are identified and known by the business.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Whatever the mode of project used (agile or waterfall), the abuse cases selected to be addressed must become security requirements in each feature specification section (waterfall) or User Story acceptance criteria (agile) in order to allow additional cost/effort evaluation, identification and implementation of the countermeasures.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Each abuse case must have a unique identifier in order to allow tracking of its handling in the whole project/sprint, details about this point will be given in the proposal section.&lt;br /&gt;
&lt;br /&gt;
An example of unique ID can be '''ABUSE_CASE_001'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following schema provide an overview of the chaining of the different steps involved (from left to right):&lt;br /&gt;
&lt;br /&gt;
[[File:ABUSE_CASE_CS_CHAINING_SCHEMA.png|center]]&lt;br /&gt;
&lt;br /&gt;
= Proposal =&lt;br /&gt;
&lt;br /&gt;
The proposal will use the workshop explained in previous section and will focus on the output of the workshop.&lt;br /&gt;
&lt;br /&gt;
== Step 1: Preparation of the workshop ==&lt;br /&gt;
&lt;br /&gt;
First, even if it seems obvious, the key business people must be sure to know, understand and be able to explain the business features that will be processed during the workshop.&lt;br /&gt;
&lt;br /&gt;
Secondly, create a new Microsoft Excel file (you can also use Google Sheets or any other similar software) with the following sheets (or tabs):&lt;br /&gt;
* '''FEATURES'''&lt;br /&gt;
** Will contain a table with the list of business features planned for the workshop.&lt;br /&gt;
* '''ABUSE CASES'''&lt;br /&gt;
** Will contain a table with all abuse cases identified during the workshop.&lt;br /&gt;
* '''COUNTERMEASURES'''&lt;br /&gt;
** Will contain a table with the list of countermeasure possible (light description) imagined for the abuse cases identified. &lt;br /&gt;
** This sheet is not mandatory but it can be useful to know if, for an abuse case, a fix is easy to implement and then can impact the risk rating. &lt;br /&gt;
** Countermeasure can be identified by the AppSec profile guy during the workshop because an AppSec guy must be able to perform attacks but also to build or identify defenses (it is not always the case for the Pentester profile guy because this profile generally focus on attack side only, so, the combination Pentester + AppSec is very efficient to have a 360 degree view).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is the representation of each sheet along with a example of content that will be filled during the workshop:&lt;br /&gt;
&lt;br /&gt;
''FEATURES'' sheet:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Feature unique ID&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Feature name&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Feature short description&lt;br /&gt;
|-&lt;br /&gt;
| FEATURE_001&lt;br /&gt;
| DocumentUploadFeature&lt;br /&gt;
| Allow user to upload document along a message&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''COUNTERMEASURES'' sheet:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Countermeasure unique ID&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Countermeasure short description&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Countermeasure help/hint&lt;br /&gt;
|-&lt;br /&gt;
| DEFENSE_001&lt;br /&gt;
| Validate the uploaded file by loading it into a parser&lt;br /&gt;
| Use advice from the OWASP Cheat Sheet about file upload&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''ABUSE CASES'' sheet:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Abuse case unique ID&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Feature ID impacted&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Abuse case's attack description&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Attack referential ID (if applicable)&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | CVSS V3 risk rating (score)&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | CVSS V3 string&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Kind of abuse case&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Countermeasure ID applicable&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Handling decision (To Address or Risk Accepted)&lt;br /&gt;
|-&lt;br /&gt;
| ABUSE_CASE_001&lt;br /&gt;
| FEATURE_001&lt;br /&gt;
| Upload Office file with malicious macro in charge of dropping a malware&lt;br /&gt;
| CAPEC-17&lt;br /&gt;
| HIGH (7.7)&lt;br /&gt;
| CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:H&lt;br /&gt;
| Technical&lt;br /&gt;
| DEFENSE_001&lt;br /&gt;
| To Address&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Step 2: During the workshop ==&lt;br /&gt;
&lt;br /&gt;
Use the spreadsheet to review all the features. &lt;br /&gt;
&lt;br /&gt;
For each feature, follow this flow:&lt;br /&gt;
# Key business people explain the current feature from a business point of view.&lt;br /&gt;
# Offensive guys propose and explain a set of attacks that they can perform against the feature.&lt;br /&gt;
# For each attack proposed:&lt;br /&gt;
## Appsec guys propose a countermeasure and a preferred set up location (infrastructure, network, code, design...). &lt;br /&gt;
## Technical people give feedback about the feasibility of the proposed countermeasure.&lt;br /&gt;
## Offsensive guy use the CVSS v3 (or other standard) calculator to determine a risk rating. (ex: https://www.first.org/cvss/calculator/3.0 )&lt;br /&gt;
## Risk key people accept/increase/decrease the rating to have final one that match the real business impact for the company.&lt;br /&gt;
# Business, Risk and Technical key peoples find a consensus and filter the list of abuses for the current feature to keep ones that must be addressed and flag them accordingly in the ''ABUSE CASES'' sheet ('''if risk is accepted then add a comment to explain why''').&lt;br /&gt;
# Pass to next feature...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If the presence of offensive guys is not possible then you can use the following references to identify the applicable attacks on your features:&lt;br /&gt;
* '''OWASP Automated Threats to Web Applications''': https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications&lt;br /&gt;
* '''OWASP Testing Guide''': https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents&lt;br /&gt;
* '''OWASP Mobile Testing Guide''': https://github.com/OWASP/owasp-mstg&lt;br /&gt;
* '''Common Attack Pattern Enumeration and Classification (CAPEC)''': https://capec.mitre.org/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Important note on attacks and countermeasure knowledge base(s):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
With the time and across projects, you will obtain your own dictionary of attacks and countermeasures that are applicable to the kind of application in your business domain.&lt;br /&gt;
This dictionary will speed up the future workshops in a significant way.&lt;br /&gt;
To promote the creation of this dictionary, you can, at the end of the project/sprint, gather the list of attacks and countermeasures identified in a central location (wiki, database, file...) that will be used during the next workshop in combination with the input of the offensive guys.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Step 3: After the workshop ==&lt;br /&gt;
&lt;br /&gt;
The spreadsheet contains (at this stage) the list of all abuse cases that must be handled and, potentially (depending on the capacity) corresponding countermeasures.&lt;br /&gt;
&lt;br /&gt;
Now, there 2 remaining task:&lt;br /&gt;
# Key business people must update the specification of each feature (waterfall) or the User Story of each feature (agile) to include the associated abuse cases as Security Requirements (waterfall) or Acceptance Criteria (agile).&lt;br /&gt;
# Key technical people must evaluate the overhead in terms of charge/effort to take into account the countermeasure.&lt;br /&gt;
&lt;br /&gt;
== Step 4: During implementation - Abuse cases handling tracking ==&lt;br /&gt;
&lt;br /&gt;
In order to track the handling of all the abuse cases, the following approach can be used:&lt;br /&gt;
&lt;br /&gt;
If one or several abuse cases are handled at:&lt;br /&gt;
* '''Design, Infrastructure or Network level'''&lt;br /&gt;
** Put a marker in the documentation or schema to indicate that ''This design/network/infrastructure take into account the abuse cases ABUSE_CASE_001, ABUSE_CASE_002, ABUSE_CASE_xxx''.&lt;br /&gt;
* '''Code level'''&lt;br /&gt;
** Put a special comment in the classes/scripts/modules to indicate that ''This class/module/script take into account the abuse cases ABUSE_CASE_001, ABUSE_CASE_002, ABUSE_CASE_xxx''. &lt;br /&gt;
** Dedicated annotation like &amp;lt;code&amp;gt;@AbuseCase(ids={&amp;quot;ABUSE_CASE_001&amp;quot;,&amp;quot;ABUSE_CASE_002&amp;quot;})&amp;lt;/code&amp;gt; can be used to facilitate tracking and allow identification into integrated development environment.&lt;br /&gt;
&lt;br /&gt;
Using this way, it becomes possible (via some minor scripting) to identify where the the abuse cases are addressed.&lt;br /&gt;
&lt;br /&gt;
== Step 5: During implementation - Abuse cases handling validation ==&lt;br /&gt;
&lt;br /&gt;
As abuse cases are defined, it is possible to put in place automated or manual validations to ensure that:&lt;br /&gt;
* All the selected abuse cases are handled.&lt;br /&gt;
* An abuse case is correctly/completely handled.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Validations can be of the following kinds:&lt;br /&gt;
&lt;br /&gt;
* Automated (run regularly at commit, daily or weekly in the Continuous Integration Jobs of the project): &lt;br /&gt;
** Custom audit rules in Static Application Security Testing (SAST) or Dynamic Application Security Testing (DAST) tools.&lt;br /&gt;
** Dedicated unit, integration or functional security oriented tests.&lt;br /&gt;
** ...&lt;br /&gt;
* Manual:&lt;br /&gt;
** Security code review between project's peers during the design or implementation.&lt;br /&gt;
** Provide the list of all abuse cases addressed to pentesters in order that they valid the protection efficiency for each abuse case during an intrusion test against the application (pentester will validate that the attacks identified are no longer effective and will also try to find other possible attacks).&lt;br /&gt;
** ...&lt;br /&gt;
&lt;br /&gt;
Add automated tests also allow teams to track that countermeasures against the abuse cases are still effective/in place during maintenance or bug fixing phase of a project (prevent accidental removal/disabling). It is also useful when Continuous Delivery approach is used (https://continuousdelivery.com/) to ensure that all abuse cases protections are in place before opening access to the application.&lt;br /&gt;
&lt;br /&gt;
= Sources of the schemas =&lt;br /&gt;
&lt;br /&gt;
All schemas were created using https://www.draw.io/ site and exported (as PNG image) for integration into this article.&lt;br /&gt;
&lt;br /&gt;
All XML descriptor files for each schema are available below (using XML description, modification of the schema is possible using DRAW.IO site): &lt;br /&gt;
&lt;br /&gt;
[[Media:ABUSE_CASE_CS_SCHEMA.zip|Schemas descriptors archive]]&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Author: Dominique Righetto - dominique.righetto@owasp.org &amp;lt;br&amp;gt;&lt;br /&gt;
Editors: https://www.owasp.org/index.php?title=Abuse_Case_Cheat_Sheet&amp;amp;action=history&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Abuse_Case_Cheat_Sheet&amp;diff=243717</id>
		<title>Abuse Case Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Abuse_Case_Cheat_Sheet&amp;diff=243717"/>
				<updated>2018-09-25T18:14:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Minor changes from the start up to the &amp;quot;Proposition&amp;quot; section. Added QA/Functional tester to team.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
__TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Often when the security level of an application is mentioned in requirements, the following ''expressions'' are meet:&lt;br /&gt;
* ''The application must be secure''.&lt;br /&gt;
* ''The application must defend against all attacks targeting this category of application''.&lt;br /&gt;
* ''The application must defend against attacks from the OWASP TOP 10''&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
These security requirements are too generic and useless for a development team...&lt;br /&gt;
&lt;br /&gt;
To build a secure application, from an pragmatic point of view, it is important to identify the attacks which the application must defend against according to its business and technical context.&lt;br /&gt;
&lt;br /&gt;
= Objective =&lt;br /&gt;
&lt;br /&gt;
The objective of this cheat sheet is to provide a explanation about what an '''Abuse Case''' is, why abuse cases are important when considering the security of an application and, finally, to provide a proposal for a pragmatic approach to built a list of abuse cases and track them for every feature planned to be implemented as part of an application whatever project mode used (waterfall or agile). &lt;br /&gt;
&lt;br /&gt;
'''Important note about this Cheat Sheet:'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
The main objective is to provide a pragmatic approach in order to allow a company or a project team to start building and handling the list of abuse cases and then customize the elements proposed to its context/culture in order to, finally, build its own method. &lt;br /&gt;
&lt;br /&gt;
This cheat sheet can be seen like a getting started tutorial.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Context &amp;amp; approach =&lt;br /&gt;
&lt;br /&gt;
== Why clearly identify the attacks? ==&lt;br /&gt;
&lt;br /&gt;
Clearly identifying the attacks against which the application must defend is essential in order to enable the following steps in a project or sprint:&lt;br /&gt;
* Evaluate the business risk for each of the identified attacks in order perform a selection according to the business risk and the project/sprint budget.&lt;br /&gt;
* Derive security requirements and add them into the project specification or sprint's user stories acceptance criteria.&lt;br /&gt;
* Estimate the overhead to provision in the initial project/sprint charge that will be necessary to implement the countermeasures.&lt;br /&gt;
* About countermeasures: Allow the project team to define them and in which location they are appropriate (network, infrastructure, code...) to be positioned.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Notion of Abuse Case ==&lt;br /&gt;
&lt;br /&gt;
In order to help build the list of attacks, the notion of '''Abuse Case''' exists.&lt;br /&gt;
&lt;br /&gt;
An '''Abuse Case''' can be defined as:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;A way to use a feature that was not expected by the implementer, allowing an attacker to influence the feature or outcome of use of the feature based on the attacker action (or input).&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Synopsys define an '''Abuse Case'' like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;Misuse and abuse cases describe how users misuse or exploit the weaknesses of controls in software features to attack an application. &lt;br /&gt;
This can lead to tangible business impact when a direct attack against business functionalities, which may bring in revenue or provide positive user experience, are attacked. &lt;br /&gt;
Abuse cases can also be an effective way to drive security requirements that lead to proper protection of these critical business use cases.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Synopsys source: https://www.synopsys.com/blogs/software-security/abuse-cases-can-drive-security-requirements/&lt;br /&gt;
&lt;br /&gt;
Another definition of Abuse Case by Cigital: https://cigital.com/papers/download/misuse-bp.pdf&lt;br /&gt;
&lt;br /&gt;
== How to define the list of Abuse Cases? ==&lt;br /&gt;
&lt;br /&gt;
There are many different ways to define the list of abuse cases for a feature (that can be mapped to a user story in agile mode).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project [[OWASP_SAMM_Project|OWASP Open SAMM]] proposes the following approach in the ''Activity A'' of the Security Practice ''Threat Assessment'' for the Maturity level 2:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Further considering the threats to the organization, conduct a more formal analysis to determine potential misuse or abuse of functionality. Typically, this process begins with identification of normal usage scenarios, e.g. use-case diagrams if available.&lt;br /&gt;
&lt;br /&gt;
If a formal abuse-case technique isn’t used, generate a set of abuse-cases for each scenario by starting with a statement of normal usage and brainstorming ways in which the statement might be negated, in whole or in part. The simplest way to get started is to insert the word “no” or “not” into the usage statement in as many ways as possible, typically around nouns and verbs. Each usage scenario should generate several possible abuse-case statements.&lt;br /&gt;
&lt;br /&gt;
Further elaborate the abuse-case statements to include any application-specific concerns based on the business function of the software. The ultimate goal is for the completed set of abuse statements to form a model for usage patterns that should be disallowed by the software. If desired, these abuse cases can be combined with existing threat models.&lt;br /&gt;
&lt;br /&gt;
After initial creation, abuse-case models should be updated for active projects during the design phase. For existing projects, new requirements should be analyzed for potential abuse, and existing projects should opportunistically build abuse-cases for established functionality where practical. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Open SAMM source: [[SAMM_-_Threat_Assessment_-_2|Threat Assessment Level 2 Actvity A]]&lt;br /&gt;
&lt;br /&gt;
Another way to achieve the building of the list can be the following (more ground and collaborative oriented):&lt;br /&gt;
&lt;br /&gt;
Make a workshop that includes people with the following profiles: &lt;br /&gt;
* '''Business analyst''': Will be the business key people that will describe each feature from a business point of view.&lt;br /&gt;
* '''Risk analyst''': Will be the company's risk personnel that will evaluate the business risk from a proposed attack (sometimes it is the '''Business analyst''' depending on the company).&lt;br /&gt;
* '''Offsensive guy (Pentester or Application Security guy with offensive mindset)''': Will be the ''attacker'' that will propose all attacks that he can perform on the business feature that will be presented to him. If the company does not have this profile then it is possible to ask an intervention of an external specialist (Pentester or AppSec consultant from a security firm). If possible, include 2 offensives guys (ex: 1 Pentester + 1 AppSec) in order to increase the number of possible attacks that will be identified and considered.&lt;br /&gt;
* '''Technical leaders of the projects''': Will be the project technical people and will allow technical exchange about attacks and countermeasures identified during the workshop.&lt;br /&gt;
* '''Quality assurance analyst or functional tester''': Personnel that may have a good sense of how the application/functionality is intended to work (positive testing) and what things cause it to fail (failure cases).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
During this workshop (duration will depend on the size of the feature list, but 4 hours is a good start) all business features that will be part of the project or the sprint will be processed. The output of the workshop will be a list of attacks (abuse cases) for all business features. All abuse cases will have a risk rating that will allow for filtering and prioritization.&lt;br /&gt;
&lt;br /&gt;
It is important to take in account '''Technical''' and '''Business''' kind of abuse cases and mark them accordingly.&lt;br /&gt;
&lt;br /&gt;
''Example:''&lt;br /&gt;
&lt;br /&gt;
* Technical flagged abuse case: Add Cross Site Scripting injection into a comment input field.&lt;br /&gt;
* Business flagged abuse case: Ability to modify arbitrary the price of an article in a online shop prior to pass an order causing the user to pay a lower amount for the wanted article.&lt;br /&gt;
&lt;br /&gt;
== When to define the list of Abuse Cases? ==&lt;br /&gt;
&lt;br /&gt;
On agile project, the definition workshop must be made after the meeting in which User Stories are associated to a Sprint.&lt;br /&gt;
&lt;br /&gt;
On waterfall project, the definition workshop must be made when business feature to implements are identified and known by the business.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Whatever the mode of project used (agile or waterfall), the abuse cases selected to be addressed must become security requirements in each feature specification section (waterfall) or User Story acceptance criteria (agile) in order to allow additional cost/effort evaluation, identification and implementation of the countermeasures.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Each abuse case must have a unique identifier in order to allow tracking of its handling in the whole project/sprint, details about this point will be given in the proposal section.&lt;br /&gt;
&lt;br /&gt;
An example of unique ID can be '''ABUSE_CASE_001'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following schema provide an overview of the chaining of the different steps involved (from left to right):&lt;br /&gt;
&lt;br /&gt;
[[File:ABUSE_CASE_CS_CHAINING_SCHEMA.png|center]]&lt;br /&gt;
&lt;br /&gt;
= Proposition =&lt;br /&gt;
&lt;br /&gt;
The proposal will use the workshop explained in previous section and will focus on the output of the workshop.&lt;br /&gt;
&lt;br /&gt;
== Step 1: Preparation of the workshop ==&lt;br /&gt;
&lt;br /&gt;
First, even if it is obvious, the business key people must be sure to know, understand and be able to explain the business features that will be processed during the workshop.&lt;br /&gt;
&lt;br /&gt;
Secondly, create a new Microsoft Excel file (you can also use Google Sheet or any other similar software) with the following sheets:&lt;br /&gt;
* '''FEATURES'''&lt;br /&gt;
** Will contains a table with the list of business features planned for the workshop.&lt;br /&gt;
* '''ABUSE CASES'''&lt;br /&gt;
** Will contains a table with all identified abuse cases during the workshop.&lt;br /&gt;
* '''COUNTERMEASURES'''&lt;br /&gt;
** Will contains a table with the list of countermeasure possibles (light description) imagined for the abuse cases identified. &lt;br /&gt;
** This sheet is not mandatory but it can be usefull to know if, for an abuse case, a fix is easy to implements and then can impact the risk rating. &lt;br /&gt;
** Countermeasure can be identified by the AppSec profile guy during the workshop because an AppSec guy must be able to perform attacks but also to build defenses (it is not always the case for the Pentester profile guy because this profile generally focus on attack side only, so, the combination Pentester + AppSec is very efficient to have a 360 degree view).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is the representation of each sheets along a example of content that will be filled during the workshop:&lt;br /&gt;
&lt;br /&gt;
''FEATURES'' sheet:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Feature unique ID&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Feature name&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Feature short description&lt;br /&gt;
|-&lt;br /&gt;
| FEATURE_001&lt;br /&gt;
| DocumentUploadFeature&lt;br /&gt;
| Allow user to upload document along a message&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''COUNTERMEASURES'' sheet:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Countermeasure unique ID&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Countermeasure short description&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Countermeasure help/hint&lt;br /&gt;
|-&lt;br /&gt;
| DEFENSE_001&lt;br /&gt;
| Validate the uploaded file by loading it into a parser&lt;br /&gt;
| Use advice from the OWASP Cheat Sheet about file upload&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''ABUSE CASES'' sheet:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Abuse case unique ID&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Feature ID impacted&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Abuse case's attack description&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Attack referential ID (if applicable)&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | CVSS V3 risk rating (score)&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | CVSS V3 string&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Kind of abuse case&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Countermeasure ID applicable&lt;br /&gt;
! style=&amp;quot;text-align: center; font-weight:bold;&amp;quot; | Handling decision (To Address or Risk Accepted)&lt;br /&gt;
|-&lt;br /&gt;
| ABUSE_CASE_001&lt;br /&gt;
| FEATURE_001&lt;br /&gt;
| Upload Office file with malicious macro in charge of dropping a malware&lt;br /&gt;
| CAPEC-17&lt;br /&gt;
| HIGH (7.7)&lt;br /&gt;
| CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:H&lt;br /&gt;
| Technical&lt;br /&gt;
| DEFENSE_001&lt;br /&gt;
| To Address&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Step 2: During the workshop ==&lt;br /&gt;
&lt;br /&gt;
Use the Excel file to review all the features. &lt;br /&gt;
&lt;br /&gt;
For each feature, follow this flow:&lt;br /&gt;
