<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Riiecco</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Riiecco"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Riiecco"/>
		<updated>2026-05-01T17:52:25Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246505</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246505"/>
				<updated>2019-01-10T19:57:38Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* OWASP-SKF (draft) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF (draft)==&lt;br /&gt;
Idea 1: &lt;br /&gt;
&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
Idea 2: &lt;br /&gt;
&lt;br /&gt;
We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246504</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246504"/>
				<updated>2019-01-10T19:57:23Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* OWASP-SKF (draft) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF (draft)==&lt;br /&gt;
Idea 1: &lt;br /&gt;
&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository. &lt;br /&gt;
&lt;br /&gt;
Idea 2: &lt;br /&gt;
&lt;br /&gt;
We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=242863</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=242863"/>
				<updated>2018-08-27T18:36:29Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Milestones / Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Next major release features==&lt;br /&gt;
* Implement the MASVS Knowledge base items in the OWASP-SKF project &lt;br /&gt;
&lt;br /&gt;
* Implement MASVS process flow under the new project section &lt;br /&gt;
* Implement dynamic checklist creation for custom checklists to process flow under the new project section &lt;br /&gt;
* Add CWE to Knowledge base items &lt;br /&gt;
* Add how to pentest section per Knowledge base item (OWASP-Testing Guide)  &lt;br /&gt;
* Add internationalist feature to SKF for supporting multiple human languages  &lt;br /&gt;
* Market and brand the new AI chat-bot implementation  &lt;br /&gt;
* Add dynamic questionnaire creation that links questions to security requirements  &lt;br /&gt;
&lt;br /&gt;
Check out the detailed roadmap here: &lt;br /&gt;
&lt;br /&gt;
'''[https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=231535</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=231535"/>
				<updated>2017-07-10T20:46:35Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Roadmap */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&lt;br /&gt;
* http://www.secureby.design&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel.png]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add generic Selenium test cases for the pre-development and post-development security controls.&lt;br /&gt;
  - Add current code examples and refer them in the advices of the pre-development and post-development items.&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Explain the SDLC more in-depth on our website and OWASP wiki page.&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== CI-Pipeline ==&lt;br /&gt;
&lt;br /&gt;
=== Travis-ci.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes! SKF Build details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://travis-ci.org/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coveralls.io Python: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite. SKF Coveralls details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://coveralls.io/r/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== codecov.io for Angular: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Code coverage done right. Highly integrated with GitHub, Bitbucket and GitLab. SKF codecov details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://codecov.io/gh/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrutinizer-ci.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality. SKF Scrutinizer details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://scrutinizer-ci.com/g/blabla1337/skf-flask/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Bithound.io NPM packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;BitHound provides your Node team with comprehensive and prioritized issues in your code and npm packages. SKF Bithound details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.bithound.io/github/blabla1337/skf-flask&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Requires.io pip packages: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Stay Up-to-date! Stay secure! Requires.io monitors your Python projects dependencies, and notify you whenever any of your dependency is out-of-date. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://requires.io/github/blabla1337/skf-flask/requirements/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Black Duck Security Risk: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Announcing Black Duck CoPilot, a new service helping open source project teams catalog and report on their project's dependencies. SKF Requires details:&amp;lt;/code&amp;gt; &lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://copilot.blackducksoftware.com/github/groups/blabla1337/locations/skf-flask/public/results&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== uptimerobot.com: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== ssllabs.com &amp;amp; sslbadge.org: ===&lt;br /&gt;
 &amp;lt;code&amp;gt;ssllabs.org: Bringing you the best SSL/TLS and PKI testing tools and documentation. sslbadge.org: Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&amp;lt;/code&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=231532</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=231532"/>
				<updated>2017-07-10T20:04:04Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Travis-ci.org: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide with Chef:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-automated-installation-with-chef&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide for AWS:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-aws-installation&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add generic Selenium test cases for the pre-development and post-development security controls.&lt;br /&gt;