# Business key people explain the current feature from a business point of view.&lt;br /&gt;
# Offensive guys propose and explain a set of attacks that they can perform against the feature.&lt;br /&gt;
# For each attacks proposed:&lt;br /&gt;
## Offensive guys propose a countermeasure and a preferred set up location (infrastructure, network, code, design...). &lt;br /&gt;
## Technical key peoples of the project give feedback about the feasability of the proposed countermeasure.&lt;br /&gt;
## Offsensive guy use the CVSS v3 calculator to determine a risk rating: https://www.first.org/cvss/calculator/3.0&lt;br /&gt;
## Risk key people accept/increase/decrease the rating to have final one that match the real business impact for the company.&lt;br /&gt;
# Business, Risk and Technical key peoples find a consensus and filter the list of abuses for the current feature to keep ones that must be addressed and flag them accordingly in the ''ABUSE CASES'' sheet ('''if risk is accepted then add a comment to explain why''').&lt;br /&gt;
# Pass to next feature...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If the presence of offensive guys is not possible then you can use the following referential/guide of attacks to identify the applicable attacks on your features:&lt;br /&gt;
* '''OWASP Automated Threats to Web Applications''': https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications&lt;br /&gt;
* '''OWASP Testing Guide''': https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents&lt;br /&gt;
* '''OWASP Mobile Testing Guide''': https://github.com/OWASP/owasp-mstg&lt;br /&gt;
* '''Common Attack Pattern Enumeration and Classification (CAPEC)''': https://capec.mitre.org/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Important note on attacks and countermeasure knowledge base:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
With the time and accross projects, you will obtains your own dictionary of attacks and countermeasures that are applicable to the kind of application of your business domain.&lt;br /&gt;
This dictionary will speed up the further workshops in a significant way.&lt;br /&gt;
To promote the creation of this dictionary, you can, at the end of the project/sprint, gather the list of attacks and countermeasures identified in a central location (wiki, database, file...) that will be used during the next workshop in combination with the input of the offensive guys.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Step 3: After the workshop ==&lt;br /&gt;
&lt;br /&gt;
The Excel file contain, at this stage, the list of all abuse cases that must be handled and, potentially how, depending on the capacity to found countermeasures.&lt;br /&gt;
&lt;br /&gt;
Now, there 2 remaining task:&lt;br /&gt;
# Business key people must update specification of each feature (waterfall) or the User Story of each feature (agile) to include the associated abuse cases as Security Requirements (waterfall) or Acceptance Criterias (agile).&lt;br /&gt;
# Technical key peoples must evaluate the overhead in terms of charge/effort to take in account the countermeasure.&lt;br /&gt;
&lt;br /&gt;
== Step 4: During implementation - Abuse cases handling tracking ==&lt;br /&gt;
&lt;br /&gt;
In order to track the handling of all the abuse cases keep in the selection, the following approach can be used:&lt;br /&gt;
&lt;br /&gt;
If one or several abuse cases are handled at:&lt;br /&gt;
* '''Design, Infrastructure or Network level'''&lt;br /&gt;
** Put a marker in the documentation or schema to indicate that ''This design/network/infrastructure take in account the abuse cases ABUSE_CASE_001, ABUSE_CASE_002, ABUSE_CASE_xxx''.&lt;br /&gt;
* '''Code level'''&lt;br /&gt;
** Put a special comment in the classes/scripts/modules to indicate that ''This class/module/script take in account the abuse cases ABUSE_CASE_001, ABUSE_CASE_002, ABUSE_CASE_xxx''. &lt;br /&gt;
** Dedicated annotation like &amp;lt;code&amp;gt;@AbuseCase(ids={&amp;quot;ABUSE_CASE_001&amp;quot;,&amp;quot;ABUSE_CASE_002&amp;quot;})&amp;lt;/code&amp;gt; can be used to faciliate tracking and allow identification into integrated developement environment.&lt;br /&gt;
&lt;br /&gt;
Using this way, it become possible (via some minor scripting) to identify where the the abuse cases are addressed.&lt;br /&gt;
&lt;br /&gt;
== Step 5: During implementation - Abuse cases handling validation ==&lt;br /&gt;
&lt;br /&gt;
As abuse cases are defined, it is possible to put in place automated or manual validations to ensure that:&lt;br /&gt;
* All the selected abuse cases are handled.&lt;br /&gt;
* A abuse case is correctly handled.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Validations can be of the following kinds:&lt;br /&gt;
&lt;br /&gt;
* Automated (run regularly at commit, daily or weekly in the Continous Integration Jobs of the project): &lt;br /&gt;
** Custom audit rules in Static Application Security Testing (SAST) or Dynamic Application Security Testing (DAST) tools.&lt;br /&gt;
** Dedicated unit, integration or functional security oriented tests.&lt;br /&gt;
** ...&lt;br /&gt;
* Manual:&lt;br /&gt;
** Security code review between project's peer during the design or the implementation.&lt;br /&gt;
** Provide the list of all abuse cases addressed to pentesters in order that they valid the protection efficiency for each abuse case during an intrusion test against the application (pentester will validate that the attacks identified are not longer effective and will also try to find another possible attacks).&lt;br /&gt;
** ...&lt;br /&gt;
&lt;br /&gt;
Add automated tests allow also to track that countermeasures against the abuse cases are still effective/in place during maintenance or bug fixing phase of a project (prevent accidental removal/disabling). It is also usefull when Continuous Delivery approach is used (https://continuousdelivery.com/) in to ensure that all abuse cases protections are in place before to open expected access to the application.&lt;br /&gt;
&lt;br /&gt;
= Sources of the schemas =&lt;br /&gt;
&lt;br /&gt;
All schemas has been created using https://www.draw.io/ site and exported, as PNG image, for being integrated into this article.&lt;br /&gt;
&lt;br /&gt;
All XML descriptors files for each schema are available below (using XML description, modification of the schema is possible using DRAW.IO site): &lt;br /&gt;
&lt;br /&gt;
[[Media:ABUSE_CASE_CS_SCHEMA.zip|Schemas descriptors archive]]&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Dominique Righetto - dominique.righetto@owasp.org &lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Reviews_2018&amp;diff=241288</id>
		<title>OWASP Project Reviews 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Reviews_2018&amp;diff=241288"/>
				<updated>2018-06-13T12:10:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Minor tweak&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== '''&amp;lt;u&amp;gt;[[Project Reviews Guideline|Overview of Project Reviews:]]&amp;lt;/u&amp;gt;''' ===&lt;br /&gt;
OWASP is reviewing projects who wish to graduate from Incubator to Lab to Flagship.  The purpose of this assessment is to determine whether a project meets the minimum criteria to graduate as outlined in the Project Health Assessment Criteria Document.  The review process begins with an initial self-assessment done by the project leader and reviewed by Harold Blankenship.  Next, the assessment enters the peer review phase where we ask volunteers in our OWASP Community to participate and finalize the results. I have included a [https://docs.google.com/document/d/1NQSHshTxK1AWTkD4WgYluxSafgO-XGDHZnwE9Qvt7TE/edit '''Sample of a Project Assessmen'''t] for your review and consideration.&lt;br /&gt;
&lt;br /&gt;
'''OWASP Project Reviews @ APPSEC  USA 2018'''&lt;br /&gt;
* Harold Blankenship (Director of Projects and Technology)&lt;br /&gt;
&lt;br /&gt;
'''OWASP Volunteers:'''&lt;br /&gt;
&lt;br /&gt;
We need volunteers for the AppSec EU 2018 Reviews.  Please contact [mailto://project-reviews@owasp.org the Project Review team] to volunteer&lt;br /&gt;
&lt;br /&gt;
'''Description of Scope of Work:''' &lt;br /&gt;
&lt;br /&gt;
'''Lab to Flagship Status'''&lt;br /&gt;
&lt;br /&gt;
OWASP Juiceshop Project&lt;br /&gt;
&lt;br /&gt;
OWASP DefectDojo Project&lt;br /&gt;
&lt;br /&gt;
'''Incubator to Lab Status'''&lt;br /&gt;
&lt;br /&gt;
OWASP Glue Tool Project &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''&amp;lt;u&amp;gt;OWASP Project Health Checks:&amp;lt;/u&amp;gt;''' ===&lt;br /&gt;
'''Review Forms:''' [https://docs.google.com/a/owasp.org/document/d/1jUXt9M9u9Kq1JLaDSdbh6s0p5G_EqFSoaKpzDRures4/edit?usp=sharing Code Health Check]  [https://docs.google.com/a/owasp.org/document/d/1aDdcBm3v-DMraVKmsBiNA4YzBmlGFLvOddj5nvPd--Q/edit?usp=sharing Tool Health Check] [https://docs.google.com/a/owasp.org/document/d/17kJlpupi2nmKKRMMBpxgyj1JWxvt23iT8fWULm4SW6k/edit?usp=sharing Documentation Health Check]&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project|OWASP Hackademic Challenges  Project]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP Mantra - Security Framework|OWASP Mantra Security Framwork]]&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP Security Ninjas AppSec Training Program|OWASP Security Ninjas  AppSec Training Program]]&lt;br /&gt;
&lt;br /&gt;
OWASP Security Knowledge Framework Project&lt;br /&gt;
&lt;br /&gt;
'''Lab Documentation Projects:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP Application Security Guide For CISOs Project|OWASP Application Security Guide for Cisos Project]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP CISO Survey|OWASP Cisco Survey]]&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects'''&lt;br /&gt;
&lt;br /&gt;
Graduation Project: OWASP Mobile Security Testing Guide Project&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Secure_Headers_Project - Response on needed on request to get an external host&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project - No updates since 2015&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Faux_Bank_Project - No updates since 2015&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Droid10_Project - No updates since March 15&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WAP-Web_Application_Protection - no updates since 2015 and no repository still in salesforge&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project - No updates since 2015 still using salesforge&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WebSpa_Project - no updates since March 2015 last update in salesforge 2/21/2016&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Rainbow_Maker_Project - Last release 12/11/2015 and no updates since May 2015&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_.NET_Project - No updates March 23, 2016&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_WASC_Web_Hacking_Incidents_Database_Project - no updated since March 12, 2015&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Application_Security_Program_Quick_Start_Guide_Project - no updates since january 2015&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Secure_Configuration_Guide#tab=Main - No updates since April 2016 - no updates to guide&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_RFP-Criteria - no updates since March 2016&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Top_10_fuer_Entwickler - no real updates on news since 2013 some updates to the wiki&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Individual_Member&amp;diff=240342</id>
		<title>Talk:Individual Member</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Individual_Member&amp;diff=240342"/>
				<updated>2018-05-01T11:51:39Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Added comment&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The LinkedIn Group link is broken...404. [[User:Rick.mitchell|Rick.mitchell]] ([[User talk:Rick.mitchell|talk]]) 06:51, 1 May 2018 (CDT)&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=240259</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=240259"/>
				<updated>2018-04-26T19:53:07Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Grammar tweak&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2017 risks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;''A complete mapping for the 2013 edition of the OWASP Top 10 can be found [https://www.owasp.org/index.php/ZAPpingTheTop10-2013 here].''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available (based on the Top 10 - 2013 edition): [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A2-Broken_Authentication | A2 Broken Authentication]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control Testing]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A3-Sensitive_Data_Exposure | A3 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A4-XML_External_Entities_(XXE) | A4 XML External Entities (XXE)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Active scan rules [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A5-Broken_Access_Control | A5 Broken Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A6-Security_Misconfiguration | A6 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10-2017_A7-Cross-Site_Scripting_(XSS) | A7 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A8-Insecure_Deserialization | A8 Insecure Deserialization]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; There are two outstanding issues that are relevant to this Top 10 entry: [https://github.com/zaproxy/zaproxy/issues/4112 Insecure deserialization active scanner] &amp;amp; [https://github.com/zaproxy/zaproxy/issues/4509 Java Serialization Handling]&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A10-Insufficient_Logging%26Monitoring | A10 Insufficient Logging &amp;amp; Monitoring]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated / Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The Spider(s), Active Scanner, Fuzzer, and Access Control addon can all be used to generate traffic and &amp;quot;attacks&amp;quot; which are potential sources/causes for logging and alerting. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=240258</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=240258"/>
				<updated>2018-04-26T19:51:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Lead-in adjustment&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2017 risks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;''A complete mapping for the 2013 edition of the OWASP Top 10 can be found [https://www.owasp.org/index.php/ZAPpingTheTop10-2013 here].''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available (based on the Top 10 - 2013 edition): [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A2-Broken_Authentication | A2 Broken Authentication]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control Testing]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A3-Sensitive_Data_Exposure | A3 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A4-XML_External_Entities_(XXE) | A4 XML External Entities (XXE)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Active scan rules [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A5-Broken_Access_Control | A5 Broken Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A6-Security_Misconfiguration | A6 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10-2017_A7-Cross-Site_Scripting_(XSS) | A7 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A8-Insecure_Deserialization | A8 Insecure Deserialization]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; There are currently two outstanding issue that are relevant to this Top 10 entry: [https://github.com/zaproxy/zaproxy/issues/4112 Insecure deserialization active scanner] &amp;amp; [https://github.com/zaproxy/zaproxy/issues/4509 Java Serialization Handling]&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A10-Insufficient_Logging%26Monitoring | A10 Insufficient Logging &amp;amp; Monitoring]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated / Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The Spider(s), Active Scanner, Fuzzer, and Access Control addon can all be used to generate traffic and &amp;quot;attacks&amp;quot; which are potential sources/causes for logging and alerting. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=240257</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=240257"/>
				<updated>2018-04-26T19:49:36Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Added A10 and A8 details.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
'''''This content is currently a work in progress (as of Dec-2017)''''', complete mapping for the 2013 edition of the OWASP Top 10 can be found [https://www.owasp.org/index.php/ZAPpingTheTop10-2013 here].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2017 risks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available (based on the Top 10 - 2013 edition): [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A2-Broken_Authentication | A2 Broken Authentication]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control Testing]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A3-Sensitive_Data_Exposure | A3 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A4-XML_External_Entities_(XXE) | A4 XML External Entities (XXE)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Active scan rules [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A5-Broken_Access_Control | A5 Broken Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A6-Security_Misconfiguration | A6 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10-2017_A7-Cross-Site_Scripting_(XSS) | A7 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A8-Insecure_Deserialization | A8 Insecure Deserialization]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; There are currently two outstanding issue that are relevant to this Top 10 entry: [https://github.com/zaproxy/zaproxy/issues/4112 Insecure deserialization active scanner] &amp;amp; [https://github.com/zaproxy/zaproxy/issues/4509 Java Serialization Handling]&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A10-Insufficient_Logging%26Monitoring | A10 Insufficient Logging &amp;amp; Monitoring]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated / Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The Spider(s), Active Scanner, Fuzzer, and Access Control addon can all be used to generate traffic and &amp;quot;attacks&amp;quot; which are potential sources/causes for logging and alerting. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=239997</id>
		<title>OWASP Zed Attack Proxy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=239997"/>
				<updated>2018-04-17T17:09:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{{ReviewProject|projectname=zaproxy|language=en}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers[[#Justification|*]]. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.&lt;br /&gt;
&lt;br /&gt;
====ZAP 2.7.0 is now available!====&lt;br /&gt;
&lt;br /&gt;
[[Image:ZAP-Download.png | link=https://github.com/zaproxy/zaproxy/wiki/Downloads]]&lt;br /&gt;
&lt;br /&gt;
====Please help us to make ZAP even better for you by answering the [https://docs.google.com/forms/d/1-k-vcj_sSxlil6XLxCFade-m-IQVeE2h9gduA-2ZPPA/viewform ZAP User Questionnaire]!====&lt;br /&gt;
&lt;br /&gt;
For a quick overview of ZAP and an introduction to the [https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin official ZAP Jenkins plugin] see these tutorial videos on YouTube:&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|eH0RBI0nmww}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|mmHZLSffCUg}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more videos see the links on the [https://github.com/zaproxy/zaproxy/wiki/Videos wiki videos page].&lt;br /&gt;
&lt;br /&gt;
Interested in a ZAP talk or training event? See the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#tab=Talks talks] tab. Not one near you? Contact a [https://github.com/zaproxy/zaproxy/wiki/ZapEvangelists Zap Evangelist] to arrange one!&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=Zed Attack Proxy&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
For general information about ZAP:&lt;br /&gt;
* [https://twitter.com/zaproxy Twitter] - official ZAP announcements (low volume)&lt;br /&gt;
* [https://zaproxy.blogspot.co.uk/ Blog] - official ZAP blog&lt;br /&gt;
&lt;br /&gt;
For help using ZAP:&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/releases/download/2.6.0/ZAPGettingStartedGuide-2.6.pdf Getting Started Guide (pdf)] - an introductory guide you can print&lt;br /&gt;
* [https://www.youtube.com/playlist?list=PLEBitBW-Hlsv8cEIUntAO8st2UGhmrjUB Tutorial Videos]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki User Guide] - online version of the User Guide included with ZAP&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-users User Group] - ask questions about using ZAP&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Add-ons] - help for the optional add-ons you can install&lt;br /&gt;
* [https://stackoverflow.com/questions/tagged/zap StackOverflow] - because some people use this for all everything ;)&lt;br /&gt;
&lt;br /&gt;
To learn more about ZAP development:&lt;br /&gt;
* [https://github.com/zaproxy Source Code] - for all of the ZAP related projects&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/wiki/Introduction Wiki] - lots of detailed info&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-develop Developer Group] - ask questions about the ZAP internals&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap Crowdin (GUI)] - help translate the ZAP GUI&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help Crowdin (User Guide)] - help translate the ZAP User Guide&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy OpenHub]	- FOSS analytics&lt;br /&gt;
* [https://www.bountysource.com/teams/zap/issues BountySource] - Vote on ZAP issues (you can also donate money here, but 10% taken out)&lt;br /&gt;
&lt;br /&gt;
===Justification===&lt;br /&gt;
Justification for the statements made in the tagline at the top;)&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
* ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2016 [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2013 [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy Code Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap ZAP core i18n Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help ZAP help i18n Contributors]&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zaproxy/zaproxy/wiki/Downloads Download OWASP ZAP!]&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP ==&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; style=&amp;quot;width: auto; margin-left: auto; margin-right: auto;&amp;quot;&amp;gt;{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=Other (Website Donation) }}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#News News] and [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
== Change Log ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/commits/develop zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/commits/master zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Code Repo ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/ zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/ zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
Questions? Please ask on the [http://groups.google.com/group/zaproxy-users ZAP User Group]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
Co-Project Leaders&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Ricardo.Pereira Ricardo Pereira] [mailto:ricardo.pereira@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Rick.mitchell Rick Mitchell] [mailto:rick.mitchell+wiki@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project OWASP WTE]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.openhub.net/p/zaproxy&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0 Apache 2 License]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotAddAlert.png|||400px|ZAP Add Alert Screen Shot]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHelp.png||400px|left|ZAP Help Screen Shot]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHistoryFilter.png|thumb|400px|left|ZAP History Filter Screen Shot]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotSearchTab.png|thumb|400px|left|ZAP Search Tab Screen Shot]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/Talks | Talks}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= News =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/News | News}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= ZAP Gear =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Yes, you can now buy ZAP related gear!&lt;br /&gt;
&lt;br /&gt;
All of the artwork for ZAP swag is released under the Creative Common License and can be downloaded from the [https://github.com/zaproxy/zap-swag zap-swag] repo.&lt;br /&gt;
&lt;br /&gt;
You can of course use the artwork from this repo with any other online store that you like.&lt;br /&gt;
&lt;br /&gt;
A range of products can be purchased from [http://www.redbubble.com/people/zaproxy Redbubble]&lt;br /&gt;
&lt;br /&gt;
Stickers can be purchased from [https://www.stickermule.com/uk/user/1070684077/stickers Stickermule]&lt;br /&gt;
&lt;br /&gt;
T-shirts can be purchased from [http://www.cafepress.com/zaproxy Cafepress]&lt;br /&gt;
&lt;br /&gt;
[[Image:zap-tshirt-cp.PNG | link=http://www.cafepress.com/zaproxy]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Supporters =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ZAP is developed by a worldwide [https://github.com/zaproxy/zap-core-help/wiki/HelpCredits team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:&lt;br /&gt;
&lt;br /&gt;
* [http://www.mozilla.org Mozilla]&lt;br /&gt;
* [http://www.linuxfoundation.org/ The Linux Foundation]&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.sage.co.uk Sage]&lt;br /&gt;
* [http://www.google.com Google]&lt;br /&gt;
* [http://www.microsoft.com Microsoft]&lt;br /&gt;
* [http://www.hacktics.com/ Hacktics, Ernst &amp;amp; Young]&lt;br /&gt;
* [http://www.dinosec.com/ DinoSec]&lt;br /&gt;
* [http://www.denimgroup.com Denim Group]&lt;br /&gt;
* [http://www.aspectsecurity.com/ Aspect Security]&lt;br /&gt;
* [http://secureideas.net SecureIdeas]&lt;br /&gt;
* [http://utilisec.com UtiliSec]&lt;br /&gt;
* [http://www.encription.co.uk/ encription]&lt;br /&gt;