  - Add current code examples and refer them in the advices of the pre-development and post-development items.&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Explain the SDLC more in-depth on our website and OWASP wiki page.&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=231531</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=231531"/>
				<updated>2017-07-10T19:58:56Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Use SKF to gather the right security requirements for your projects&lt;br /&gt;
* SKF then gives extensive knowledgebase items that correlates to the security requirements&lt;br /&gt;
* Developers can close &amp;quot;tickets&amp;quot; and leave an audit trail to determine possible technical depts or improvements&lt;br /&gt;
* Security specialist can follow the &amp;quot;tickets&amp;quot; and audit trail and verify or Fail closed items and provide feedback.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide with Chef:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-automated-installation-with-chef&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide for AWS:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-aws-installation&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br /&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add generic Selenium test cases for the pre-development and post-development security controls.&lt;br /&gt;
  - Add current code examples and refer them in the advices of the pre-development and post-development items.&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Explain the SDLC more in-depth on our website and OWASP wiki page.&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
&lt;br /&gt;
;[[user:Foobar|Glenn ten Cate]]&lt;br /&gt;
;[[user:Riccardo_ten_Cate|Riccardo ten Cate]]&lt;br /&gt;
;Alexander Kaasjager&lt;br /&gt;
;John Haley&lt;br /&gt;
;Daniel Paulus&lt;br /&gt;
;Erik de Kuijper&lt;br /&gt;
;Roderick Schaefer&lt;br /&gt;
;[[user:Jmanico|Jim Manico]]&lt;br /&gt;
;Martijn Gijsberti Hodenpijl&lt;br /&gt;
;Bithin Alangot&lt;br /&gt;
;[[user:Knoblochmartin|Martin Knobloch]]&lt;br /&gt;
;Adam Fisher&lt;br /&gt;
;Tom wirschell&lt;br /&gt;
;[[user:johestephan|Joerg Stephan]]&lt;br /&gt;
;Mihai Roman	&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225509</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225509"/>
				<updated>2017-01-23T23:21:47Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field enumeration ===&lt;br /&gt;
&lt;br /&gt;
This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
&lt;br /&gt;
The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
&lt;br /&gt;
ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
* Helper classes with code completion for commonly required functionality&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages &lt;br /&gt;
showing how to prevent hackers gaining access and running exploits on your application.&lt;br /&gt;
&lt;br /&gt;
*In a nutshell*&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development (Security by design, early feedback of possible security issues)&lt;br /&gt;
&lt;br /&gt;
- Security support post-development(Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org or glenn.ten.cate@owasp.org and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Adding  features.&lt;br /&gt;
* Adding  functions&lt;br /&gt;
* Adding/updating  code examples.&lt;br /&gt;
* Adding/updating Knowledgebase items.&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required.&lt;br /&gt;
* For writing /updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225508</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225508"/>
				<updated>2017-01-23T23:21:23Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field enumeration ===&lt;br /&gt;
&lt;br /&gt;
This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
&lt;br /&gt;
The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
&lt;br /&gt;
ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
* Helper classes with code completion for commonly required functionality&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages &lt;br /&gt;
showing how to prevent hackers gaining access and running exploits on your application.&lt;br /&gt;
&lt;br /&gt;
*In a nutshell*&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development (Security by design, early feedback of possible security issues)&lt;br /&gt;
&lt;br /&gt;
- Security support post-development(Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org or glenn.ten.cate@owasp.org and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Adding  features.&lt;br /&gt;
* Adding  functions&lt;br /&gt;
* Adding/updating  code examples.&lt;br /&gt;
* Adding/updating Knowledgebase items.&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required.&lt;br /&gt;
* For writing /updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate&lt;br /&gt;
Glenn ten Cate&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225507</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225507"/>
				<updated>2017-01-23T23:20:19Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field enumeration ===&lt;br /&gt;
&lt;br /&gt;
This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
&lt;br /&gt;
The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
&lt;br /&gt;
ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
* Helper classes with code completion for commonly required functionality&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages &lt;br /&gt;
showing how to prevent hackers gaining access and running exploits on your application.&lt;br /&gt;
&lt;br /&gt;
*In a nutshell*&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development (Security by design, early feedback of possible security issues)&lt;br /&gt;
&lt;br /&gt;
- Security support post-development(Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org or glenn.ten.cate@owasp.org and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Adding  features.&lt;br /&gt;
* Adding  functions&lt;br /&gt;
* Adding/updating  code examples.&lt;br /&gt;
* Adding/updating Knowledgebase items.&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
1. For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
2. For writing knowledgebase items only technical knowledge of application security is required.&lt;br /&gt;
3. For writing /updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
4. For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Riccardo ten Cate&lt;br /&gt;
Glenn ten Cate&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225506</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225506"/>
				<updated>2017-01-23T23:18:41Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field enumeration ===&lt;br /&gt;
&lt;br /&gt;
This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
&lt;br /&gt;
The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
''' Mentors '''&lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
&lt;br /&gt;
ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
&lt;br /&gt;
''' Expected Results '''&lt;br /&gt;
&lt;br /&gt;
* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
* Helper classes with code completion for commonly required functionality&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
''' Knowledge Prerequisite: '''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages &lt;br /&gt;
showing how to prevent hackers gaining access and running exploits on your application.&lt;br /&gt;
&lt;br /&gt;
*In a nutshell&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
- Security support pre-development (Security by design, early feedback of possible security issues)&lt;br /&gt;
- Security support post-development(Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org or glenn.ten.cate@owasp.org and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Adding  features.&lt;br /&gt;
* Adding  functions&lt;br /&gt;
* Adding/updating  code examples.&lt;br /&gt;
* Adding/updating Knowledgebase items.&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
1. For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
2. For writing knowledgebase items only technical knowledge of application security is required.&lt;br /&gt;
3. For writing /updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
4. For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Riccardo ten Cate&lt;br /&gt;
Glenn ten Cate&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=223716</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=223716"/>
				<updated>2016-11-29T09:50:34Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide with Chef:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-automated-installation-with-chef&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide for AWS:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-aws-installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add generic Selenium test cases for the pre-development and post-development security controls.&lt;br /&gt;
  - Add current code examples and refer them in the advices of the pre-development and post-development items.&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Explain the SDLC more in-depth on our website and OWASP wiki page.&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
&lt;br /&gt;
;[[user:Foobar|Glenn ten Cate]]&lt;br /&gt;
;[[user:Riccardo_ten_Cate|Riccardo ten Cate]]&lt;br /&gt;
;Alexander Kaasjager&lt;br /&gt;
;John Haley&lt;br /&gt;
;Daniel Paulus&lt;br /&gt;
;Erik de Kuijper&lt;br /&gt;
;Roderick Schaefer&lt;br /&gt;
;[[user:Jmanico|Jim Manico]]&lt;br /&gt;
;Martijn Gijsberti Hodenpijl&lt;br /&gt;
;Bithin Alangot&lt;br /&gt;
;[[user:Knoblochmartin|Martin Knobloch]]&lt;br /&gt;
;Adam Fisher&lt;br /&gt;
;Tom wirschell&lt;br /&gt;
;[[user:johestephan|Joerg Stephan]]&lt;br /&gt;
;Mihai Roman	&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Riccardo_ten_Cate&amp;diff=219934</id>
		<title>User:Riccardo ten Cate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Riccardo_ten_Cate&amp;diff=219934"/>
				<updated>2016-08-01T20:15:58Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a penetration tester and software developer from the Netherlands Riccardo specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages.&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208552</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208552"/>
				<updated>2016-02-12T06:34:27Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman &amp;amp; Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Mark Denihan ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== O-saft by Achim Hoffman &amp;amp; Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Achim Hoffmann ... Starting with Linux/network security in the nineties. Achim Hoffmann has been working in web application security since more than 15 years. While working as a developer for web-application for several years he started concentrating on web application security as major subject in different roles like penetration tester, doing SCA and giving security workshops. He is author, co-author and maintainer of various papers about web application security at BSI (Germany), OWASP and WASC. He also published some tools (EnDe, EMiR, ReDoS, O-Saft) which aim to make web application security more visible. Achim is owner of sic[!]sec GmbH, Germany, a company that provides information security services. Outside work he is German OWASP Board Member and helps maintaining OWASP's mailing lists.&lt;br /&gt;