* [https://www.accenture.com/us-en/digital-index.aspx Accenture Digital]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Functionality =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's functionality:'''&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle Proxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Traditional] and AJAX spiders&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Automated scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsBruteforce Forced browsing]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/SmartCards Smartcard and Client Digital Certificates support]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsWebsocketIntroduction Web sockets] support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Support for a wide range of scripting languages]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki//HelpAddonsPlugnhackPlugnhack Plug-n-Hack support]&lt;br /&gt;
* Authentication and session support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsApi Powerful REST based API]&lt;br /&gt;
* Automatic updating option&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Integrated and growing marketplace of add-ons]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Features =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's features:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]&lt;br /&gt;
* Cross platform (it even runs on a [https://github.com/zaproxy/zaproxy/wiki/zappi Raspberry Pi!])&lt;br /&gt;
* Easy to install (using a [https://www.ej-technologies.com/products/install4j/overview.html multi-platform installer builder])&lt;br /&gt;
* Completely free (no paid for 'Pro' version)&lt;br /&gt;
* Ease of use a priority&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpIntro Comprehensive help pages]&lt;br /&gt;
* Fully internationalized&lt;br /&gt;
* Translated into over 20 languages&lt;br /&gt;
* Community based, with involvement actively encouraged&lt;br /&gt;
* Under active development by an international team of volunteers&lt;br /&gt;
&lt;br /&gt;
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Languages =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ZAP supports the following languages:'''&lt;br /&gt;
&lt;br /&gt;
* English&lt;br /&gt;
* Arabic&lt;br /&gt;
* Bosnian&lt;br /&gt;
* Brazilian Portuguese&lt;br /&gt;
* Chinese&lt;br /&gt;
* Danish&lt;br /&gt;
* Filipino&lt;br /&gt;
* French&lt;br /&gt;
* German&lt;br /&gt;
* Greek&lt;br /&gt;
* Hungarian&lt;br /&gt;
* Indonesian&lt;br /&gt;
* Italian&lt;br /&gt;
* Japanese&lt;br /&gt;
* Korean&lt;br /&gt;
* Persian&lt;br /&gt;
* Polish&lt;br /&gt;
* Russian&lt;br /&gt;
* Sinhala&lt;br /&gt;
* Spanish&lt;br /&gt;
* Urdu &lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to help improve these translations or add new ones right now!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Release 2.6.0==&lt;br /&gt;
ZAP 2.6.0 has been released, this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_6_0&lt;br /&gt;
&lt;br /&gt;
==Release 2.7.0==&lt;br /&gt;
ZAP 2.7.0 has been released (Nov 2017), this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_7_0&lt;br /&gt;
&lt;br /&gt;
It requires Java 8 (minimum) and supports Selenium 3.&lt;br /&gt;
&lt;br /&gt;
==Release 2.8.0==&lt;br /&gt;
ZAP 2.8.0 does not yet have a planned release date, but is likely to be around the beginning of 2018 or (more likely) the middle of 2018.&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of ZAP is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Feature Requests==&lt;br /&gt;
&lt;br /&gt;
Please raise new feature requests as enhancement requests here: https://github.com/zaproxy/zaproxy/issues&lt;br /&gt;
&lt;br /&gt;
If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use the [http://groups.google.com/group/zaproxy-users zaproxy-users Google Group] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What features could be made easier to use?&lt;br /&gt;
* How could the help pages be improved? &lt;br /&gt;
&lt;br /&gt;
==Log issues==&lt;br /&gt;
&lt;br /&gt;
Have you had a problem using ZAP?&lt;br /&gt;
&lt;br /&gt;
If so and its not already been logged then please [https://github.com/zaproxy/zaproxy/issues report it]&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
&lt;br /&gt;
Are you fluent in another language? Can you help translate ZAP into that language?&lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to do that!&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
If you fancy having a go at adding functionality to ZAP then please get in touch via the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group].&lt;br /&gt;
&lt;br /&gt;
Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!&lt;br /&gt;
&lt;br /&gt;
If you actively contribute to ZAP then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|Zed Attack Proxy Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool|OWASP Release Quality Tool]]&lt;br /&gt;
[[Category:OWASP_Download]]&lt;br /&gt;
[[Category:Popular]]&lt;br /&gt;
[[Category:SAMM-ST-2]]&lt;br /&gt;
[[Category:Flagship Projects|Zap]]&lt;br /&gt;
[[Category:OWASP Zed Attack Proxy|Zap]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=238722</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=238722"/>
				<updated>2018-03-19T13:54:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: /* Backslash Powered Scanner */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Foundation has been selected as an organization to be part of the GOOGLE SUMMER CODE 2018''' &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
:&lt;br /&gt;
:We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
:&lt;br /&gt;
:It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* ZAP able to explore React applications more effectively&lt;br /&gt;
:* ZAP able to attack React applications more effectively&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning. (Including adapting some of the existing scan rules to leverage the new component.)&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:: '''Note''' This issue was previously undertaken, however, only partial progress was made. The [https://github.com/zaproxy/zap-extensions/pull/1014 Pull Request] is still open and can be built upon. The 2018 effort needs to ensure the code builds and is successfully put to use in some of the existing scan rules and unit tests.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&lt;br /&gt;
:This is time consuming and error prone.&lt;br /&gt;
:&lt;br /&gt;
:Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
:&lt;br /&gt;
:For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:&lt;br /&gt;
:A Bamboo addon that supports:&lt;br /&gt;
:* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
:* Active Scanning&lt;br /&gt;
:* Authentication&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* &amp;lt;del&amp;gt;Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&amp;lt;/del&amp;gt; ([https://github.com/bkimminich/juice-shop/issues/315 #315] in progress)&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
== OWASP BLT (Bug Logging Tool) ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
BLT lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
Check OWASP WIKI PAGE [https://www.owasp.org/index.php/OWASP_Bug_Logging_Tool] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Fuse app to allow easy bug reporting from phone.&lt;br /&gt;
* BUG cryptocurrency rewarded for each bug reported - requires a way to verify bugs are valid and not duplicates&lt;br /&gt;
* Allow for companies to do private (paid) bug bounties&lt;br /&gt;
* allow for bug reporting via email &lt;br /&gt;
* build a referral program&lt;br /&gt;
* integrate an idea / suggestion feature&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Fusetools will be used for the app and C++ (Bitcoin based) or Ethereum will be used for the cryptocurrency part.&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on new features &lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP BLT&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sean Auriti [https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] &lt;br /&gt;
* Sourav Badami [https://www.owasp.org/index.php/User:Souravbadami Sourav Badami] [mailto:souravbadami@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - 2017 OWASP Top Ten==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add support for multiple OWASP Top Ten versions, such as 2017 and 2010.&lt;br /&gt;
Currently RailsGoat supports only the 2013 version of OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that supports additional version(s) of OWASP Top Ten&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 305 [https://github.com/OWASP/railsgoat/issues/305] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sri Harsha Gajavalli [mailto:sriharsha.g15@iiits.in] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, Mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Capture-The-Flag RailsGoat Image Creation Automation==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Create automation to build a Capture-The-Flag competition (CTF) image (VM, ISO, etc) which contains everything needed, such as [Operating System, Rails Stack, RailsGoat], so RailsGoat can easily be used in more Capture-The-Flag competitions.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that automates the process of building RailsGoat CTF images.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 306 [https://github.com/OWASP/railsgoat/issues/306] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* Some background in creating VMs/ISOs would be helpful.&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Matt Robinson [mailto:brimstone@the.narro.ws] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat. Need to get permission from publisher. @jasnow got permission previously.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* More teaching RailsGoat examples based on &amp;quot;Security on Rails&amp;quot; book's lunchedin project.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 307 [https://github.com/OWASP/railsgoat/issues/307] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security&lt;br /&gt;
would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Add Devise Gem Support and Vulnerabilities to RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add Devise Support to RailsGoat along with adding Devise-related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* Using Devise gem inside RailsGoat plus Devise-related vulnerabilities.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 207 [https://github.com/OWASP/railsgoat/issues/207] and * Issue 243 [https://github.com/OWASP/railsgoat/issues/243] has more details.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Generic Idea==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
RailsGoat is a great framework for learning about OWASP Top 10 2013 using a vulnerable version of the Ruby on Rails (versions 3 to 5), as well as some &amp;quot;extras&amp;quot; that the initial project contributors felt worthwhile to share. This project is designed to educate both developers, as well as security professionals. Feel free to check out the [Railsgoat Github site](https://github.com/OWASP/railsgoat) for more details. If you have an idea that is not on this list then don't worry, you can still submit it.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that makes RailsGoat even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
=== Needs: ===&lt;br /&gt;
* Student Developers&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
*  [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=238721</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=238721"/>
				<updated>2018-03-19T13:51:59Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: /* OWASP ZAP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Foundation has been selected as an organization to be part of the GOOGLE SUMMER CODE 2018''' &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
:&lt;br /&gt;
:We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
:&lt;br /&gt;
:It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* ZAP able to explore React applications more effectively&lt;br /&gt;
:* ZAP able to attack React applications more effectively&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning. (Including adapting some of the existing scan rules to leverage the new component.)&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:: '''Note''' This issue was previously undertaken, however, only partial progress was made. The [https://github.com/zaproxy/zap-extensions/pull/1014 Pull Request] is still open and can be built upon. The 2018 effort needs to ensure the code builds and is successfully put to use in some of the existing scan rules and unit tests.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&lt;br /&gt;
:This is time consuming and error prone.&lt;br /&gt;
:&lt;br /&gt;
:Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
:&lt;br /&gt;
:For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:&lt;br /&gt;
:A Bamboo addon that supports:&lt;br /&gt;
:* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
:* Active Scanning&lt;br /&gt;
:* Authentication&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* &amp;lt;del&amp;gt;Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&amp;lt;/del&amp;gt; ([https://github.com/bkimminich/juice-shop/issues/315 #315] in progress)&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
== OWASP BLT (Bug Logging Tool) ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
BLT lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
Check OWASP WIKI PAGE [https://www.owasp.org/index.php/OWASP_Bug_Logging_Tool] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Fuse app to allow easy bug reporting from phone.&lt;br /&gt;
* BUG cryptocurrency rewarded for each bug reported - requires a way to verify bugs are valid and not duplicates&lt;br /&gt;
* Allow for companies to do private (paid) bug bounties&lt;br /&gt;
* allow for bug reporting via email &lt;br /&gt;
* build a referral program&lt;br /&gt;
* integrate an idea / suggestion feature&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Fusetools will be used for the app and C++ (Bitcoin based) or Ethereum will be used for the cryptocurrency part.&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on new features &lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP BLT&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sean Auriti [https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] &lt;br /&gt;
* Sourav Badami [https://www.owasp.org/index.php/User:Souravbadami Sourav Badami] [mailto:souravbadami@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - 2017 OWASP Top Ten==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add support for multiple OWASP Top Ten versions, such as 2017 and 2010.&lt;br /&gt;
Currently RailsGoat supports only the 2013 version of OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that supports additional version(s) of OWASP Top Ten&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 305 [https://github.com/OWASP/railsgoat/issues/305] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sri Harsha Gajavalli [mailto:sriharsha.g15@iiits.in] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, Mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Capture-The-Flag RailsGoat Image Creation Automation==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Create automation to build a Capture-The-Flag competition (CTF) image (VM, ISO, etc) which contains everything needed, such as [Operating System, Rails Stack, RailsGoat], so RailsGoat can easily be used in more Capture-The-Flag competitions.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that automates the process of building RailsGoat CTF images.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 306 [https://github.com/OWASP/railsgoat/issues/306] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* Some background in creating VMs/ISOs would be helpful.&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Matt Robinson [mailto:brimstone@the.narro.ws] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat. Need to get permission from publisher. @jasnow got permission previously.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* More teaching RailsGoat examples based on &amp;quot;Security on Rails&amp;quot; book's lunchedin project.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 307 [https://github.com/OWASP/railsgoat/issues/307] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security&lt;br /&gt;
would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Add Devise Gem Support and Vulnerabilities to RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add Devise Support to RailsGoat along with adding Devise-related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* Using Devise gem inside RailsGoat plus Devise-related vulnerabilities.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 207 [https://github.com/OWASP/railsgoat/issues/207] and * Issue 243 [https://github.com/OWASP/railsgoat/issues/243] has more details.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Generic Idea==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
RailsGoat is a great framework for learning about OWASP Top 10 2013 using a vulnerable version of the Ruby on Rails (versions 3 to 5), as well as some &amp;quot;extras&amp;quot; that the initial project contributors felt worthwhile to share. This project is designed to educate both developers, as well as security professionals. Feel free to check out the [Railsgoat Github site](https://github.com/OWASP/railsgoat) for more details. If you have an idea that is not on this list then don't worry, you can still submit it.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that makes RailsGoat even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
=== Needs: ===&lt;br /&gt;
* Student Developers&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
*  [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=238720</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=238720"/>
				<updated>2018-03-19T13:19:02Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Added Backslash Powered Scanner section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Foundation has been selected as an organization to be part of the GOOGLE SUMMER CODE 2018''' &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
&lt;br /&gt;
We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
* Implementing new websocket specific scan rules&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
&lt;br /&gt;
It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* ZAP able to explore React applications more effectively&lt;br /&gt;
* ZAP able to attack React applications more effectively&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
&lt;br /&gt;
This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
* Extend ZAP's active scanner to leverage Backslash type scanning. (Including adapting some of the existing scan rules to leverage the new component.)&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
===== Note =====&lt;br /&gt;
This issue was previously undertaken, however, only partial progress was made. The [https://github.com/zaproxy/zap-extensions/pull/1014 Pull Request] is still open and can be built upon. &lt;br /&gt;
The 2018 effort needs to ensure the code builds and is successfully put to use in some of the existing scan rules and unit tests.&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is time consuming and error prone.&lt;br /&gt;
&lt;br /&gt;
Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Detect login and registration pages&lt;br /&gt;
* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
&lt;br /&gt;
For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A Bamboo addon that supports:&lt;br /&gt;
* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
* Active Scanning&lt;br /&gt;
* Authentication&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* &amp;lt;del&amp;gt;Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&amp;lt;/del&amp;gt; ([https://github.com/bkimminich/juice-shop/issues/315 #315] in progress)&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
== OWASP BLT (Bug Logging Tool) ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
BLT lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
Check OWASP WIKI PAGE [https://www.owasp.org/index.php/OWASP_Bug_Logging_Tool] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Fuse app to allow easy bug reporting from phone.&lt;br /&gt;
* BUG cryptocurrency rewarded for each bug reported - requires a way to verify bugs are valid and not duplicates&lt;br /&gt;
* Allow for companies to do private (paid) bug bounties&lt;br /&gt;
* allow for bug reporting via email &lt;br /&gt;
* build a referral program&lt;br /&gt;
* integrate an idea / suggestion feature&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Fusetools will be used for the app and C++ (Bitcoin based) or Ethereum will be used for the cryptocurrency part.&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on new features &lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP BLT&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sean Auriti [https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] &lt;br /&gt;
* Sourav Badami [https://www.owasp.org/index.php/User:Souravbadami Sourav Badami] [mailto:souravbadami@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - 2017 OWASP Top Ten==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add support for multiple OWASP Top Ten versions, such as 2017 and 2010.&lt;br /&gt;
Currently RailsGoat supports only the 2013 version of OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that supports additional version(s) of OWASP Top Ten&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 305 [https://github.com/OWASP/railsgoat/issues/305] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sri Harsha Gajavalli [mailto:sriharsha.g15@iiits.in] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, Mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Capture-The-Flag RailsGoat Image Creation Automation==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Create automation to build a Capture-The-Flag competition (CTF) image (VM, ISO, etc) which contains everything needed, such as [Operating System, Rails Stack, RailsGoat], so RailsGoat can easily be used in more Capture-The-Flag competitions.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that automates the process of building RailsGoat CTF images.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 306 [https://github.com/OWASP/railsgoat/issues/306] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* Some background in creating VMs/ISOs would be helpful.&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Matt Robinson [mailto:brimstone@the.narro.ws] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat. Need to get permission from publisher. @jasnow got permission previously.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* More teaching RailsGoat examples based on &amp;quot;Security on Rails&amp;quot; book's lunchedin project.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 307 [https://github.com/OWASP/railsgoat/issues/307] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security&lt;br /&gt;
would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Add Devise Gem Support and Vulnerabilities to RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add Devise Support to RailsGoat along with adding Devise-related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* Using Devise gem inside RailsGoat plus Devise-related vulnerabilities.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 207 [https://github.com/OWASP/railsgoat/issues/207] and * Issue 243 [https://github.com/OWASP/railsgoat/issues/243] has more details.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Generic Idea==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
RailsGoat is a great framework for learning about OWASP Top 10 2013 using a vulnerable version of the Ruby on Rails (versions 3 to 5), as well as some &amp;quot;extras&amp;quot; that the initial project contributors felt worthwhile to share. This project is designed to educate both developers, as well as security professionals. Feel free to check out the [Railsgoat Github site](https://github.com/OWASP/railsgoat) for more details. If you have an idea that is not on this list then don't worry, you can still submit it.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that makes RailsGoat even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
=== Needs: ===&lt;br /&gt;
* Student Developers&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
*  [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236539</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236539"/>
				<updated>2018-01-03T01:07:20Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Zest Text Representation and Parser===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== SAMPLE: OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2016 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
* Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you will be using Django to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication. We would like to see what's your idea on the matter.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the parts of the  sandbox engine it has access to.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Since this has been a popular project here's a suggestion on how to get started.&lt;br /&gt;
* Check the excellent work done by mebjas and a0xnirudh in their respective brances in the project's repository&lt;br /&gt;
* Take a brief look at the code and try to get a feeling of the functionality included. (Essentially it's CRUD operations on vms or containers)&lt;br /&gt;
* Read on what Docker and Vagrant are and take a look at their respective py-libraries&lt;br /&gt;
* If you think that contributing helps perhaps it would be a good idea to start with lettuce tests on the current CRUD operations of the existing functionality(which won't change and can eventually be ported to the final project) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, test driven development, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell'''&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
*Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
===Expected Results===&lt;br /&gt;
*Adding features to SKF project&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/369&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/367&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/68&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/95&lt;br /&gt;
*Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
*Adding/updating knowledge base items&lt;br /&gt;
*Adding CWE references to knowledgebase items&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/35&lt;br /&gt;
*Improve unit testing of the Angular quality, currently only 68% of the front-end is unit tested automated &lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/352&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
*For helping in the development of new features and functions  you need Python flask and for the frond-end we use Angular 4.0&lt;br /&gt;
*For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
*For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
*For writing the verification guide you need some penetration testing experience.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236538</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236538"/>
				<updated>2018-01-03T01:06:48Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Re-add hackademics specifics under the sample heading&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Zest Text Representation and Parser===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== SAMPLE: OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2016 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
* Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you will be using Django to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication. We would like to see what's your idea on the matter.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the parts of the  sandbox engine it has access to.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Since this has been a popular project here's a suggestion on how to get started.&lt;br /&gt;
* Check the excellent work done by mebjas and a0xnirudh in their respective brances in the project's repository&lt;br /&gt;
* Take a brief look at the code and try to get a feeling of the functionality included. (Essentially it's CRUD operations on vms or containers)&lt;br /&gt;
* Read on what Docker and Vagrant are and take a look at their respective py-libraries&lt;br /&gt;
* If you think that contributing helps perhaps it would be a good idea to start with lettuce tests on the current CRUD operations of the existing functionality(which won't change and can eventually be ported to the final project) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, test driven development, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge framework==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell'''&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
*Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
===Expected Results===&lt;br /&gt;
*Adding features to SKF project&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/369&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/367&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/68&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/95&lt;br /&gt;
*Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
*Adding/updating knowledge base items&lt;br /&gt;
*Adding CWE references to knowledgebase items&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/35&lt;br /&gt;
*Improve unit testing of the Angular quality, currently only 68% of the front-end is unit tested automated &lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/352&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
*For helping in the development of new features and functions  you need Python flask and for the frond-end we use Angular 4.0&lt;br /&gt;
*For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
*For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
*For writing the verification guide you need some penetration testing experience.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236537</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236537"/>
				<updated>2018-01-03T01:04:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Remove hackademics specifics from generic info section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Zest Text Representation and Parser===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== SAMPLE: OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2016 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you will be using Django to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication. We would like to see what's your idea on the matter.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the parts of the  sandbox engine it has access to.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Since this has been a popular project here's a suggestion on how to get started.&lt;br /&gt;
* Check the excellent work done by mebjas and a0xnirudh in their respective brances in the project's repository&lt;br /&gt;
* Take a brief look at the code and try to get a feeling of the functionality included. (Essentially it's CRUD operations on vms or containers)&lt;br /&gt;
* Read on what Docker and Vagrant are and take a look at their respective py-libraries&lt;br /&gt;
* If you think that contributing helps perhaps it would be a good idea to start with lettuce tests on the current CRUD operations of the existing functionality(which won't change and can eventually be ported to the final project) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, test driven development, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge framework==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell'''&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
*Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
===Expected Results===&lt;br /&gt;
*Adding features to SKF project&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/369&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/367&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/68&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/95&lt;br /&gt;
*Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
*Adding/updating knowledge base items&lt;br /&gt;
*Adding CWE references to knowledgebase items&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/35&lt;br /&gt;
*Improve unit testing of the Angular quality, currently only 68% of the front-end is unit tested automated &lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/352&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
*For helping in the development of new features and functions  you need Python flask and for the frond-end we use Angular 4.0&lt;br /&gt;
*For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
*For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
*For writing the verification guide you need some penetration testing experience.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236311</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236311"/>
				<updated>2017-12-18T14:57:42Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
'''''This content is currently a work in progress (as of Dec-2017)''''', complete mapping for the 2013 edition of the OWASP Top 10 can be found [https://www.owasp.org/index.php/ZAPpingTheTop10-2013 here].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2017 risks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available (based on the Top 10 - 2013 edition): [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A2-Broken_Authentication | A2 Broken Authentication]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control Testing]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A3-Sensitive_Data_Exposure | A3 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A4-XML_External_Entities_(XXE) | A4 XML External Entities (XXE)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Active scan rules [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A5-Broken_Access_Control | A5 Broken Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A6-Security_Misconfiguration | A6 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10-2017_A7-Cross-Site_Scripting_(XSS) | A7 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A8-Insecure_Deserialization | A8 Insecure Deserialization]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; TBD &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; TBD &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A10-Insufficient_Logging%26Monitoring | A10 Insufficient Logging &amp;amp; Monitoring]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; TBD &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; TBD &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236310</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236310"/>
				<updated>2017-12-18T14:57:14Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Updated for 2017 - Initial cut&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
'''''This content is currently a work in progress (as of Dec-2017), complete mapping for the 2013 edition of the OWASP Top 10 can be found [https://www.owasp.org/index.php/ZAPpingTheTop10-2013 here].'''''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2017 risks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available (based on the Top 10 - 2013 edition): [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A2-Broken_Authentication | A2 Broken Authentication]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control Testing]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A3-Sensitive_Data_Exposure | A3 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A4-XML_External_Entities_(XXE) | A4 XML External Entities (XXE)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automatic &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Active scan rules [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A5-Broken_Access_Control | A5 Broken Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A6-Security_Misconfiguration | A6 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10-2017_A7-Cross-Site_Scripting_(XSS) | A7 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A8-Insecure_Deserialization | A8 Insecure Deserialization]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; TBD &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; TBD &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10-2017_A10-Insufficient_Logging%26Monitoring | A10 Insufficient Logging &amp;amp; Monitoring]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; TBD &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; TBD &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236309</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236309"/>
				<updated>2017-12-18T14:31:50Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2017 risks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available (based on the Top 10 - 2013 edition): [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsParams Params tab] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A7 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSites#Generate_anti_CSRF_test_form Generate Anti CSRF Test Form] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236308</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236308"/>
				<updated>2017-12-18T14:27:38Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2013 risks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available: [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Intercepting proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsParams Params tab] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A7 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSites#Generate_anti_CSRF_test_form Generate Anti CSRF Test Form] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236307</id>
		<title>ZAPpingTheTop10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10&amp;diff=236307"/>
				<updated>2017-12-18T14:25:16Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Rick.mitchell moved page ZAPpingTheTop10 to ZAPpingTheTop10-2013: Prep for 2017 update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[ZAPpingTheTop10-2013]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10-2013&amp;diff=236306</id>
		<title>ZAPpingTheTop10-2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10-2013&amp;diff=236306"/>
				<updated>2017-12-18T14:25:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Rick.mitchell moved page ZAPpingTheTop10 to ZAPpingTheTop10-2013: Prep for 2017 update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2013 risks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available: [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Intercepting proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsParams Params tab] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A7 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSites#Generate_anti_CSRF_test_form Generate Anti CSRF Test Form] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Zed_Attack_Proxy_Project/Pages/News&amp;diff=236105</id>
		<title>Projects/OWASP Zed Attack Proxy Project/Pages/News</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Zed_Attack_Proxy_Project/Pages/News&amp;diff=236105"/>
				<updated>2017-12-09T11:31:29Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: 2.7 updates and toolswatch info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Latest News:'''&lt;br /&gt;
&lt;br /&gt;
* 2017/11/28 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_7_0 2.7.0] released&lt;br /&gt;
* 2017/03/29 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_6_0 2.6.0] released&lt;br /&gt;
* 2017/02/11 ZAP came second in the [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ Top Security Tools of 2016 as voted by ToolsWatch.org readers]&lt;br /&gt;
* 2016/06/03 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_5_0 2.5.0] released&lt;br /&gt;
* 2016/05/26 ZAP [https://bugcrowd.com/owaspzap bug bounty program] launched&lt;br /&gt;
* 2016/02/23 ZAP declared the [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ Top Security Tool of 2015 as voted by ToolsWatch.org readers]&lt;br /&gt;
* 2016/02/19 ZAP [http://zaproxy.blogspot.com/2016/02/zap-newsletter-2016-february.html February newsletter] published&lt;br /&gt;
* 2016/01/04 ZAP [http://zaproxy.blogspot.com/2016/01/zap-newsletter-2016-january.html January newsletter] published&lt;br /&gt;
* 2015/12/15 ZAP [http://zaproxy.blogspot.co.uk/2015/12/zap-newsletter-2015-december.html December newsletter] published&lt;br /&gt;
* 2015/12/04 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_4_3 2.4.3] released&lt;br /&gt;
* 2015/11/02 ZAP [http://zaproxy.blogspot.co.uk/2015/11/zap-newsletter-2015-november.html November newsletter] published&lt;br /&gt;
* 2015/09/07 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_4_2 2.4.2] released&lt;br /&gt;
* 2015/07/31 ZAP [https://www.owasp.org/index.php/2015-08-ZAP-ScriptingCompetition Scripting Competition] launched&lt;br /&gt;
* 2015/07/30 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_4_1 2.4.1] released&lt;br /&gt;
* 2015/05/05 ZAP featured in the [http://assets.thoughtworks.com/assets/technology-radar-may-2015-en.pdf ThoughtWorks Technology Radar]&lt;br /&gt;
* 2015/04/14 Version [http://owasp.blogspot.co.uk/2015/04/owasp-zap-240.html 2.4.0] released&lt;br /&gt;
* 2015/01/14 ZAP came second in the [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ Top Security Tools of 2014 as voted by ToolsWatch.org readers]&lt;br /&gt;
* 2015/01/02 ZAP [https://github.com/zaproxy/community-scripts Community Scripts] repo launched&lt;br /&gt;
* 2014/05/21 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_3_1 2.3.1] released&lt;br /&gt;
* 2014/04/10 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_3_0 2.3.0] released&lt;br /&gt;
* 2014/03/10 Hacking ZAP blog post series started: http://zaproxy.blogspot.co.uk/2014/03/hacking-zap-1-why-should-you.html&lt;br /&gt;
* 2014/02/17 ZAP included as one of the [https://sourceforge.net/blog/projects-of-the-week-february-17-2014/ SourceForge projects of the week]&lt;br /&gt;
* 2013/12/20 ZAP declared the [https://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top Security Tool of 2013 as voted by ToolsWatch.org readers]&lt;br /&gt;
* 2013/11/04 [https://github.com/zaproxy/zap-core-help/wiki/ZapEvangelists ZAP Evangelists] initiative launched&lt;br /&gt;
* 2013/10/29 Simon won Best Project Leader [https://www.owasp.org/index.php/WASPY_Awards_2013 WASPY Award]&lt;br /&gt;
* 2013/09/27 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_2_2 2.2.2] released&lt;br /&gt;
* 2013/09/11 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_2_0 2.2.0] released&lt;br /&gt;
* 2013/07/29 New language file including support for Bosnian&lt;br /&gt;
* 2013/06/17 ZAP user questionnaire launched, now in both [https://docs.google.com/forms/d/1lUPTYHe9CS5tropNStoRK9jVeZ7tWRywhBHDIZjE4cA/viewform English] and [https://docs.google.com/forms/d/1xAKE3TCOaBrmFnyAVUr6NdTd3mKvu7g_uGriOcS2Ka4/viewform Spanish]&lt;br /&gt;
* 2013/06/05 ZAP questions can now be asked on [https://irc.lc/mozilla/websectools/zapuser??? irc]&lt;br /&gt;
* 2013/05/10 5 ZAP related projects accepted for [https://github.com/zaproxy/zap-core-help/wiki/GSoC2013 Google Summer of Code]&lt;br /&gt;
* 2013/04/18 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_1_0 2.1.0] released&lt;br /&gt;
* 2013/01/30 Version [http://owasp.blogspot.co.uk/2013/01/owasp-zed-attack-proxy-v-200.html 2.0.0] released&lt;br /&gt;
* 2012/11/27 Started a new [http://code.google.com/p/zaproxy-test/ zaproxy-test] project of unit and integrations tests&lt;br /&gt;
* 2012/10/29 Adopted [http://crowdin.net/project/owasp-zap Crowdin] for translations&lt;br /&gt;
* 2012/10/22 Started generating [https://github.com/zaproxy/zap-core-help/wiki/WeeklyReleases weekly releases]&lt;br /&gt;
* 2012/10/12 ZAP Overview tutorial [http://www.youtube.com/watch?v=eH0RBI0nmww video] published&lt;br /&gt;
* 2012/09/18 [http://www.cafepress.com/zaproxy ZAP Gear Store] goes live&lt;br /&gt;
* 2012/08/05 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases1_4_1 1.4.1] released&lt;br /&gt;
* 2012/07/08 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases1_4_0 1.4.0.1] downloaded over 15,000 times&lt;br /&gt;
* 2012/07/05 [https://github.com/zaproxy/zap-core-help/wiki/ApiPython Python API] released&lt;br /&gt;
* 2012/06/15 ZAP accepted for the [[Projects_Reboot_2012|OWASP Project Reboot]]&lt;br /&gt;
* 2012/06/13 Using ZAP for Security Regression tests [http://www.youtube.com/watch?v=ZWSLFHpg1So video] published&lt;br /&gt;
* 2012/06/04 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases1_4_0 1.4.0.1] downloaded over 10,000 times&lt;br /&gt;
* 2012/05/28 Simon's Introduction to ZAP talk at App Sec USA becomes the most watched OWASP video on [http://vimeo.com/owasp/videos/sort:plays vimeo]&lt;br /&gt;
* 2012/04/23 3 ZAP related [https://github.com/zaproxy/zap-core-help/wiki/GSoC2012 Google Summer of Code 2012] projects accepted. To find out how these are progressing please see their [https://github.com/zaproxy/zap-core-help/wiki/GSoC2012 wiki pages].&lt;br /&gt;
* 2012/04/23 OWASP ZAP [https://github.com/zaproxy/zap-core-help/wiki/SmartCards SmartCard Project] officially launched.&lt;br /&gt;
* 2012/04/08 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases1_4_0 1.4.0.1] released&lt;br /&gt;
* 2012/02/10 Version [https://github.com/zaproxy/zap-core-help/wiki/HelpReleases1_3_4 1.3.4] downloaded over 10,000 times&lt;br /&gt;
* 2012/02/01 OWASP ZAP is named the [http://holisticinfosec.blogspot.com/2012/02/2011-toolsmith-tool-of-year-owasp-zap.html Toolsmith Tool of the Year for 2011!]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=235830</id>
		<title>OWASP Zed Attack Proxy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=235830"/>
				<updated>2017-11-28T18:46:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Release info updated&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{{ReviewProject|projectname=zaproxy|language=en}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers[[#Justification|*]]. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.&lt;br /&gt;
&lt;br /&gt;
====ZAP 2.7.0 is now available!====&lt;br /&gt;
&lt;br /&gt;
[[Image:ZAP-Download.png | link=https://github.com/zaproxy/zaproxy/wiki/Downloads]]&lt;br /&gt;
&lt;br /&gt;
====Please help us to make ZAP even better for you by answering the [https://docs.google.com/forms/d/1-k-vcj_sSxlil6XLxCFade-m-IQVeE2h9gduA-2ZPPA/viewform ZAP User Questionnaire]!====&lt;br /&gt;
&lt;br /&gt;
For a quick overview of ZAP and an introduction to the [https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin official ZAP Jenkins plugin] see these tutorial videos on YouTube:&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|eH0RBI0nmww}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|mmHZLSffCUg}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more videos see the links on the [https://github.com/zaproxy/zaproxy/wiki/Videos wiki videos page].&lt;br /&gt;
&lt;br /&gt;
Interested in a ZAP talk or training event? See the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#tab=Talks talks] tab. Not one near you? Contact a [https://github.com/zaproxy/zaproxy/wiki/ZapEvangelists Zap Evangelist] to arrange one!&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=Zed Attack Proxy&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
For general information about ZAP:&lt;br /&gt;
* [https://twitter.com/zaproxy Twitter] - official ZAP announcements (low volume)&lt;br /&gt;
* [https://zaproxy.blogspot.co.uk/ Blog] - official ZAP blog&lt;br /&gt;
&lt;br /&gt;
For help using ZAP:&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/releases/download/2.6.0/ZAPGettingStartedGuide-2.6.pdf Getting Started Guide (pdf)] - an introductory guide you can print&lt;br /&gt;
* [https://www.youtube.com/playlist?list=PLEBitBW-Hlsv8cEIUntAO8st2UGhmrjUB Tutorial Videos]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki User Guide] - online version of the User Guide included with ZAP&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-users User Group] - ask questions about using ZAP&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Add-ons] - help for the optional add-ons you can install&lt;br /&gt;
* [https://stackoverflow.com/questions/tagged/zap StackOverflow] - because some people use this for all everything ;)&lt;br /&gt;
&lt;br /&gt;
To learn more about ZAP development:&lt;br /&gt;
* [https://github.com/zaproxy Source Code] - for all of the ZAP related projects&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/wiki/Introduction Wiki] - lots of detailed info&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-develop Developer Group] - ask questions about the ZAP internals&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap Crowdin (GUI)] - help translate the ZAP GUI&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help Crowdin (User Guide)] - help translate the ZAP User Guide&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy OpenHub]	- FOSS analytics&lt;br /&gt;
* [https://www.bountysource.com/teams/zap/issues BountySource] - Vote on ZAP issues (you can also donate money here, but 10% taken out)&lt;br /&gt;
&lt;br /&gt;
===Justification===&lt;br /&gt;
Justification for the statements made in the tagline at the top;)&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
* ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2016 [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2013 [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy Code Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap ZAP core i18n Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help ZAP help i18n Contributors]&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zaproxy/zaproxy/wiki/Downloads Download OWASP ZAP!]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#News News] and [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
== Change Log ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/commits/develop zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/commits/master zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Code Repo ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/ zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/ zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
Questions? Please ask on the [http://groups.google.com/group/zaproxy-users ZAP User Group]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
Co-Project Leaders&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Ricardo.Pereira Ricardo Pereira] [mailto:ricardo.pereira@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Rick.mitchell Rick Mitchell] [mailto:rick.mitchell@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project OWASP WTE]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.openhub.net/p/zaproxy&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0 Apache 2 License]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotAddAlert.png|||400px|ZAP Add Alert Screen Shot]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHelp.png||400px|left|ZAP Help Screen Shot]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHistoryFilter.png|thumb|400px|left|ZAP History Filter Screen Shot]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotSearchTab.png|thumb|400px|left|ZAP Search Tab Screen Shot]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/Talks | Talks}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= News =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/News | News}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= ZAP Gear =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Yes, you can now buy ZAP related gear!&lt;br /&gt;
&lt;br /&gt;
All of the artwork for ZAP swag is released under the Creative Common License and can be downloaded from the [https://github.com/zaproxy/zap-swag zap-swag] repo.&lt;br /&gt;
&lt;br /&gt;
You can of course use the artwork from this repo with any other online store that you like.&lt;br /&gt;
&lt;br /&gt;
A range of products can be purchased from [http://www.redbubble.com/people/zaproxy Redbubble]&lt;br /&gt;
&lt;br /&gt;
Stickers can be purchased from [https://www.stickermule.com/uk/user/1070684077/stickers Stickermule]&lt;br /&gt;
&lt;br /&gt;
T-shirts can be purchased from [http://www.cafepress.com/zaproxy Cafepress]&lt;br /&gt;
&lt;br /&gt;