* Torsten Gigler ... Internernal Security Consultant in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || University Luxembourg || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208551</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208551"/>
				<updated>2016-02-12T06:33:46Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman &amp;amp; Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Mark Denihan ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== O-saft by Achim Hoffman &amp;amp; Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Achim Hoffmann ... Starting with Linux/network security in the nineties. Achim Hoffmann has been working in web application security since more than 15 years. While working as a developer for web-application for several years he started concentrating on web application security as major subject in different roles like penetration tester, doing SCA and giving security workshops. He is author, co-author and maintainer of various papers about web application security at BSI (Germany), OWASP and WASC. He also published some tools (EnDe, EMiR, ReDoS, O-Saft) which aim to make web application security more visible. Achim is owner of sic[!]sec GmbH, Germany, a company that provides information security services. Outside work he is German OWASP Board Member and helps maintaining OWASP's mailing lists.&lt;br /&gt;
* Torsten Gigler ... Internernal Security Consultant in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || University Luxembourg || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208550</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208550"/>
				<updated>2016-02-12T06:33:26Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Talks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman &amp;amp; Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Mark Denihan ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== O-saft by Achim Hoffman &amp;amp; Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Achim Hoffmann ... Starting with Linux/network security in the nineties. Achim Hoffmann has been working in web application security since more than 15 years. While working as a developer for web-application for several years he started concentrating on web application security as major subject in different roles like penetration tester, doing SCA and giving security workshops. He is author, co-author and maintainer of various papers about web application security at BSI (Germany), OWASP and WASC. He also published some tools (EnDe, EMiR, ReDoS, O-Saft) which aim to make web application security more visible. Achim is owner of sic[!]sec GmbH, Germany, a company that provides information security services. Outside work he is German OWASP Board Member and helps maintaining OWASP's mailing lists.&lt;br /&gt;
* Torsten Gigler ... Internernal Security Consultant in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || University Luxembourg || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=208549</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=208549"/>
				<updated>2016-02-12T06:32:45Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* The OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2016 | All OWASP NL Events 2016]]&lt;br /&gt;
= February 18th, 2016=&lt;br /&gt;
Registration: Now open via [http://www.eventbrite.nl/e/tickets-owasp-netherlands-chapter-meeting-february-18th-2016-20828755368 EventBrite]&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:Johanna Westerdijkplein 75&lt;br /&gt;
: 2521EN Den Haag&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=207696</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=207696"/>
				<updated>2016-01-29T21:16:01Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide with Chef:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-automated-installation-with-chef&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide for AWS:&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://skf.readme.io/docs/installation#section-aws-installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add generic Selenium test cases for the pre-development and post-development security controls.&lt;br /&gt;
  - Add current code examples and refer them in the advices of the pre-development and post-development items.&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Explain the SDLC more in-depth on our website and OWASP wiki page.&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
Martin Knobloch&amp;lt;br /&amp;gt;&lt;br /&gt;
Adam Fisher&amp;lt;br /&amp;gt;&lt;br /&gt;
Tom wirschell&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205932</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205932"/>
				<updated>2016-01-06T06:38:58Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Glenn en Riccardo Ten Cate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to TDD (test driven development)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to Unit testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205931</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205931"/>
				<updated>2016-01-06T06:37:21Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Glenn en Riccardo Ten Cate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to TDD (test driven development)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to Unit testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
Employed as a security engineer at Schuberg Philis in the Netherlands and speaking at multiple security conferences. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a penetration tester from the Netherlands employed at The S-Unit, Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205930</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205930"/>
				<updated>2016-01-06T06:37:07Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Glenn en Riccardo Ten Cate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to TDD (test driven development)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to Unit testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