[[Image:zap-tshirt-cp.PNG | link=http://www.cafepress.com/zaproxy]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Supporters =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ZAP is developed by a worldwide [https://github.com/zaproxy/zap-core-help/wiki/HelpCredits team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:&lt;br /&gt;
&lt;br /&gt;
* [http://www.mozilla.org Mozilla]&lt;br /&gt;
* [http://www.linuxfoundation.org/ The Linux Foundation]&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.sage.co.uk Sage]&lt;br /&gt;
* [http://www.google.com Google]&lt;br /&gt;
* [http://www.microsoft.com Microsoft]&lt;br /&gt;
* [http://www.hacktics.com/ Hacktics, Ernst &amp;amp; Young]&lt;br /&gt;
* [http://www.dinosec.com/ DinoSec]&lt;br /&gt;
* [http://www.denimgroup.com Denim Group]&lt;br /&gt;
* [http://www.aspectsecurity.com/ Aspect Security]&lt;br /&gt;
* [http://secureideas.net SecureIdeas]&lt;br /&gt;
* [http://utilisec.com UtiliSec]&lt;br /&gt;
* [http://www.encription.co.uk/ encription]&lt;br /&gt;
* [https://www.accenture.com/us-en/digital-index.aspx Accenture Digital]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Functionality =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's functionality:'''&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle Proxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Traditional] and AJAX spiders&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Automated scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsBruteforce Forced browsing]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/SmartCards Smartcard and Client Digital Certificates support]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsWebsocketIntroduction Web sockets] support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Support for a wide range of scripting languages]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki//HelpAddonsPlugnhackPlugnhack Plug-n-Hack support]&lt;br /&gt;
* Authentication and session support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsApi Powerful REST based API]&lt;br /&gt;
* Automatic updating option&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Integrated and growing marketplace of add-ons]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Features =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's features:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]&lt;br /&gt;
* Cross platform (it even runs on a [https://github.com/zaproxy/zaproxy/wiki/zappi Raspberry Pi!])&lt;br /&gt;
* Easy to install (using a [https://www.ej-technologies.com/products/install4j/overview.html multi-platform installer builder])&lt;br /&gt;
* Completely free (no paid for 'Pro' version)&lt;br /&gt;
* Ease of use a priority&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpIntro Comprehensive help pages]&lt;br /&gt;
* Fully internationalized&lt;br /&gt;
* Translated into over 20 languages&lt;br /&gt;
* Community based, with involvement actively encouraged&lt;br /&gt;
* Under active development by an international team of volunteers&lt;br /&gt;
&lt;br /&gt;
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Languages =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ZAP supports the following languages:'''&lt;br /&gt;
&lt;br /&gt;
* English&lt;br /&gt;
* Arabic&lt;br /&gt;
* Bosnian&lt;br /&gt;
* Brazilian Portuguese&lt;br /&gt;
* Chinese&lt;br /&gt;
* Danish&lt;br /&gt;
* Filipino&lt;br /&gt;
* French&lt;br /&gt;
* German&lt;br /&gt;
* Greek&lt;br /&gt;
* Hungarian&lt;br /&gt;
* Indonesian&lt;br /&gt;
* Italian&lt;br /&gt;
* Japanese&lt;br /&gt;
* Korean&lt;br /&gt;
* Persian&lt;br /&gt;
* Polish&lt;br /&gt;
* Russian&lt;br /&gt;
* Sinhala&lt;br /&gt;
* Spanish&lt;br /&gt;
* Urdu &lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to help improve these translations or add new ones right now!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Release 2.6.0==&lt;br /&gt;
ZAP 2.6.0 has been released, this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_6_0&lt;br /&gt;
&lt;br /&gt;
==Release 2.7.0==&lt;br /&gt;
ZAP 2.7.0 has been released (Nov 2017), this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_7_0&lt;br /&gt;
&lt;br /&gt;
It requires Java 8 (minimum) and supports Selenium 3.&lt;br /&gt;
&lt;br /&gt;
==Release 2.8.0==&lt;br /&gt;
ZAP 2.8.0 does not yet have a planned release date, but is likely to be around the beginning of 2018 or (more likely) the middle of 2018.&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of ZAP is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Feature Requests==&lt;br /&gt;
&lt;br /&gt;
Please raise new feature requests as enhancement requests here: https://github.com/zaproxy/zaproxy/issues&lt;br /&gt;
&lt;br /&gt;
If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use the [http://groups.google.com/group/zaproxy-users zaproxy-users Google Group] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What features could be made easier to use?&lt;br /&gt;
* How could the help pages be improved? &lt;br /&gt;
&lt;br /&gt;
==Log issues==&lt;br /&gt;
&lt;br /&gt;
Have you had a problem using ZAP?&lt;br /&gt;
&lt;br /&gt;
If so and its not already been logged then please [https://github.com/zaproxy/zaproxy/issues report it]&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
&lt;br /&gt;
Are you fluent in another language? Can you help translate ZAP into that language?&lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to do that!&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
If you fancy having a go at adding functionality to ZAP then please get in touch via the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group].&lt;br /&gt;
&lt;br /&gt;
Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!&lt;br /&gt;
&lt;br /&gt;
If you actively contribute to ZAP then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|Zed Attack Proxy Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool|OWASP Release Quality Tool]]&lt;br /&gt;
[[Category:OWASP_Download]]&lt;br /&gt;
[[Category:Popular]]&lt;br /&gt;
[[Category:SAMM-ST-2]]&lt;br /&gt;
[[Category:Flagship Projects|Zap]]&lt;br /&gt;
[[Category:OWASP Zed Attack Proxy|Zap]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=235829</id>
		<title>OWASP Zed Attack Proxy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=235829"/>
				<updated>2017-11-28T18:45:01Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Updated release info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{{ReviewProject|projectname=zaproxy|language=en}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers[[#Justification|*]]. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.&lt;br /&gt;
&lt;br /&gt;
====ZAP 2.7.0 is now available!====&lt;br /&gt;
&lt;br /&gt;
[[Image:ZAP-Download.png | link=https://github.com/zaproxy/zaproxy/wiki/Downloads]]&lt;br /&gt;
&lt;br /&gt;
====Please help us to make ZAP even better for you by answering the [https://docs.google.com/forms/d/1-k-vcj_sSxlil6XLxCFade-m-IQVeE2h9gduA-2ZPPA/viewform ZAP User Questionnaire]!====&lt;br /&gt;
&lt;br /&gt;
For a quick overview of ZAP and an introduction to the [https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin official ZAP Jenkins plugin] see these tutorial videos on YouTube:&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|eH0RBI0nmww}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|mmHZLSffCUg}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more videos see the links on the [https://github.com/zaproxy/zaproxy/wiki/Videos wiki videos page].&lt;br /&gt;
&lt;br /&gt;
Interested in a ZAP talk or training event? See the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#tab=Talks talks] tab. Not one near you? Contact a [https://github.com/zaproxy/zaproxy/wiki/ZapEvangelists Zap Evangelist] to arrange one!&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=Zed Attack Proxy&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
For general information about ZAP:&lt;br /&gt;
* [https://twitter.com/zaproxy Twitter] - official ZAP announcements (low volume)&lt;br /&gt;
* [https://zaproxy.blogspot.co.uk/ Blog] - official ZAP blog&lt;br /&gt;
&lt;br /&gt;
For help using ZAP:&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/releases/download/2.6.0/ZAPGettingStartedGuide-2.6.pdf Getting Started Guide (pdf)] - an introductory guide you can print&lt;br /&gt;
* [https://www.youtube.com/playlist?list=PLEBitBW-Hlsv8cEIUntAO8st2UGhmrjUB Tutorial Videos]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki User Guide] - online version of the User Guide included with ZAP&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-users User Group] - ask questions about using ZAP&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Add-ons] - help for the optional add-ons you can install&lt;br /&gt;
* [https://stackoverflow.com/questions/tagged/zap StackOverflow] - because some people use this for all everything ;)&lt;br /&gt;
&lt;br /&gt;
To learn more about ZAP development:&lt;br /&gt;
* [https://github.com/zaproxy Source Code] - for all of the ZAP related projects&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/wiki/Introduction Wiki] - lots of detailed info&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-develop Developer Group] - ask questions about the ZAP internals&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap Crowdin (GUI)] - help translate the ZAP GUI&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help Crowdin (User Guide)] - help translate the ZAP User Guide&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy OpenHub]	- FOSS analytics&lt;br /&gt;
* [https://www.bountysource.com/teams/zap/issues BountySource] - Vote on ZAP issues (you can also donate money here, but 10% taken out)&lt;br /&gt;
&lt;br /&gt;
===Justification===&lt;br /&gt;
Justification for the statements made in the tagline at the top;)&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
* ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2016 [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2013 [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy Code Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap ZAP core i18n Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help ZAP help i18n Contributors]&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zaproxy/zaproxy/wiki/Downloads Download OWASP ZAP!]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#News News] and [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
== Change Log ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/commits/develop zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/commits/master zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Code Repo ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/ zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/ zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
Questions? Please ask on the [http://groups.google.com/group/zaproxy-users ZAP User Group]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
Co-Project Leaders&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Ricardo.Pereira Ricardo Pereira] [mailto:ricardo.pereira@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Rick.mitchell Rick Mitchell] [mailto:rick.mitchell@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project OWASP WTE]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.openhub.net/p/zaproxy&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0 Apache 2 License]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotAddAlert.png|||400px|ZAP Add Alert Screen Shot]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHelp.png||400px|left|ZAP Help Screen Shot]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHistoryFilter.png|thumb|400px|left|ZAP History Filter Screen Shot]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotSearchTab.png|thumb|400px|left|ZAP Search Tab Screen Shot]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/Talks | Talks}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= News =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/News | News}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= ZAP Gear =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Yes, you can now buy ZAP related gear!&lt;br /&gt;
&lt;br /&gt;
All of the artwork for ZAP swag is released under the Creative Common License and can be downloaded from the [https://github.com/zaproxy/zap-swag zap-swag] repo.&lt;br /&gt;
&lt;br /&gt;
You can of course use the artwork from this repo with any other online store that you like.&lt;br /&gt;
&lt;br /&gt;
A range of products can be purchased from [http://www.redbubble.com/people/zaproxy Redbubble]&lt;br /&gt;
&lt;br /&gt;
Stickers can be purchased from [https://www.stickermule.com/uk/user/1070684077/stickers Stickermule]&lt;br /&gt;
&lt;br /&gt;
T-shirts can be purchased from [http://www.cafepress.com/zaproxy Cafepress]&lt;br /&gt;
&lt;br /&gt;
[[Image:zap-tshirt-cp.PNG | link=http://www.cafepress.com/zaproxy]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Supporters =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ZAP is developed by a worldwide [https://github.com/zaproxy/zap-core-help/wiki/HelpCredits team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:&lt;br /&gt;
&lt;br /&gt;
* [http://www.mozilla.org Mozilla]&lt;br /&gt;
* [http://www.linuxfoundation.org/ The Linux Foundation]&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.sage.co.uk Sage]&lt;br /&gt;
* [http://www.google.com Google]&lt;br /&gt;
* [http://www.microsoft.com Microsoft]&lt;br /&gt;
* [http://www.hacktics.com/ Hacktics, Ernst &amp;amp; Young]&lt;br /&gt;
* [http://www.dinosec.com/ DinoSec]&lt;br /&gt;
* [http://www.denimgroup.com Denim Group]&lt;br /&gt;
* [http://www.aspectsecurity.com/ Aspect Security]&lt;br /&gt;
* [http://secureideas.net SecureIdeas]&lt;br /&gt;
* [http://utilisec.com UtiliSec]&lt;br /&gt;
* [http://www.encription.co.uk/ encription]&lt;br /&gt;
* [https://www.accenture.com/us-en/digital-index.aspx Accenture Digital]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Functionality =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's functionality:'''&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle Proxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Traditional] and AJAX spiders&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Automated scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsBruteforce Forced browsing]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/SmartCards Smartcard and Client Digital Certificates support]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsWebsocketIntroduction Web sockets] support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Support for a wide range of scripting languages]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki//HelpAddonsPlugnhackPlugnhack Plug-n-Hack support]&lt;br /&gt;
* Authentication and session support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsApi Powerful REST based API]&lt;br /&gt;
* Automatic updating option&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Integrated and growing marketplace of add-ons]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Features =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's features:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]&lt;br /&gt;
* Cross platform (it even runs on a [https://github.com/zaproxy/zaproxy/wiki/zappi Raspberry Pi!])&lt;br /&gt;
* Easy to install (using a [https://www.ej-technologies.com/products/install4j/overview.html multi-platform installer builder])&lt;br /&gt;
* Completely free (no paid for 'Pro' version)&lt;br /&gt;
* Ease of use a priority&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpIntro Comprehensive help pages]&lt;br /&gt;
* Fully internationalized&lt;br /&gt;
* Translated into over 20 languages&lt;br /&gt;
* Community based, with involvement actively encouraged&lt;br /&gt;
* Under active development by an international team of volunteers&lt;br /&gt;
&lt;br /&gt;
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Languages =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ZAP supports the following languages:'''&lt;br /&gt;
&lt;br /&gt;
* English&lt;br /&gt;
* Arabic&lt;br /&gt;
* Bosnian&lt;br /&gt;
* Brazilian Portuguese&lt;br /&gt;
* Chinese&lt;br /&gt;
* Danish&lt;br /&gt;
* Filipino&lt;br /&gt;
* French&lt;br /&gt;
* German&lt;br /&gt;
* Greek&lt;br /&gt;
* Hungarian&lt;br /&gt;
* Indonesian&lt;br /&gt;
* Italian&lt;br /&gt;
* Japanese&lt;br /&gt;
* Korean&lt;br /&gt;
* Persian&lt;br /&gt;
* Polish&lt;br /&gt;
* Russian&lt;br /&gt;
* Sinhala&lt;br /&gt;
* Spanish&lt;br /&gt;
* Urdu &lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to help improve these translations or add new ones right now!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Release 2.6.0==&lt;br /&gt;
ZAP 2.6.0 has been released, this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_6_0&lt;br /&gt;
&lt;br /&gt;
==Release 2.7.0==&lt;br /&gt;
ZAP 2.7.0 has been released (Nov 2017), this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_7_0&lt;br /&gt;
&lt;br /&gt;
It requires Java 8 (minimum) and supports Selenium 3.&lt;br /&gt;
&lt;br /&gt;
==Release 2.8.0==&lt;br /&gt;
ZAP 2.8.0 does not yet have a planned release date, but is likely to be around the end of 2017 or (more likely) the beginning of 2018.&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of ZAP is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Feature Requests==&lt;br /&gt;
&lt;br /&gt;
Please raise new feature requests as enhancement requests here: https://github.com/zaproxy/zaproxy/issues&lt;br /&gt;
&lt;br /&gt;
If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use the [http://groups.google.com/group/zaproxy-users zaproxy-users Google Group] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What features could be made easier to use?&lt;br /&gt;
* How could the help pages be improved? &lt;br /&gt;
&lt;br /&gt;
==Log issues==&lt;br /&gt;
&lt;br /&gt;
Have you had a problem using ZAP?&lt;br /&gt;
&lt;br /&gt;
If so and its not already been logged then please [https://github.com/zaproxy/zaproxy/issues report it]&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
&lt;br /&gt;
Are you fluent in another language? Can you help translate ZAP into that language?&lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to do that!&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
If you fancy having a go at adding functionality to ZAP then please get in touch via the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group].&lt;br /&gt;
&lt;br /&gt;
Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!&lt;br /&gt;
&lt;br /&gt;
If you actively contribute to ZAP then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|Zed Attack Proxy Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool|OWASP Release Quality Tool]]&lt;br /&gt;
[[Category:OWASP_Download]]&lt;br /&gt;
[[Category:Popular]]&lt;br /&gt;
[[Category:SAMM-ST-2]]&lt;br /&gt;
[[Category:Flagship Projects|Zap]]&lt;br /&gt;
[[Category:OWASP Zed Attack Proxy|Zap]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Zed_Attack_Proxy_Project/Pages/Talks&amp;diff=235401</id>
		<title>Projects/OWASP Zed Attack Proxy Project/Pages/Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Zed_Attack_Proxy_Project/Pages/Talks&amp;diff=235401"/>
				<updated>2017-11-14T01:55:20Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Remove frequency reference&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Upcoming Talks/Training:'''&lt;br /&gt;
&lt;br /&gt;
For details of upcoming ZAP related talks or training please see the latest [https://github.com/zaproxy/zaproxy/wiki/Newsletters ZAP Newsletter]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=235400</id>
		<title>OWASP Zed Attack Proxy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=235400"/>
				<updated>2017-11-14T01:52:42Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Minor terminology tweak (per issue 3980) and a typo correction&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{{ReviewProject|projectname=zaproxy|language=en}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers[[#Justification|*]]. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.&lt;br /&gt;
&lt;br /&gt;
====ZAP 2.6.0 is now available and includes important security fixes. Please update asap!====&lt;br /&gt;
&lt;br /&gt;
[[Image:ZAP-Download.png | link=https://github.com/zaproxy/zaproxy/wiki/Downloads]]&lt;br /&gt;
&lt;br /&gt;
====Please help us to make ZAP even better for you by answering the [https://docs.google.com/forms/d/1-k-vcj_sSxlil6XLxCFade-m-IQVeE2h9gduA-2ZPPA/viewform ZAP User Questionnaire]!====&lt;br /&gt;
&lt;br /&gt;
For a quick overview of ZAP and an introduction to the [https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin official ZAP Jenkins plugin] see these tutorial videos on YouTube:&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|eH0RBI0nmww}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|mmHZLSffCUg}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more videos see the links on the [https://github.com/zaproxy/zaproxy/wiki/Videos wiki videos page].&lt;br /&gt;
&lt;br /&gt;
Interested in a ZAP talk or training event? See the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#tab=Talks talks] tab. Not one near you? Contact a [https://github.com/zaproxy/zaproxy/wiki/ZapEvangelists Zap Evangelist] to arrange one!&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=Zed Attack Proxy&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
For general information about ZAP:&lt;br /&gt;
* [https://twitter.com/zaproxy Twitter] - official ZAP announcements (low volume)&lt;br /&gt;
* [https://zaproxy.blogspot.co.uk/ Blog] - official ZAP blog&lt;br /&gt;
&lt;br /&gt;
For help using ZAP:&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/releases/download/2.6.0/ZAPGettingStartedGuide-2.6.pdf Getting Started Guide (pdf)] - an introductory guide you can print&lt;br /&gt;
* [https://www.youtube.com/playlist?list=PLEBitBW-Hlsv8cEIUntAO8st2UGhmrjUB Tutorial Videos]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki User Guide] - online version of the User Guide included with ZAP&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-users User Group] - ask questions about using ZAP&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Add-ons] - help for the optional add-ons you can install&lt;br /&gt;
* [https://stackoverflow.com/questions/tagged/zap StackOverflow] - because some people use this for all everything ;)&lt;br /&gt;
&lt;br /&gt;
To learn more about ZAP development:&lt;br /&gt;
* [https://github.com/zaproxy Source Code] - for all of the ZAP related projects&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/wiki/Introduction Wiki] - lots of detailed info&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-develop Developer Group] - ask questions about the ZAP internals&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap Crowdin (GUI)] - help translate the ZAP GUI&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help Crowdin (User Guide)] - help translate the ZAP User Guide&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy OpenHub]	- FOSS analytics&lt;br /&gt;
* [https://www.bountysource.com/teams/zap/issues BountySource] - Vote on ZAP issues (you can also donate money here, but 10% taken out)&lt;br /&gt;
&lt;br /&gt;
===Justification===&lt;br /&gt;
Justification for the statements made in the tagline at the top;)&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
* ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2016 [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2013 [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy Code Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap ZAP core i18n Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help ZAP help i18n Contributors]&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zaproxy/zaproxy/wiki/Downloads Download OWASP ZAP!]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#News News] and [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
== Change Log ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/commits/develop zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/commits/master zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Code Repo ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/ zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/ zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
Questions? Please ask on the [http://groups.google.com/group/zaproxy-users ZAP User Group]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader&amp;lt;br /&amp;gt;[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
Co-Project Leaders&amp;lt;br /&amp;gt;&lt;br /&gt;
Ricardo Pereira&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/User:Rick.mitchell Rick Mitchell] [mailto:kingthorin@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project OWASP WTE]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.openhub.net/p/zaproxy&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;center&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.apache.org/licenses/LICENSE-2.0 Apache 2 License]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotAddAlert.png|||400px|ZAP Add Alert Screen Shot]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHelp.png||400px|left|ZAP Help Screen Shot]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHistoryFilter.png|thumb|400px|left|ZAP History Filter Screen Shot]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotSearchTab.png|thumb|400px|left|ZAP Search Tab Screen Shot]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/Talks | Talks}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= News =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/News | News}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= ZAP Gear =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Yes, you can now buy ZAP related gear!&lt;br /&gt;
&lt;br /&gt;
All of the artwork for ZAP swag is released under the Creative Common License and can be downloaded from the [https://github.com/zaproxy/zap-swag zap-swag] repo.&lt;br /&gt;
&lt;br /&gt;
You can of course use the artwork from this repo with any other online store that you like.&lt;br /&gt;
&lt;br /&gt;
A range of products can be purchased from [http://www.redbubble.com/people/zaproxy Redbubble]&lt;br /&gt;
&lt;br /&gt;
Stickers can be purchased from [https://www.stickermule.com/uk/user/1070684077/stickers Stickermule]&lt;br /&gt;
&lt;br /&gt;