Employed as a security engineer at Schuberg Philis in the Netherlands and speaking at multiple security conferences. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a penetration tester from the Netherlands employed at The S-Unit, Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
 has extensive knowledge in securing web applications in multiple coding languages.&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205929</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205929"/>
				<updated>2016-01-06T06:36:32Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Glenn en Riccardo Ten Cate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to TDD (test driven development)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to Unit testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
Employed as a security engineer at Schuberg Philis in the Netherlands and speaking at multiple security conferences. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&lt;br /&gt;
As a penetration tester from the Netherlands employed at The S-Unit, Riccardo specialises in web-application security and&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
 has extensive knowledge in securing web applications in multiple coding languages.&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205928</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205928"/>
				<updated>2016-01-06T06:35:43Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Glenn en Riccardo Ten Cate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to TDD (test driven development)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to Unit testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
Employed as a security engineer at Schuberg Philis in the Netherlands and speaking at multiple security conferences. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As a penetration tester from the Netherlands employed at The S-Unit Riccardo specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages.&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205927</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205927"/>
				<updated>2016-01-06T06:34:13Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* The OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to TDD (test driven development)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Introduction to Unit testing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205926</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205926"/>
				<updated>2016-01-06T06:30:43Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* The OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;In a nutshel&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205925</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205925"/>
				<updated>2016-01-06T06:30:32Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* The OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;In a nutshel&amp;lt;b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205924</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205924"/>
				<updated>2016-01-06T06:30:02Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* The OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;In a nutshel&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205923</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205923"/>
				<updated>2016-01-06T06:29:48Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* The OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;In a nutshel&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205922</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205922"/>
				<updated>2016-01-06T06:29:29Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* The OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;In a nutshel&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205921</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205921"/>
				<updated>2016-01-06T06:28:13Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* The OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205920</id>
		<title>Netherlands February 18th, 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_February_18th,_2016&amp;diff=205920"/>
				<updated>2016-01-06T06:27:41Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* The OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2015 | All OWASP NL Events 2015]]&lt;br /&gt;
= September 17th, 2015 =&lt;br /&gt;
Registration: http://owasp-netherlands-chapter-meeting-201500917.eventbrite.nl&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
;De Haagse Hogeschool&lt;br /&gt;
:TBD&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:00 - 18:45 Registration &amp;amp; Pizzas&lt;br /&gt;
:18:45 - 19:00 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:00 - 21:00 Het OWASP Security Knowledge Framework (SKF)&lt;br /&gt;
:21:00 - 21:30 Networking&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
=== The OWASP Security Knowledge Framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Glenn en Riccardo Ten Cate===&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202917</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202917"/>
				<updated>2015-11-01T13:24:25Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Project Online Demo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://www.secureby.design&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202916</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202916"/>
				<updated>2015-11-01T13:24:06Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Project Online Demo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.secureby.design&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202915</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202915"/>