T-shirts can be purchased from [http://www.cafepress.com/zaproxy Cafepress]&lt;br /&gt;
&lt;br /&gt;
[[Image:zap-tshirt-cp.PNG | link=http://www.cafepress.com/zaproxy]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Supporters =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ZAP is developed by a worldwide [https://github.com/zaproxy/zap-core-help/wiki/HelpCredits team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:&lt;br /&gt;
&lt;br /&gt;
* [http://www.mozilla.org Mozilla]&lt;br /&gt;
* [http://www.linuxfoundation.org/ The Linux Foundation]&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.sage.co.uk Sage]&lt;br /&gt;
* [http://www.google.com Google]&lt;br /&gt;
* [http://www.microsoft.com Microsoft]&lt;br /&gt;
* [http://www.hacktics.com/ Hacktics, Ernst &amp;amp; Young]&lt;br /&gt;
* [http://www.dinosec.com/ DinoSec]&lt;br /&gt;
* [http://www.denimgroup.com Denim Group]&lt;br /&gt;
* [http://www.aspectsecurity.com/ Aspect Security]&lt;br /&gt;
* [http://secureideas.net SecureIdeas]&lt;br /&gt;
* [http://utilisec.com UtiliSec]&lt;br /&gt;
* [http://www.encription.co.uk/ encription]&lt;br /&gt;
* [https://www.accenture.com/us-en/digital-index.aspx Accenture Digital]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Functionality =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's functionality:'''&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Man-in-the-middle Proxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Traditional] and AJAX spiders&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Automated scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsBruteforce Forced browsing]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/SmartCards Smartcard and Client Digital Certificates support]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsWebsocketIntroduction Web sockets] support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Support for a wide range of scripting languages]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki//HelpAddonsPlugnhackPlugnhack Plug-n-Hack support]&lt;br /&gt;
* Authentication and session support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsApi Powerful REST based API]&lt;br /&gt;
* Automatic updating option&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Integrated and growing marketplace of add-ons]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Features =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's features:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]&lt;br /&gt;
* Cross platform (it even runs on a [https://github.com/zaproxy/zaproxy/wiki/zappi Raspberry Pi!])&lt;br /&gt;
* Easy to install (using a [https://www.ej-technologies.com/products/install4j/overview.html multi-platform installer builder])&lt;br /&gt;
* Completely free (no paid for 'Pro' version)&lt;br /&gt;
* Ease of use a priority&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpIntro Comprehensive help pages]&lt;br /&gt;
* Fully internationalized&lt;br /&gt;
* Translated into over 20 languages&lt;br /&gt;
* Community based, with involvement actively encouraged&lt;br /&gt;
* Under active development by an international team of volunteers&lt;br /&gt;
&lt;br /&gt;
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Languages =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ZAP supports the following languages:'''&lt;br /&gt;
&lt;br /&gt;
* English&lt;br /&gt;
* Arabic&lt;br /&gt;
* Bosnian&lt;br /&gt;
* Brazilian Portuguese&lt;br /&gt;
* Chinese&lt;br /&gt;
* Danish&lt;br /&gt;
* Filipino&lt;br /&gt;
* French&lt;br /&gt;
* German&lt;br /&gt;
* Greek&lt;br /&gt;
* Hungarian&lt;br /&gt;
* Indonesian&lt;br /&gt;
* Italian&lt;br /&gt;
* Japanese&lt;br /&gt;
* Korean&lt;br /&gt;
* Persian&lt;br /&gt;
* Polish&lt;br /&gt;
* Russian&lt;br /&gt;
* Sinhala&lt;br /&gt;
* Spanish&lt;br /&gt;
* Urdu &lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to help improve these translations or add new ones right now!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Release 2.6.0==&lt;br /&gt;
ZAP 2.6.0 has been released, this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_6_0&lt;br /&gt;
&lt;br /&gt;
==Release 2.7.0==&lt;br /&gt;
ZAP 2.7.0 is being actively worked on, and is expected to be released relatively soon.&lt;br /&gt;
&lt;br /&gt;
It will require Java 8 (minimum) and will support Selenium 3. It will also include all of the changes currently available in the [https://github.com/zaproxy/zaproxy/wiki/Downloads#zap-weekly weekly release].&lt;br /&gt;
&lt;br /&gt;
==Release 2.8.0==&lt;br /&gt;
ZAP 2.8.0 does not yet have a planned release date, but is likely to be around the end of 2017 or (more likely) the beginning of 2018.&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of ZAP is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Feature Requests==&lt;br /&gt;
&lt;br /&gt;
Please raise new feature requests as enhancement requests here: https://github.com/zaproxy/zaproxy/issues&lt;br /&gt;
&lt;br /&gt;
If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use the [http://groups.google.com/group/zaproxy-users zaproxy-users Google Group] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What features could be made easier to use?&lt;br /&gt;
* How could the help pages be improved? &lt;br /&gt;
&lt;br /&gt;
==Log issues==&lt;br /&gt;
&lt;br /&gt;
Have you had a problem using ZAP?&lt;br /&gt;
&lt;br /&gt;
If so and its not already been logged then please [https://github.com/zaproxy/zaproxy/issues report it]&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
&lt;br /&gt;
Are you fluent in another language? Can you help translate ZAP into that language?&lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to do that!&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
If you fancy having a go at adding functionality to ZAP then please get in touch via the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group].&lt;br /&gt;
&lt;br /&gt;
Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!&lt;br /&gt;
&lt;br /&gt;
If you actively contribute to ZAP then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|Zed Attack Proxy Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool|OWASP Release Quality Tool]]&lt;br /&gt;
[[Category:OWASP_Download]]&lt;br /&gt;
[[Category:Popular]]&lt;br /&gt;
[[Category:SAMM-ST-2]]&lt;br /&gt;
[[Category:Flagship Projects|Zap]]&lt;br /&gt;
[[Category:OWASP Zed Attack Proxy|Zap]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Rick.mitchell&amp;diff=235200</id>
		<title>User:Rick.mitchell</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Rick.mitchell&amp;diff=235200"/>
				<updated>2017-11-08T14:21:04Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Rick's User Page&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== What Rick's Worked On ==&lt;br /&gt;
&lt;br /&gt;
Click here to see [https://www.openhub.net/accounts/kingthorin/ Rick's Contributions to OWASP ZAP.]&lt;br /&gt;
&lt;br /&gt;
Click here to see [https://www.owasp.org/index.php/Special:Contributions/Rick.mitchell Rick's Contributions (Edits)]. [As of Nov. 2017 these mainly deal with the Testing Guide, GSoC, and ZAP.]&lt;br /&gt;
&lt;br /&gt;
To see discussion and contributions with regard to the [[:Common_OWASP_Numbering]] project, checkout the mailing list for Jan 2010:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lists.owasp.org/pipermail/owasp-testing/2010-January/subject.html OWASP Testing Mailing List Jan 2010].&lt;br /&gt;
&lt;br /&gt;
== &amp;quot;and/or&amp;quot; Explanation ==&lt;br /&gt;
&lt;br /&gt;
A quick explanation of why &amp;quot;and/or&amp;quot; shouldn't be used in written English.&lt;br /&gt;
&lt;br /&gt;
[[Image:And_or.png|Binary logic of &amp;quot;and&amp;quot; and &amp;quot;or&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
'''Note''': The OR allows for the same True result as the AND (bottom right corner), while also allowing for other combinations producing True results.&amp;lt;br&amp;gt;&lt;br /&gt;
Sometimes people mean &amp;quot;and/exclusive or&amp;quot; when they type &amp;quot;and/or&amp;quot; however this would look extremely strange when written and 99% of the time a simple or will suffice.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Therefore''' all written usage of &amp;quot;and/or&amp;quot; should simply be &amp;quot;or&amp;quot;.&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ZAPpingTheTop10-2013&amp;diff=234368</id>
		<title>ZAPpingTheTop10-2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ZAPpingTheTop10-2013&amp;diff=234368"/>
				<updated>2017-10-13T17:17:40Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Updated per https://github.com/zaproxy/zaproxy/issues/3883&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= ZAPping the OWASP Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;This document gives an overview of the automatic and manual components provided by the [[OWASP Zed Attack Proxy Project ]] (ZAP) that are recommended for testing each of the [[OWASP Top Ten Project]] 2013 risks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;Note that the [[OWASP Top Ten Project]] risks cover a wide range of underlying vulnerabilities, some of which are not really possible to test for in a completely automated way. If a completely automated tool claims to protect you against the full OWASP Top Ten then you can be sure they are being ‘economical with the truth’! &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;A printable (pdf) version of this document is also available: [https://www.owasp.org/index.php/File:ZAPpingTheOwaspTop10.pdf ZAPpingTheOwaspTop10.pdf] &amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
The component links take you to the relevant places in an online version of the ZAP User Guide from which you can learn more.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; Common Components &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; The &amp;amp;#x27;common components&amp;amp;#x27; can be used for pretty much everything, so can be used to help detect all of the Top 10  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Intercepting proxy] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsMan_req Manual request] / [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsResend resend] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Scripts] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSearch Search] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A1 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A1-Injection | A1 Injection]] &amp;lt;/font&amp;gt;  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; SQLMap Injection Engine (Beta&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;)  &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A2 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsHttpsessions Http Sessions] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsBruteForceConcepts Forced Browse (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/AddOn_tokengen Token Generator (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A3 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A4 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsParams Params tab] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A5 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsHttpsinfoHttpsinfo HttpsInfo (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPortscanConcepts Port Scanner (Beta)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A6 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesAlphaAscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsPscanrulesPscanrules Release], [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt;) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A7 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Spider] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsSpiderAjaxConcepts Ajax Spider (Beta)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTlmenuReport#Compare_with_another_Session... Session comparison] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAccessControlConcepts Access Control (Alpha)] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A8 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsAscanrulesBetaAscanbeta Beta])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesBetaPscanbeta Beta])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpUiTabsSites#Generate_anti_CSRF_test_form Generate Anti CSRF Test Form] &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A9 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive Scan Rules] ([https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsPscanrulesAlphaPscanalpha Alpha])&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and Retire (Alpha)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-extensions/wiki/HelpAddonsWappalyzerWappalyzer Technology detection (Alpha)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; A10 &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt; [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]] &amp;lt;/font&amp;gt; &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Automated &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Active Scan Rules] ([https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsAscanrulesAscanrules Release]) &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; Manual &amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;border: 1px solid #ccc; padding: 5px;&amp;quot;&amp;gt; [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer], combined with the [https://github.com/zaproxy/zap-extensions/wiki/AddOn_fuzzdb FuzzDb (Release)]&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; and SVN Digger (Beta)&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; files &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
 &amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;*&amp;lt;/tt&amp;gt; The stared add-ons are not included by default in the full ZAP release but can be downloaded from the ZAP Marketplace via the [https://github.com/zaproxy/zap-extensions/wiki/Introduction ‘Manage add-ons’] button on the ZAP main toolbar. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&amp;diff=229964</id>
		<title>OWASP Vulnerable Web Applications Directory Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&amp;diff=229964"/>
				<updated>2017-05-23T17:42:45Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Switch Ohloh to Open Hub&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vulnerable Web Applications Directory Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available for legal security and vulnerability testing of various kinds.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Select from the above tabs to view all of the:&lt;br /&gt;
* On-Line applications&lt;br /&gt;
* Off-Line applications&lt;br /&gt;
* Virtual Machines and ISO images&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Vulnerable Web Applications Directory (VWAD) Project is a comprehensive and well maintained registry of all known vulnerable web applications currently available. These vulnerable web applications can be used by web developers, security auditors and penetration testers to put in practice their knowledge and skills during training sessions (and especially afterwards), as well as to test at any time the multiple hacking tools and offensive techniques available, in preparation for their next real-world engagement.&lt;br /&gt;
&lt;br /&gt;
The main goal of VWAD is to provide a list of vulnerable web applications available to security professionals for hacking and offensive activities, so that they can attack realistic web environments... without going to jail :)&lt;br /&gt;
&lt;br /&gt;
The vulnerable web applications have been classified in three categories: On-Line, Off-Line, and VMs/ISOs. Each list has been ordered alphabetically.&lt;br /&gt;
&lt;br /&gt;
An initial list that inspired this project was maintained till October 2013 at: http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html.&lt;br /&gt;
&lt;br /&gt;
A brief description of the OWASP VWAD project is available at: http://blog.dinosec.com/2013/11/owasp-vulnerable-web-applications.html.&lt;br /&gt;
&lt;br /&gt;
The associated GitHub repository is available at: https://github.com/OWASP/OWASP-VWAD.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vulnerable Web Applications Directory Projects is free to use. It is licensed under the Apache 2.0 License, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is VWAD? ==&lt;br /&gt;
&lt;br /&gt;
OWASP VWAD provides:&lt;br /&gt;
&lt;br /&gt;
* A list of all known vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Interview with [http://trustedsoftwarealliance.com/2013/10/18/simon-bennetts-the-owasp-web-applications-vulnerability-project/ Simon Bennetts – The OWASP Web Applications Vulnerability Project ].&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:raul@raulsiles.com Raul Siles]&lt;br /&gt;
*[[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* N/A&lt;br /&gt;
&lt;br /&gt;
== Open Hub ==&lt;br /&gt;
&lt;br /&gt;
*https://www.openhub.net/p/OWASP-VWAD&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* N/A - The project is self contained on the wiki.&lt;br /&gt;
* GitHub repository - https://github.com/OWASP/OWASP-VWAD&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [16 Oct 2013] Project created.&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=On-Line apps=&lt;br /&gt;
&lt;br /&gt;
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Online | Online}}&lt;br /&gt;
&lt;br /&gt;
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Online source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].&lt;br /&gt;
&lt;br /&gt;
You can either edit that page directly or submit a pull request.&lt;br /&gt;
&lt;br /&gt;
= Off-Line apps =&lt;br /&gt;
&lt;br /&gt;
Vulnerable applications that have to be downloaded and used locally:&lt;br /&gt;
&lt;br /&gt;
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline | Offline}}&lt;br /&gt;
&lt;br /&gt;
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].&lt;br /&gt;
&lt;br /&gt;
You can either edit that page directly or submit a pull request.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following apps are quite old and appear not to be maintained - as such they are probably less useful.&lt;br /&gt;
&lt;br /&gt;
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/OfflineOld | OfflineOld}}&lt;br /&gt;
&lt;br /&gt;
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/OfflineOld source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].&lt;br /&gt;
&lt;br /&gt;
You can either edit that page directly or submit a pull request.&lt;br /&gt;
&lt;br /&gt;
= Virtual Machines or ISOs =&lt;br /&gt;
&lt;br /&gt;
VMs which contain multiple vulnerable applications:&lt;br /&gt;
&lt;br /&gt;
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMs | VMs}}&lt;br /&gt;
&lt;br /&gt;
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMs source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].&lt;br /&gt;
&lt;br /&gt;
You can either edit that page directly or submit a pull request.&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
The following apps are quite old and appear not to be maintained - as such they are probably less useful.&lt;br /&gt;
&lt;br /&gt;
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMsOld | VMsOld}}&lt;br /&gt;
&lt;br /&gt;
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMsOld source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].&lt;br /&gt;
&lt;br /&gt;
You can either edit that page directly or submit a pull request.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
VWAD is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
*[mailto:raul@raulsiles.com Raul Siles]&lt;br /&gt;
*[[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* [mailto:achim@owasp.org Achim Hoffmann]&lt;br /&gt;
* [[User:Zakiakhmad|Zaki Akhmad]]&lt;br /&gt;
&lt;br /&gt;
==On-line resources used==&lt;br /&gt;
* [http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html Hacking Vulnerable Web Applications Without Going To Jail]&lt;br /&gt;
* [http://securitythoughts.wordpress.com/2010/03/22/vulnerable-web-applications-for-learning/ Vulnerable Web Applications for learning]&lt;br /&gt;
* [http://code.google.com/p/owaspbwa/wiki/UserGuide OWASP BWA User Guide]&lt;br /&gt;
&lt;br /&gt;
==Other vulnerable web-app compilations==&lt;br /&gt;
* [http://www.amanhardikar.com/mindmaps/Practice.html Penetration Testing Practice Labs - Vulnerable Apps/Systems]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of March 5, 2014, all known Vulnerable Web Applications have been included.&lt;br /&gt;
&lt;br /&gt;
Going forward the plan is to:&lt;br /&gt;
* Keep publicising&lt;br /&gt;
* Keep up to date with any new apps released or updated&lt;br /&gt;
* Review every 6 months to see if it could be improved in any way&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Vulnerable Web Applications Directory Project is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Update the wiki with any missing apps&lt;br /&gt;
* Send pull requests to https://github.com/OWASP/OWASP-VWAD&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vulnerable_Web_Applications_Directory_Project}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Sprint_2017&amp;diff=229953</id>
		<title>OWASP Code Sprint 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Sprint_2017&amp;diff=229953"/>
				<updated>2017-05-23T16:26:56Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Fix student APPLY HERE link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''Goal''' ==&lt;br /&gt;
The OWASP Code Sprint 2017 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Code Sprint 2017 a student can get real life experience while contributing to an open source project. A student that successfully completes the program will receive in total $1500.&lt;br /&gt;
&lt;br /&gt;
== '''Program details''' ==&lt;br /&gt;
&lt;br /&gt;
''Projects that are eligible:'' All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
''Duration:'' 2 months of full-time engagement.&lt;br /&gt;
&lt;br /&gt;
== '''How it works''' ==&lt;br /&gt;
&lt;br /&gt;
Any code/tool project can participate in the OWASP Code Sprint. Each project will be guided by an OWASP mentor. Students are evaluated in the middle and at the end of the coding period, based on success criteria identified at the beginning of the project. Successful students will receive $750 after each evaluation, a total of $1500 per student.&lt;br /&gt;
&lt;br /&gt;
Projects are focused on developing security tools. It is required that the code any student produces for those projects will be released as Open Source. &lt;br /&gt;
&lt;br /&gt;
Note on language: English is required for code comments and documentation, but not for interactions between students and advisers. Advisers who speak the same language as their students are encouraged to interact in that language. &lt;br /&gt;
&lt;br /&gt;
== '''How you can participate''' ==&lt;br /&gt;
&lt;br /&gt;
=== As a student: ===&lt;br /&gt;
&lt;br /&gt;
1. Review the list of OWASP Projects currently participating in the OWASP Code Sprint 2017.&lt;br /&gt;
&lt;br /&gt;
2. Get in touch with the OWASP Project mentor of your choice.&lt;br /&gt;
&lt;br /&gt;
3. Agree deliverables with OWASP mentor. &lt;br /&gt;
&lt;br /&gt;
4. Work away during April  thru June 2017.&lt;br /&gt;
&lt;br /&gt;
5. Rise to Open Source Development Glory :-)&lt;br /&gt;
&lt;br /&gt;
=== ALL STUDENTS PLEASE APPLY HERE ===&lt;br /&gt;
&lt;br /&gt;
Student application submission is now open: [https://goo.gl/forms/it8hieQAcvCTuPG83 APPLY HERE].&lt;br /&gt;
&lt;br /&gt;
=== As an OWASP Project Leader: ===&lt;br /&gt;
&lt;br /&gt;
1. Edit this page adding your project and some proposed tasks as per the examples&lt;br /&gt;
&lt;br /&gt;
2. Promote the initiative to your academic contacts&lt;br /&gt;
&lt;br /&gt;
== '''Timeplan''' ==&lt;br /&gt;
&lt;br /&gt;
'''Phase 1: Proposals'''&lt;br /&gt;
&lt;br /&gt;
Project leaders who want to include their project to the program should submit some initial proposal ideas on this page. These ideas serve as guidance to the students; they are things that project leaders would like to get done, like new features, improvements, etc.&lt;br /&gt;
&lt;br /&gt;
Subsequently students are invited to submit detailed proposals that can (but do not necessarily have to) be based on these ideas. Students are strongly encouraged to engage with project leaders and each project's community (e.g. through the project's mailing list) in order to discuss the details of their proposal. Proposals should provide details about the implementation, time plan, milestones, etc.&lt;br /&gt;
&lt;br /&gt;
'''Phase 2: Scoring of proposals'''&lt;br /&gt;
&lt;br /&gt;
After the submission of proposals, project leaders and contributors/mentors are required to review the submitted proposals and score them (on a 1 to 5 scale). Each proposal should receive at least 3 assessments/scores from different mentors. Each mentor, contributor or leader can score only proposals for their OWN project. All assessments should provide justification. Reviewers are strongly encouraged to provide constructive comments for students so that they can improve in the future.&lt;br /&gt;
&lt;br /&gt;
Project leaders are responsible to attract a sufficient number of volunteer mentors to score proposals and subsequently supervise those that will get selected.&lt;br /&gt;
&lt;br /&gt;
'''Phase 3: Slot allocation.'''&lt;br /&gt;
&lt;br /&gt;
When proposal scoring has been completed, each project leader requests a specific number of slots. This number should be based on:&lt;br /&gt;
The number of truly outstanding proposals according to submitted scores.&lt;br /&gt;
The importance of the proposal to the project's roadmap.&lt;br /&gt;
The number of available mentors for the project. At least 2 mentors are needed for each proposal that gets accepted.&lt;br /&gt;
If the total number of requested slots is less than or equal to the available number of slots, then all projects get the requested slots. If not, the following rules apply:&lt;br /&gt;
All projects that have requested a slot get at least 1 slot, provided they have a high quality proposal and sufficient number of mentors.&lt;br /&gt;
Two mentors are required per slot allocated to the project.&lt;br /&gt;