				<updated>2015-11-01T13:22:54Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* OWASP Security Knowledge Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
* Security Requirements OWASP ASVS for development and for third party vendor applications &lt;br /&gt;
* Security knowledge reference (Code examples/ Knowledge Base items)&lt;br /&gt;
* Security is part of design with the pre-development functionality in SKF&lt;br /&gt;
* Security post-development functionality in SKF for verification with the OWASP ASVS&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202914</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202914"/>
				<updated>2015-11-01T13:21:18Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202913</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202913"/>
				<updated>2015-11-01T13:20:30Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;img src=&amp;quot;http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg&amp;quot; /&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202912</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202912"/>
				<updated>2015-11-01T13:19:51Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:http://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202911</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202911"/>
				<updated>2015-11-01T13:19:36Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:https://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202910</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=202910"/>
				<updated>2015-11-01T13:19:03Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:https://www.securityknowledgeframework.org/img/banner-wiki-owasp.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Security Knowledge Framework &amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Riccardo_ten_Cate&amp;diff=202516</id>
		<title>User:Riccardo ten Cate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Riccardo_ten_Cate&amp;diff=202516"/>
				<updated>2015-10-22T19:20:02Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Penetration tester @ The S-unit from The Netherlands.&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198888</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198888"/>
				<updated>2015-08-11T19:50:09Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Demo video */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video demo ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198887</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198887"/>
				<updated>2015-08-11T19:49:51Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Video Demo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Demo video ==&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198886</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198886"/>
				<updated>2015-08-11T19:49:06Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Video Demo ==&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198885</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198885"/>
				<updated>2015-08-11T19:47:29Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Video Demo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Video Demo ==&lt;br /&gt;
''''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198884</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198884"/>
				<updated>2015-08-11T19:47:20Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Video Demo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Video Demo ==&lt;br /&gt;
''Watch''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198883</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198883"/>
				<updated>2015-08-11T19:46:23Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Video Demo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Video Demo ==&lt;br /&gt;
''Video:''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198882</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=198882"/>
				<updated>2015-08-11T19:46:07Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the &amp;lt;i&amp;gt;Secure Software Development Lifecycle&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The 4 Core usage of SKF:&lt;br /&gt;
&lt;br /&gt;
- Security Requirements OWASP ASVS for development and for third party vendor applications &amp;lt;br&amp;gt;&lt;br /&gt;
- Security knowledge reference (Code examples/ Knowledge Base items)&amp;lt;br&amp;gt;&lt;br /&gt;
- Security is part of design with the pre-development functionality in SKF&amp;lt;br&amp;gt;&lt;br /&gt;
- Security post-development functionality in SKF for verification with the OWASP ASVS &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;OWASP Security Knowledge Framework&amp;lt;/i&amp;gt; is an expert system web-application that uses the OWASP Application Security Verification Standard and other resources. It can be used to support developers in pre-development (security by design) as well as after code is released (OWASP ASVS Level 1-3).&lt;br /&gt;
&lt;br /&gt;
== Why Use The OWASP Security Knowledge Framework? ==&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:125px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Video Demo ==&lt;br /&gt;
''Video:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.youtube.com/watch?v=ogzCVtI8-qE&amp;amp;feature=youtu.be&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Download ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Online Demo ==&lt;br /&gt;
'''username: admin password: test-skf'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://demo.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Project website:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://www.securityknowledgeframework.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project OWASP-SKF Pebble ==&lt;br /&gt;
'''Released OWASP-SKF Pebble in the Appstore for free'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://apps.getpebble.com/en_US/application/556b65b8389795176b000042&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Documentation=&lt;br /&gt;