The program's administrators get in touch with project leaders, especially those that have requested a large number of slots to receive additional feedback on the requested slots and explore any available possibilities for reducing the requested number of slots. A project leader might choose to donate one or more requested slots back to the pool so that other projects can get more slots. The program administrators can choose to initiate a public discussion between projects in need of more slots and projects that have requested a lot of slots in order to determine the best possible outcome for everyone.&lt;br /&gt;
If all else fails, slots are equally allocated to projects, i.e. all projects get 1 slot; projects that have requested 2 or more slots get an extra slot if available; projects that have requested 3 or more slots get an extra slot if available, etc. When there are no more slots available for all projects that have requested them a draw is used to allocate the remaining slots.&lt;br /&gt;
&lt;br /&gt;
In any case, the program's administrators should perform a final review of the selected proposals to ensure that they are of high quality. If concerns arise they should request additional information from project leaders.&lt;br /&gt;
&lt;br /&gt;
'''Phase 4: Coding.'''&lt;br /&gt;
&lt;br /&gt;
This is the main phase of the program. Students implement their proposal according to the submitted timeplan and under the supervision &lt;br /&gt;
of their mentors.&lt;br /&gt;
&lt;br /&gt;
== '''Evaluations''' ==&lt;br /&gt;
&lt;br /&gt;
In the middle of the coding period, mentors should submit an evaluation of their students to ensure that they are on track and provide some feedback both to OWASP and the students.&lt;br /&gt;
&lt;br /&gt;
If no/little progress has been made up to this point, the mentors could decide to fail the student in which case the student does not receive money. If successful, OWASP will pay half the amount ($750). The final evaluations are submitted at the end of the coding period and the second installment ($750) is paid to the student if all agreed deliverables are met. If the student has failed to demonstrate progress during the second period, then the second installment will not be paid and the student will get only half of the amount.&lt;br /&gt;
== '''Deadlines''' == &lt;br /&gt;
Program announcement: May 15''', 2017''' &lt;br /&gt;
&lt;br /&gt;
Deadline for Student Applications: '''June 15, 2015''' &lt;br /&gt;
&lt;br /&gt;
Proposal Evaluations: from: '''June''' '''15 thru June 23  2017''' &lt;br /&gt;
&lt;br /&gt;
Successful proposals announcement:: '''June 26, 2017''' &lt;br /&gt;
&lt;br /&gt;
Bonding Period Announcement: June 26, 2017 - July 1, 2017 &lt;br /&gt;
&lt;br /&gt;
Coding Period Starts: '''July 3, 2017''' &lt;br /&gt;
&lt;br /&gt;
Mid-term evaluations: Submitted from :'''July 31, 2017  thru  August 4, 2017'''&lt;br /&gt;
&lt;br /&gt;
Coding Period Re-starts: August 7, 2017&lt;br /&gt;
&lt;br /&gt;
Coding period ends: '''September 1, 2017''' &lt;br /&gt;
&lt;br /&gt;
Final evaluations:'''September 4, 2017 thru September 8, 2017''' &lt;br /&gt;
&lt;br /&gt;
== '''Mailing List''' ==&lt;br /&gt;
Please subscribe to the following mailing list to receive updates or ask any particular questions:&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/forum/?hl=en#!forum/owasp-code-sprint-2017 OWASP Code Sprint  2017 Mailing List]&lt;br /&gt;
&lt;br /&gt;
== '''Project Ideas''' ==&lt;br /&gt;
== OWASP Mobile Security Testing Project  ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile universe, consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
=== Write Mobile Crackmes and De-Obfuscation Guides  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we want to link most of the content to practical examples. We're therefore planning to add crackmes for Android and iOS to the GitHub repo that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing.&lt;br /&gt;
&lt;br /&gt;
In this project, the student creates multiple cracking exercises for Android and documents solutions to these exercises. The new crackmes developed in this project will be added to the existing list at:&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md&lt;br /&gt;
&lt;br /&gt;
Possible solutions will be added to the &amp;quot;Reverse Engineering&amp;quot; chapters in the Mobile Testing Guide along the following lines:&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec&lt;br /&gt;
&lt;br /&gt;
Additionally, the crackmes produced will be used as examples in other sections of the guide, such as test cases.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
* Several Apps that implemented different obfuscation techniques. &lt;br /&gt;
* Evaluation of tools and techniques to de-obfuscate code. &lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Browse through the MASVS and check the Reverse Engineering requirements (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x15-V8-Resiliency_Against_Reverse_Engineering_Requirements.md)&lt;br /&gt;
* Check out these wok-in-progress sections in the MSTG and the &amp;quot;obfuscation metrics&amp;quot; project:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#assessing-software-protections&lt;br /&gt;
&lt;br /&gt;
https://github.com/b-mueller/obfuscation-metrics&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Obfuscation techniques, Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:bernhard.mueller@owasp.org Bernhard Mueller] - OWASP Slack: @bernhardm - OWASP Mobile Security Testing Guide and MASVS Project Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT  ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* ability to intercept the transactions&lt;br /&gt;
* modify or replay transaction on the fly&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
* Create a browser instance and do the necessary login procedure&lt;br /&gt;
* Handle the browser for the URI&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]] The OWASP Hackademic Challenges project helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment.&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Course Type Challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
We have a sandbox engine which allows for complex guided challenges to be implemented.&lt;br /&gt;
We'd like to build a challenge that guides the user through a series of steps to an end goal and teaches more information on the subject matter on the way.&lt;br /&gt;
This is a very open-ended project on purpose to allow creative student to come up with nice ideas.&lt;br /&gt;
Bellow you will find some examples that we thought might be interesting.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
* Purposefully vulnerable web page that guides the user via javascript tooltips and hints to exploiting it using ZAP. ( Bonus: using ZAP via the ZAP api). The challenge is solved when the the student submits the contents of a text file located on the disk (obtained by exploited an RCE)&lt;br /&gt;
&lt;br /&gt;
* Reversing a provided binary to extract information by providing step by step instructions to reversing using any popular reversing tool (well, you can't use IDA so gdb should have to do). Challenge is solved when the keys are extracted from the binary and submitted. Bonus points if each binary donwloaded has different keys.&lt;br /&gt;
&lt;br /&gt;
* Guide to exploiting the TOP10. (Using ZAP?)&lt;br /&gt;
&lt;br /&gt;
* Defensive Type challenges -- Here's how to create a patch for this kind of vulnerability -- Challenge is solved when the unit tests are run and the vulnerability isn't there.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Check popular javascript guide tools such as: (http://introjs.com/ and http://github.hubspot.com/shepherd/docs/welcome/ )&lt;br /&gt;
* If you're more interested in system or non-web challenges check serverspec and definitely check quest (https://github.com/puppetlabs/quest)&lt;br /&gt;
* If you think contributing is a good idea to make yourself familiar with the project you can either port one of the existing simpler 1-page challenges to a docker container and submit a pull request or write a guide on how to create such a challenge&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
* One or more Course - style challenges provided either as a docker container or as a vagrant box.&lt;br /&gt;
* Concrete documentation on how to build a challenge like this.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
The technologies used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Sprint_2017&amp;diff=228121</id>
		<title>OWASP Code Sprint 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Sprint_2017&amp;diff=228121"/>
				<updated>2017-03-29T18:23:42Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Minor correction&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''Goal''' ==&lt;br /&gt;
The OWASP Code Sprint 2017 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Code Sprint 2017 a student can get real life experience while contributing to an open source project. A student that successfully completes the program will receive in total $1500.&lt;br /&gt;
&lt;br /&gt;
== '''Program details''' ==&lt;br /&gt;
&lt;br /&gt;
''Projects that are eligible:'' All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
''Duration:'' 2 months of full-time engagement.&lt;br /&gt;
&lt;br /&gt;
== '''How it works''' ==&lt;br /&gt;
&lt;br /&gt;
Any code/tool project can participate in the OWASP Code Sprint. Each project will be guided by an OWASP mentor. Students are evaluated in the middle and at the end of the coding period, based on success criteria identified at the beginning of the project. Successful students will receive $750 after each evaluation, a total of $1500 per student.&lt;br /&gt;
&lt;br /&gt;
Projects are focused on developing security tools. It is required that the code any student produces for those projects will be released as Open Source. &lt;br /&gt;
&lt;br /&gt;
Note on language: English is required for code comments and documentation, but not for interactions between students and advisers. Advisers who speak the same language as their students are encouraged to interact in that language. &lt;br /&gt;
&lt;br /&gt;
== '''How you can participate''' ==&lt;br /&gt;
&lt;br /&gt;
=== As a student: ===&lt;br /&gt;
&lt;br /&gt;
1. Review the list of OWASP Projects currently participating in the OWASP Code Sprint 2017.&lt;br /&gt;
&lt;br /&gt;
2. Get in touch with the OWASP Project mentor of your choice.&lt;br /&gt;
&lt;br /&gt;
3. Agree deliverables with OWASP mentor. &lt;br /&gt;
&lt;br /&gt;
4. Work away during April  thru June 2017.&lt;br /&gt;
&lt;br /&gt;
5. Rise to Open Source Development Glory :-)&lt;br /&gt;
&lt;br /&gt;
ALL STUDENTS PLEASE APPLY HERE &amp;gt;&amp;gt; [http://goo.gl/forms/jUFTcXVDEY FORM] - needs to be updated&lt;br /&gt;
&lt;br /&gt;
=== As an OWASP Project Leader: ===&lt;br /&gt;
&lt;br /&gt;
1. Edit this page adding your project and some proposed tasks as per the examples&lt;br /&gt;
&lt;br /&gt;
2. Promote the initiative to your academic contacts&lt;br /&gt;
&lt;br /&gt;
== '''Timeplan''' ==&lt;br /&gt;
&lt;br /&gt;
'''Phase 1: Proposals'''&lt;br /&gt;
&lt;br /&gt;
Project leaders who want to include their project to the program should submit some initial proposal ideas on this page. These ideas serve as guidance to the students; they are things that project leaders would like to get done, like new features, improvements, etc.&lt;br /&gt;
&lt;br /&gt;
Subsequently students are invited to submit detailed proposals that can (but do not necessarily have to) be based on these ideas. Students are strongly encouraged to engage with project leaders and each project's community (e.g. through the project's mailing list) in order to discuss the details of their proposal. Proposals should provide details about the implementation, time plan, milestones, etc.&lt;br /&gt;
&lt;br /&gt;
'''Phase 2: Scoring of proposals'''&lt;br /&gt;
&lt;br /&gt;
After the submission of proposals, project leaders and contributors/mentors are required to review the submitted proposals and score them (on a 1 to 5 scale). Each proposal should receive at least 3 assessments/scores from different mentors. Each mentor, contributor or leader can score only proposals for their OWN project. All assessments should provide justification. Reviewers are strongly encouraged to provide constructive comments for students so that they can improve in the future.&lt;br /&gt;
&lt;br /&gt;
Project leaders are responsible to attract a sufficient number of volunteer mentors to score proposals and subsequently supervise those that will get selected.&lt;br /&gt;
&lt;br /&gt;
'''Phase 3: Slot allocation.'''&lt;br /&gt;
&lt;br /&gt;
When proposal scoring has been completed, each project leader requests a specific number of slots. This number should be based on:&lt;br /&gt;
The number of truly outstanding proposals according to submitted scores.&lt;br /&gt;
The importance of the proposal to the project's roadmap.&lt;br /&gt;
The number of available mentors for the project. At least 2 mentors are needed for each proposal that gets accepted.&lt;br /&gt;
If the total number of requested slots is less than or equal to the available number of slots, then all projects get the requested slots. If not, the following rules apply:&lt;br /&gt;
All projects that have requested a slot get at least 1 slot, provided they have a high quality proposal and sufficient number of mentors.&lt;br /&gt;
Two mentors are required per slot allocated to the project.&lt;br /&gt;
The program's administrators get in touch with project leaders, especially those that have requested a large number of slots to receive additional feedback on the requested slots and explore any available possibilities for reducing the requested number of slots. A project leader might choose to donate one or more requested slots back to the pool so that other projects can get more slots. The program administrators can choose to initiate a public discussion between projects in need of more slots and projects that have requested a lot of slots in order to determine the best possible outcome for everyone.&lt;br /&gt;
If all else fails, slots are equally allocated to projects, i.e. all projects get 1 slot; projects that have requested 2 or more slots get an extra slot if available; projects that have requested 3 or more slots get an extra slot if available, etc. When there are no more slots available for all projects that have requested them a draw is used to allocate the remaining slots.&lt;br /&gt;
&lt;br /&gt;
In any case, the program's administrators should perform a final review of the selected proposals to ensure that they are of high quality. If concerns arise they should request additional information from project leaders.&lt;br /&gt;
&lt;br /&gt;
'''Phase 4: Coding.'''&lt;br /&gt;
&lt;br /&gt;
This is the main phase of the program. Students implement their proposal according to the submitted timeplan and under the supervision &lt;br /&gt;
of their mentors.&lt;br /&gt;
&lt;br /&gt;
== '''Evaluations''' ==&lt;br /&gt;
&lt;br /&gt;
In the middle of the coding period, mentors should submit an evaluation of their students to ensure that they are on track and provide some feedback both to OWASP and the students.&lt;br /&gt;
&lt;br /&gt;
If no/little progress has been made up to this point, the mentors could decide to fail the student in which case the student does not receive money. If successful, OWASP will pay half the amount ($750). The final evaluations are submitted at the end of the coding period and the second installment ($750) is paid to the student if all agreed deliverables are met. If the student has failed to demonstrate progress during the second period, then the second installment will not be paid and the student will get only half of the amount.&lt;br /&gt;
== '''Deadlines''' == &lt;br /&gt;
Program announcement: '''April 3, 2017''' &lt;br /&gt;
&lt;br /&gt;
Deadline for Student Applications: '''April  17, 2017''' &lt;br /&gt;
&lt;br /&gt;
Proposal Evaluations: from: '''April 18 thru April 24  2017''' &lt;br /&gt;
&lt;br /&gt;
Successful proposals announcement:: '''April  25, 2017''' &lt;br /&gt;
&lt;br /&gt;
Coding Period Starts: '''April 28, 2017''' &lt;br /&gt;
&lt;br /&gt;
Mid-term evaluations: Submitted from : '''May 22  thru May 26  2017'''&lt;br /&gt;
&lt;br /&gt;
Coding period ends: '''June 19, 2017''' &lt;br /&gt;
&lt;br /&gt;
Final evaluations:'''June 26, 2017''' &lt;br /&gt;
&lt;br /&gt;
== '''Mailing List''' ==&lt;br /&gt;
Please subscribe to the following mailing list to receive updates or ask any particular questions:&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/forum/?hl=en#!forum/owasp-code-sprint-2017 OWASP Code Sprint  2017 Mailing List]&lt;br /&gt;
&lt;br /&gt;
== '''Project Ideas''' ==&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Slack: @sushi2k - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Write Mobile Crackmes and De-Obfuscation Guides  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A key goal of the OWASP Mobile Testing Project is to build the ultimate learning resource and reference guide for mobile app reversers. As hands-on hacking is by far the best way to learn, we want to link most of the content to practical examples. We're therefore planning to add crackmes for Android and iOS to the GitHub repo that will then be used as examples throughout the guide. The goal is to collect enough resources for demonstrating the most important tools and techniques in our guide, plus additional crackmes for practicing.&lt;br /&gt;
&lt;br /&gt;
In this project, the student creates multiple cracking exercises for Android and documents solutions to these exercises. The new crackmes developed in this project will be added to the existing list at:&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/OMTG-Files/02_Crackmes/List_of_Crackmes.md&lt;br /&gt;
&lt;br /&gt;
Possible solutions will be added to the &amp;quot;Reverse Engineering&amp;quot; chapters in the Mobile Testing Guide along the following lines:&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md#symbolicexec&lt;br /&gt;
&lt;br /&gt;
Additionally, the crackmes produced will be used as examples in other sections of the guide, such as test cases.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
* Several Apps that implemented different obfuscation techniques. &lt;br /&gt;
* Evaluation of tools and techniques to de-obfuscate code. &lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Browse through the MASVS and check the Reverse Engineering requirements (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x15-V8-Resiliency_Against_Reverse_Engineering_Requirements.md)&lt;br /&gt;
* Check out these wok-in-progress sections in the MSTG and the &amp;quot;obfuscation metrics&amp;quot; project:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05b-Reverse-Engineering-and-Tampering-Android.md&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Reverse-Engineering-and-Tampering-iOS.md&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#tampering-and-reverse-engineering&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05-Testing-Processes-and-Techniques.md#assessing-software-protections&lt;br /&gt;
&lt;br /&gt;
https://github.com/b-mueller/obfuscation-metrics&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Obfuscation techniques, Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:bernhard.mueller@owasp.org Bernhard Mueller] - OWASP Slack: @bernhardm - OWASP Mobile Security Testing Guide and MASVS Project Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* ability to intercept the transactions&lt;br /&gt;
* modify or replay transaction on the fly&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
* Create a browser instance and do the necessary login procedure&lt;br /&gt;
* Handle the browser for the URI&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges Project ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]] The OWASP Hackademic Challenges project helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment.&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Course Type Challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
We have a sandbox engine which allows for complex guided challenges to be implemented.&lt;br /&gt;
We'd like to build a challenge that guides the user through a series of steps to an end goal and teaches more information on the subject matter on the way.&lt;br /&gt;
This is a very open-ended project on purpose to allow creative student to come up with nice ideas.&lt;br /&gt;
Bellow you will find some examples that we thought might be interesting.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
* Purposefully vulnerable web page that guides the user via javascript tooltips and hints to exploiting it using ZAP. ( Bonus: using ZAP via the ZAP api). The challenge is solved when the the student submits the contents of a text file located on the disk (obtained by exploited an RCE)&lt;br /&gt;
&lt;br /&gt;
* Reversing a provided binary to extract information by providing step by step instructions to reversing using any popular reversing tool (well, you can't use IDA so gdb should have to do). Challenge is solved when the keys are extracted from the binary and submitted. Bonus points if each binary donwloaded has different keys.&lt;br /&gt;
&lt;br /&gt;
* Guide to exploiting the TOP10. (Using ZAP?)&lt;br /&gt;
&lt;br /&gt;
* Defensive Type challenges -- Here's how to create a patch for this kind of vulnerability -- Challenge is solved when the unit tests are run and the vulnerability isn't there.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Check popular javascript guide tools such as: (http://introjs.com/ and http://github.hubspot.com/shepherd/docs/welcome/ )&lt;br /&gt;
* If you're more interested in system or non-web challenges check serverspec and definitely check quest (https://github.com/puppetlabs/quest)&lt;br /&gt;
* If you think contributing is a good idea to make yourself familiar with the project you can either port one of the existing simpler 1-page challenges to a docker container and submit a pull request or write a guide on how to create such a challenge&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
* One or more Course - style challenges provided either as a docker container or as a vagrant box.&lt;br /&gt;
* Concrete documentation on how to build a challenge like this.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
The technologies used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=227734</id>
		<title>OWASP Zed Attack Proxy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=227734"/>
				<updated>2017-03-21T13:42:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Add toolswatch 2016 2nd place&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{{ReviewProject|projectname=zaproxy|language=en}}&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers[[#Justification|*]]. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.&lt;br /&gt;
&lt;br /&gt;
[[Image:ZAP-Download.png | link=https://github.com/zaproxy/zaproxy/wiki/Downloads]]&lt;br /&gt;
&lt;br /&gt;
====Please help us to make ZAP even better for you by answering the [https://docs.google.com/forms/d/1-k-vcj_sSxlil6XLxCFade-m-IQVeE2h9gduA-2ZPPA/viewform ZAP User Questionnaire]!====&lt;br /&gt;
&lt;br /&gt;
For a quick overview of ZAP and an introduction to the [https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin official ZAP Jenkins plugin] see these tutorial videos on YouTube:&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
{{#ev:youtube|eH0RBI0nmww}}&amp;amp;nbsp;&lt;br /&gt;
{{#ev:youtube|mmHZLSffCUg}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more videos see the links on the [https://github.com/zaproxy/zaproxy/wiki/Videos wiki videos page].&lt;br /&gt;
&lt;br /&gt;
Interested in a ZAP talk or training event? See the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#tab=Talks talks] tab. Not one near you? Contact a [https://github.com/zaproxy/zaproxy/wiki/ZapEvangelists Zap Evangelist] to arrange one!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Zed Attack Proxy&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For general information about ZAP:&lt;br /&gt;
* [https://twitter.com/zaproxy Twitter] - official ZAP announcements (low volume)&lt;br /&gt;
* [https://zaproxy.blogspot.co.uk/ Blog] - official ZAP blog&lt;br /&gt;
&lt;br /&gt;
For help using ZAP:&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/releases/download/2.4.0/ZAPGettingStartedGuide-2.4.pdf Getting Started Guide (pdf)] - an introductory guide you can print&lt;br /&gt;
* [https://www.youtube.com/playlist?list=PLEBitBW-Hlsv8cEIUntAO8st2UGhmrjUB Tutorial Videos]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki User Guide] - online version of the User Guide included with ZAP&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-users User Group] - ask questions about using ZAP&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Add-ons] - help for the optional add-ons you can install&lt;br /&gt;
* [https://stackoverflow.com/questions/tagged/zap StackOverflow] - because some people use this for all everything ;)&lt;br /&gt;
&lt;br /&gt;
To learn more about ZAP development:&lt;br /&gt;
* [https://github.com/zaproxy Source Code] - for all of the ZAP related projects&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/wiki/Introduction Wiki] - lots of detailed info&lt;br /&gt;
* [https://groups.google.com/group/zaproxy-develop Developer Group] - ask questions about the ZAP internals&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap Crowdin (GUI)] - help translate the ZAP GUI&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help Crowdin (User Guide)] - help translate the ZAP User Guide&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy OpenHub]	- FOSS analytics&lt;br /&gt;
* [https://www.bountysource.com/teams/zap/issues BountySource] - Vote on ZAP issues (you can also donate money here, but 10% taken out)&lt;br /&gt;
&lt;br /&gt;
===Justification===&lt;br /&gt;
Justification for the statements made in the tagline at the top;)&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
* ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2016 [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 2nd]&lt;br /&gt;
** 2013 [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ 1st]&lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
* [https://www.openhub.net/p/zaproxy Code Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap ZAP core i18n Contributors]&lt;br /&gt;
* [https://crowdin.com/project/owasp-zap-help ZAP help i18n Contributors]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zaproxy/zaproxy/wiki/Downloads Download OWASP ZAP!]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#News News] and [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
== Change Log ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/commits/develop zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/commits/master zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Code Repo ==&lt;br /&gt;
* [https://github.com/zaproxy/zaproxy/ zaproxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/ zap-extensions]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
Questions? Please ask on the [http://groups.google.com/group/zaproxy-users ZAP User Group]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project Leader&amp;lt;br/&amp;gt;[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project OWASP WTE]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_OWTF OWASP OWTF]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.openhub.net/p/zaproxy&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [http://www.apache.org/licenses/LICENSE-2.0 Apache 2 License]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Screenshots =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotAddAlert.png||400px||ZAP Add Alert Screen Shot]] &lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHelp.png||400px|left|ZAP Help Screen Shot]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotHistoryFilter.png|thumb|400px|left|ZAP History Filter Screen Shot]]&lt;br /&gt;
|&lt;br /&gt;
[[Image:ZAP-ScreenShotSearchTab.png|thumb|400px|left|ZAP Search Tab Screen Shot]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/Talks | Talks}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= News =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project/Pages/News | News}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= ZAP Gear =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Yes, you can now buy ZAP related gear!&lt;br /&gt;
&lt;br /&gt;
All of the artwork for ZAP swag is released under the Creative Common License and can be downloaded from the [https://github.com/zaproxy/zap-swag zap-swag] repo.&lt;br /&gt;
&lt;br /&gt;
You can of course use the artwork from this repo with any other online store that you like.&lt;br /&gt;
&lt;br /&gt;
A range of products can be purchased from [http://www.redbubble.com/people/zaproxy Redbubble]&lt;br /&gt;
&lt;br /&gt;
Stickers can be purchased from [https://www.stickermule.com/uk/user/1070684077/stickers Stickermule]&lt;br /&gt;
&lt;br /&gt;
T-shirts can be purchased from [http://www.cafepress.com/zaproxy Cafepress]&lt;br /&gt;
&lt;br /&gt;
[[Image:zap-tshirt-cp.PNG | link=http://www.cafepress.com/zaproxy]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Supporters =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ZAP is developed by a worldwide [https://github.com/zaproxy/zap-core-help/wiki/HelpCredits team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:&lt;br /&gt;
&lt;br /&gt;
* [http://www.mozilla.org Mozilla]&lt;br /&gt;
* [http://www.linuxfoundation.org/ The Linux Foundation]&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.sage.co.uk Sage]&lt;br /&gt;
* [http://www.google.com Google]&lt;br /&gt;
* [http://www.microsoft.com Microsoft]&lt;br /&gt;
* [http://www.hacktics.com/ Hacktics, Ernst &amp;amp; Young]&lt;br /&gt;
* [http://www.dinosec.com/ DinoSec]&lt;br /&gt;
* [http://www.denimgroup.com Denim Group]&lt;br /&gt;
* [http://www.aspectsecurity.com/ Aspect Security]&lt;br /&gt;
* [http://secureideas.net SecureIdeas]&lt;br /&gt;
* [http://utilisec.com UtiliSec]&lt;br /&gt;
* [http://www.encription.co.uk/ encription]&lt;br /&gt;
* [https://www.accenture.com/us-en/digital-index.aspx Accenture Digital]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Functionality =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's functionality:'''&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsIntercept Intercepting Proxy]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsSpider Traditional] and AJAX spiders&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsAscan Automated scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsPscan Passive scanner]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsBruteforce Forced browsing]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsFuzz Fuzzer]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/SmartCards Smartcard and Client Digital Certificates support]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsWebsocketIntroduction Web sockets] support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpAddonsScriptsScripts Support for a wide range of scripting languages]&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki//HelpAddonsPlugnhackPlugnhack Plug-n-Hack support]&lt;br /&gt;
* Authentication and session support&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpStartConceptsApi Powerful REST based API]&lt;br /&gt;
* Automatic updating option&lt;br /&gt;
* [https://github.com/zaproxy/zap-extensions/wiki Integrated and growing marketplace of add-ons]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
= Features =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
'''Some of ZAP's features:'''&lt;br /&gt;
&lt;br /&gt;
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]&lt;br /&gt;
* Cross platform (it even runs on a [https://github.com/zaproxy/zaproxy/wiki/zappi Raspberry Pi!])&lt;br /&gt;
* Easy to install (just requires java 1.7)&lt;br /&gt;
* Completely free (no paid for 'Pro' version)&lt;br /&gt;
* Ease of use a priority&lt;br /&gt;
* [https://github.com/zaproxy/zap-core-help/wiki/HelpIntro Comprehensive help pages]&lt;br /&gt;
* Fully internationalized&lt;br /&gt;
* Translated into over 20 languages&lt;br /&gt;
* Community based, with involvement actively encouraged&lt;br /&gt;
* Under active development by an international team of volunteers&lt;br /&gt;
&lt;br /&gt;
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Languages =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ZAP supports the following languages:'''&lt;br /&gt;
&lt;br /&gt;
* English&lt;br /&gt;
* Arabic&lt;br /&gt;
* Bosnian&lt;br /&gt;
* Brazilian Portuguese&lt;br /&gt;
* Chinese&lt;br /&gt;
* Danish&lt;br /&gt;
* Filipino&lt;br /&gt;
* French&lt;br /&gt;
* German&lt;br /&gt;
* Greek&lt;br /&gt;
* Hungarian&lt;br /&gt;
* Indonesian&lt;br /&gt;
* Italian&lt;br /&gt;
* Japanese&lt;br /&gt;
* Korean&lt;br /&gt;
* Persian&lt;br /&gt;
* Polish&lt;br /&gt;
* Russian&lt;br /&gt;
* Sinhala&lt;br /&gt;
* Spanish&lt;br /&gt;
* Urdu &lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to help improve these translations or add new ones right now!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Release 2.4.3==&lt;br /&gt;
ZAP 2.4.3 has been released, this is a bug fix and enhancement release&lt;br /&gt;
&lt;br /&gt;
For more details see https://github.com/zaproxy/zap-core-help/wiki/HelpReleases2_4_3&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
[[Image:zap128x128.png|right]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of ZAP is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Feature Requests==&lt;br /&gt;
&lt;br /&gt;
Please raise new feature requests as enhancement requests here: https://github.com/zaproxy/zaproxy/issues&lt;br /&gt;
&lt;br /&gt;
If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use the [http://groups.google.com/group/zaproxy-users zaproxy-users Google Group] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What features could be made easier to use?&lt;br /&gt;
* How could the help pages be improved? &lt;br /&gt;
&lt;br /&gt;
==Log issues==&lt;br /&gt;
&lt;br /&gt;
Have you had a problem using ZAP?&lt;br /&gt;
&lt;br /&gt;
If so and its not already been logged then please [https://github.com/zaproxy/zaproxy/issues report it]&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
&lt;br /&gt;
Are you fluent in another language? Can you help translate ZAP into that language?&lt;br /&gt;
&lt;br /&gt;
You can use [http://crowdin.net/project/owasp-zap Crowdin] to do that!&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
If you fancy having a go at adding functionality to ZAP then please get in touch via the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group].&lt;br /&gt;
&lt;br /&gt;
Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!&lt;br /&gt;
&lt;br /&gt;
If you actively contribute to ZAP then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Zed Attack Proxy Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]]&lt;br /&gt;
[[Category:OWASP_Download]]&lt;br /&gt;
[[Category:Popular]]&lt;br /&gt;
[[Category:SAMM-ST-2]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225776</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225776"/>
				<updated>2017-01-31T21:53:33Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: /* Backlash Powered Scanner */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225769</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225769"/>
				<updated>2017-01-31T18:21:57Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: /* Backlash Powered Scanner */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backlash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backlash scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225768</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225768"/>
				<updated>2017-01-31T18:21:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: /* OWASP ZAP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backlash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backlash scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225767</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225767"/>
				<updated>2017-01-31T18:12:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: /* Bamboo Support */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225766</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225766"/>
				<updated>2017-01-31T18:10:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: /* OWASP ZAP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225761</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225761"/>
				<updated>2017-01-31T13:44:32Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Indent everything&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225760</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225760"/>
				<updated>2017-01-31T13:43:49Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Indent everything&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225759</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225759"/>
				<updated>2017-01-31T13:43:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Indent everything&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
&lt;br /&gt;
ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
* Helper classes with code completion for commonly required functionality&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225758</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225758"/>
				<updated>2017-01-31T13:40:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
&lt;br /&gt;
This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
&lt;br /&gt;
The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
&lt;br /&gt;
ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
* Helper classes with code completion for commonly required functionality&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Service_Security_Testing_Cheat_Sheet&amp;diff=216769</id>
		<title>Web Service Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Service_Security_Testing_Cheat_Sheet&amp;diff=216769"/>
				<updated>2016-05-11T12:08:38Z</updated>
		
		<summary type="html">&lt;p&gt;Rick.mitchell: Add ZAP to tools list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |- | valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;br/&amp;gt;Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
= Web Services Security Testing Cheat Sheet Introduction  =&lt;br /&gt;
&lt;br /&gt;
As Web Services are incorporated into application environments, having a good checklist while performing security assessments can help a penetration tester better identify web service related vulnerabilities and associated risk.&lt;br /&gt;
&lt;br /&gt;
== Purpose ==&lt;br /&gt;
&lt;br /&gt;
This document is intended to be an easy to use checklist while performing assessments against web services. The penetration tester is advised to incorporate this into his or her corporate testing methodology as a supplemental checklist or is free to use this checklist as the sole testing guideline.&lt;br /&gt;
&lt;br /&gt;
== Checklist ==&lt;br /&gt;
&lt;br /&gt;
===Pre-Assessment===&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
* For a Black Box assessment, at the very least, the penetration tester will need the Web Service Description Language (WSDL) file&amp;lt;br /&amp;gt;&lt;br /&gt;
* For a Grey Box assessment, the penetration tester will need sample requests for each method employed by the web service(s), along with the Web Service Description Language (WSDL) file&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Information Gathering===&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
* Black Box&amp;lt;br /&amp;gt;&lt;br /&gt;
** Google hacking&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:jws?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:asmx?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:aspx?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:ascx?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:ashx?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:dll?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:exe?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:php?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:pl?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Inurl:?wsdl&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Filetype:jws&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Filetype:asmx&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Filetype:ascx&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Filetype:aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Filetype:ashx&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Filetype:dll&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Filetype:exe&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Filetype:php&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Filetype:pl&amp;lt;br /&amp;gt;&lt;br /&gt;
** WSDL file contents&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Methods&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Data Types&amp;lt;br /&amp;gt;&lt;br /&gt;
** UDDI&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Web Service Discovery (If no WSDL provided)&amp;lt;br /&amp;gt;&lt;br /&gt;
** Authentication Type Discovery&amp;lt;br /&amp;gt;&lt;br /&gt;
** REST vs. SOAP&amp;lt;br /&amp;gt;&lt;br /&gt;
** Baseline Requests&amp;lt;br /&amp;gt;&lt;br /&gt;
* Grey Box&amp;lt;br /&amp;gt;&lt;br /&gt;
** WSDL file contents&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Methods&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Data Types&amp;lt;br /&amp;gt;&lt;br /&gt;
** Sample/Baseline Requests&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Methods&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Data Types&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Types of Information Being Requested/Consumed&amp;lt;br /&amp;gt;&lt;br /&gt;
** Authentication Type Discovery&amp;lt;br /&amp;gt;&lt;br /&gt;
** REST vs. SOAP&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing Phase===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
* Baseline Tests&amp;lt;br /&amp;gt;&lt;br /&gt;
** Normal Request(s)/Response(s) for Each Method &amp;lt;br /&amp;gt;&lt;br /&gt;
* Automated Tests&amp;lt;br /&amp;gt;&lt;br /&gt;
** Tools&amp;lt;br /&amp;gt;&lt;br /&gt;
*** SoapUI Pro&amp;lt;br /&amp;gt;&lt;br /&gt;
*** OWASP ZAP&amp;lt;br /&amp;gt;&lt;br /&gt;
*** IBM AppScan&amp;lt;br /&amp;gt;&lt;br /&gt;
*** HP Webinspect&amp;lt;br /&amp;gt;&lt;br /&gt;
*** WSBang&amp;lt;br /&amp;gt;&lt;br /&gt;
*** WSMap&amp;lt;br /&amp;gt;&lt;br /&gt;
* Vulnerability Discovery&amp;lt;br /&amp;gt;&lt;br /&gt;
** Debug output&amp;lt;br /&amp;gt;&lt;br /&gt;
** Fuzzing&amp;lt;br /&amp;gt;&lt;br /&gt;
** XSS&amp;lt;br /&amp;gt;&lt;br /&gt;
** SQLi&amp;lt;br /&amp;gt;&lt;br /&gt;
** Malformed XML&amp;lt;br /&amp;gt;&lt;br /&gt;
** Malicious Attachment/File Upload&amp;lt;br /&amp;gt;&lt;br /&gt;
** Xpath Injection&amp;lt;br /&amp;gt;&lt;br /&gt;
** Improper Boundary Checking&amp;lt;br /&amp;gt;&lt;br /&gt;
** XML Bomb (DoS)&amp;lt;br /&amp;gt;&lt;br /&gt;
** Basic Authentication&amp;lt;br /&amp;gt;&lt;br /&gt;
** SAML/OAuth/OpenID authentication&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Authentication based attacks&amp;lt;br /&amp;gt;&lt;br /&gt;
**** Replay attacks&amp;lt;br /&amp;gt;&lt;br /&gt;
**** Session fixation&amp;lt;br /&amp;gt;&lt;br /&gt;
**** XML Signature wrapping&amp;lt;br /&amp;gt;&lt;br /&gt;
**** Inadequate session timeout settings&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Improper implementation&amp;lt;br /&amp;gt;&lt;br /&gt;
** SSL/TLS Use&amp;lt;br /&amp;gt;&lt;br /&gt;
** Host Cipher Support&amp;lt;br /&amp;gt;&lt;br /&gt;
** Valid Certificate&amp;lt;br /&amp;gt;&lt;br /&gt;
** Protocol Support&amp;lt;br /&amp;gt;&lt;br /&gt;
** Hashing Algorithm Support&amp;lt;br /&amp;gt;&lt;br /&gt;
** Deprecated cipher suites that are offered&amp;lt;br /&amp;gt;&lt;br /&gt;
*** External resources&amp;lt;br /&amp;gt;&lt;br /&gt;
**** SSL Labs&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Internal resources&amp;lt;br /&amp;gt;&lt;br /&gt;
**** SSLscan&amp;lt;br /&amp;gt;&lt;br /&gt;
**Authorization Bypass&amp;lt;br /&amp;gt;&lt;br /&gt;
** Schema Implementation Weaknesses&amp;lt;br /&amp;gt;&lt;br /&gt;
** Non-encoded Output&amp;lt;br /&amp;gt;&lt;br /&gt;
* Manual Tests&amp;lt;br /&amp;gt;&lt;br /&gt;
** Tools&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Soap UI Free&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Burp Suite Pro&amp;lt;br /&amp;gt;&lt;br /&gt;
**** Suggested extensions:&amp;lt;br /&amp;gt;&lt;br /&gt;
***** SAML Editor&amp;lt;br /&amp;gt;&lt;br /&gt;
***** SAML Encoder / Decoder&amp;lt;br /&amp;gt;&lt;br /&gt;
***** WSDL Wizard&amp;lt;br /&amp;gt;&lt;br /&gt;
***** Wsdler&amp;lt;br /&amp;gt;&lt;br /&gt;
*** SOA Client&amp;lt;br /&amp;gt;&lt;br /&gt;
*** WSDigger (deprecated)&amp;lt;br /&amp;gt;&lt;br /&gt;
** Vulnerability Discovery&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Debug output&amp;lt;br /&amp;gt;&lt;br /&gt;
** Fuzzing&amp;lt;br /&amp;gt;&lt;br /&gt;
*** XSS&amp;lt;br /&amp;gt;&lt;br /&gt;
*** SQLi&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Malformed XML&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Malicious Attachment/File Upload&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Xpath Injection&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Improper Boundary Checking&amp;lt;br /&amp;gt;&lt;br /&gt;
*** XML Bomb (DoS)&amp;lt;br /&amp;gt;&lt;br /&gt;
*** Basic Authentication&amp;lt;br /&amp;gt;&lt;br /&gt;
*** SSL/TLS Failback&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Testing REST Based Web Services==&lt;br /&gt;
&lt;br /&gt;
There is already a great cheat sheet on how to properly test the security of REST based web services. You can find the guide at the following location: &amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/REST_Assessment_Cheat_Sheet] https://www.owasp.org/index.php/REST_Assessment_Cheat_Sheet&lt;br /&gt;
&lt;br /&gt;
==Testing Summary==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;While using automated tools, the penetration tester will need to validate all reported findings manually and perform due diligence false positive analysis for each vulnerability reported. During the manual phase of testing, the penetration tester will look for the existence of vulnerabilities missed by the automated tools and will validate automated tool output as necessary.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;[http://www.securestate.com/Insights/Documents/WhitePapers/Dont-Drop-the-SOAP-Whitepaper.pdf] http://www.securestate.com/Insights/Documents/WhitePapers/Dont-Drop-the-SOAP-Whitepaper.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://resources.infosecinstitute.com/web-services/] http://resources.infosecinstitute.com/web-services/&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://resources.infosecinstitute.com/web-services-penetration-testing-part-1/] http://resources.infosecinstitute.com/web-services-penetration-testing-part-1/&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://resources.infosecinstitute.com/web-services-penetration-testing-part-2-automated-approach-soapui-pro/] http://resources.infosecinstitute.com/web-services-penetration-testing-part-2-automated-approach-soapui-pro/&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://resources.infosecinstitute.com/web-services-pen-test-part-3-automation-appscan-webinspect/] http://resources.infosecinstitute.com/web-services-pen-test-part-3-automation-appscan-webinspect/&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=J-uO0ELZ2rk] https://www.youtube.com/watch?v=J-uO0ELZ2rk&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www-01.ibm.com/support/docview.wss?uid=swg21404788] http://www-01.ibm.com/support/docview.wss?uid=swg21404788&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/Web_Service_Security_Cheat_Sheet] https://www.owasp.org/index.php/Web_Service_Security_Cheat_Sheet&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.pushtotest.com/blogs/60-the-cohen-blog/697-web-security-test-solutions-with-testmaker-and-soapui.html] http://www.pushtotest.com/blogs/60-the-cohen-blog/697-web-security-test-solutions-with-testmaker-and-soapui.html&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://msdn.microsoft.com/en-us/library/ff650168.aspx] https://msdn.microsoft.com/en-us/library/ff650168.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.soapui.org/security-testing/overview-of-security-scans.html] http://www.soapui.org/security-testing/overview-of-security-scans.html&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/Web_Application_Security_Testing_Cheat_Sheet] https://www.owasp.org/index.php/Web_Application_Security_Testing_Cheat_Sheet&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://resources.infosecinstitute.com/web-services-pen-test-part-4-manual-testing-soa-client/] http://resources.infosecinstitute.com/web-services-pen-test-part-4-manual-testing-soa-client/&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://projects.webappsec.org/w/page/13247002/XML%20Entity%20Expansion] http://projects.webappsec.org/w/page/13247002/XML%20Entity%20Expansion&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/Testing_WSDL_%28OWASP-WS-002%29] https://www.owasp.org/index.php/Testing_WSDL_%28OWASP-WS-002%29&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=QLKM4USUlZs] https://www.youtube.com/watch?v=QLKM4USUlZs&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.youtube.com/watch?v=RHIkb9yEV1k] https://www.youtube.com/watch?v=RHIkb9yEV1k&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91.pdf] https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://resources.infosecinstitute.com/saml-oauth-openid/] http://resources.infosecinstitute.com/saml-oauth-openid/&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml] http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91.pdf]  https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91.pdf &amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Additional Resources==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Below are resources to help the tester learn and refine their ability to effectively test various web services.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Virtual Machines&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
* OWASP Mutillidae&amp;lt;br /&amp;gt;&lt;br /&gt;
* PenTester Lab: Axis2 Web Service and Tomcat Manager&amp;lt;br /&amp;gt;&lt;br /&gt;
* DVWS&amp;lt;br /&amp;gt;&lt;br /&gt;
* OWASP WebGoat&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Online Resources&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
* [http://www-01.ibm.com/support/docview.wss?uid=swg21288823] http://www-01.ibm.com/support/docview.wss?uid=swg21288823 &amp;lt;br /&amp;gt;&lt;br /&gt;
* [http://zero.webappsecurity.com/] http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
* [https://media.blackhat.com/bh-us-11/Johnson/BH_US_11_JohnsonEstonAbraham_Dont_Drop_the_SOAP_WP.pdf] https://media.blackhat.com/bh-us-11/Johnson/BH_US_11_JohnsonEstonAbraham_Dont_Drop_the_SOAP_WP.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
* [http://www.securitytube.net/video/11695] http://www.securitytube.net/video/11695&amp;lt;br /&amp;gt;&lt;br /&gt;
* [http://www.securitytube.net/video/8462] http://www.securitytube.net/video/8462&amp;lt;br /&amp;gt;&lt;br /&gt;
* [http://www.securitytube.net/video/1113] http://www.securitytube.net/video/1113&amp;lt;br /&amp;gt;&lt;br /&gt;
* [http://resources.infosecinstitute.com/web-services-pen-test-part-4-manual-testing-soa-client/] http://resources.infosecinstitute.com/web-services-pen-test-part-4-manual-testing-soa-client/&amp;lt;br /&amp;gt;&lt;br /&gt;
* [https://www.owasp.org/index.php/REST_Assessment_Cheat_Sheet] https://www.owasp.org/index.php/REST_Assessment_Cheat_Sheet&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Primary Author==&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
* Michael Born&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Contributing Editors/Authors==&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
* John Rogers&lt;br /&gt;
* Zac Fowler&lt;br /&gt;
* Fred Donovan&lt;br /&gt;
* Rob Temple&lt;br /&gt;
* Andrew Freeborn&lt;br /&gt;
* Sai Uday Shankar Korlimarla&lt;br /&gt;
* Robert Nordstrom&lt;br /&gt;
* Justin Williams&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Rick.mitchell</name></author>	</entry>

	</feed>