&lt;br /&gt;
For detailed information, documentation, tutorials and guide's please visit:&amp;lt;br&amp;gt;&lt;br /&gt;
https://skf.readme.io&amp;lt;br&amp;gt;&lt;br /&gt;
OR&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.securityknowledgeframework.org&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Slides of workshop DevOpsDays 2015 Amsterdam:&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/5/54/Skf-design-workshop.pptx.pdf&lt;br /&gt;
&lt;br /&gt;
= Roadmap and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: ''' [https://waffle.io/blabla1337/skf-flask Online Scrum Board] '''&lt;br /&gt;
&lt;br /&gt;
  - Add code examples -&amp;gt; relevant knowledge-base items in results&lt;br /&gt;
  - Add CWE to checklists&lt;br /&gt;
  - Add user management&lt;br /&gt;
  - Add Python code examples&lt;br /&gt;
  - Add Java code examples&lt;br /&gt;
  - Add Go/Ruby/??? code examples&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Check Travis status if build is still working&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your sample code or knowledge-base item and add it to the master repo.&lt;br /&gt;
&lt;br /&gt;
= SKF SDLC =&lt;br /&gt;
&lt;br /&gt;
SKF uses the following services to provide quality over the code and releases.&lt;br /&gt;
&lt;br /&gt;
== Travis-ci.org:==&lt;br /&gt;
Test and Deploy with Confidence. Easily sync your GitHub projects with Travis CI and you'll be testing your code in minutes!&lt;br /&gt;
SKF Build details:&lt;br /&gt;
&lt;br /&gt;
https://travis-ci.org/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Coveralls.io:==&lt;br /&gt;
DELIVER BETTER CODE. We help developers deliver code confidently by showing which parts of your code aren't covered by your test suite.&lt;br /&gt;
SKF Coveralls details:&lt;br /&gt;
&lt;br /&gt;
https://coveralls.io/r/blabla1337/skf-flask&lt;br /&gt;
&lt;br /&gt;
== Scrutinizer-ci.com==&lt;br /&gt;
Why to use Scrutinizer. Improve code quality and find bugs before they hit production with our continuous inspection platform. Improve Code Quality.&lt;br /&gt;
SKF Scrutinizer details:&lt;br /&gt;
&lt;br /&gt;
https://scrutinizer-ci.com/g/blabla1337/skf-flask/&lt;br /&gt;
&lt;br /&gt;
== Uptimerobot.com==&lt;br /&gt;
Monitor HTTP(s), Ping, Port and check Keywords. Get alerted via e-mail, SMS, Twitter, web-hooks or push. View uptime, downtime and response times.&lt;br /&gt;
&lt;br /&gt;
== ssllabs.com &amp;amp; sslbadge.org ==&lt;br /&gt;
&lt;br /&gt;
ssllabs.org:&lt;br /&gt;
Bringing you the best SSL/TLS and PKI testing tools and documentation.&lt;br /&gt;
https://www.ssllabs.com/ssltest/analyze.html?d=securityknowledgeframework.org&lt;br /&gt;
&lt;br /&gt;
sslbadge.org:&lt;br /&gt;
Creates a nice badge for your website SSL/TLS security settings based on the Qualys SSL Labs testing.&lt;br /&gt;
&lt;br /&gt;
= Contributors =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
Roderick Schaefer&amp;lt;br /&amp;gt;&lt;br /&gt;
Jim Manico&amp;lt;br /&amp;gt;&lt;br /&gt;
Martijn Gijsberti Hodenpijl&amp;lt;br /&amp;gt;&lt;br /&gt;
Bithin Alangot&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you to my colleagues at Schuberg Philis for helping and giving feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=195107</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=195107"/>
				<updated>2015-05-21T09:19:21Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework Project==&lt;br /&gt;
The OWASP Security Knowledge Framework Project is intended to be a tool used for building, verification and training. It's the first step in the Software (AND Security) Development Life Cycle.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
It is an expert system web-application that uses OWASP Application Security Verification Standard.&lt;br /&gt;
It support developers in pre-development (Security by design)&lt;br /&gt;
It support developers after release of code (OWASP Checklist Level 1-3)&lt;br /&gt;
Code-examples&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/v1.0/docs/installation&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Video tutorials:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Pre development stage:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/wETuGtaCCfc&lt;br /&gt;
Post development stage:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/ntmiLNH_ECI&lt;br /&gt;
Knowledge base:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/p1bQQmLY7CA&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:black;&amp;quot;&amp;gt;&lt;br /&gt;
	'''[24-03-2015:]''' &amp;lt;br/&amp;gt; First Stable release of the Security Knowledge Framework! Easy install with: pip install owasp-skf Check out the Github page for more details. Unix and Windows support&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:black;&amp;quot;&amp;gt;&lt;br /&gt;
	'''[17-03-2015:]''' &amp;lt;br/&amp;gt; First Alpha release of the Security Knowledge Framework!&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
For documentation, tutorials and guide's please visit:&lt;br /&gt;
http://www.securityknowledgeframework.com,&lt;br /&gt;
for more detailed information.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Allot of colleagues at Schuberg Philis for helping and giving feedback.&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you guys, let's make it more Awesome!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: [https://waffle.io/blabla1337/skf-flask Online Scrum Board]&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your code example or knowledge-base item and add it to the master repo&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
We already had allot of the content and experience with the expert system that we created in the PoC version build with PHP.&amp;lt;br/&amp;gt;&lt;br /&gt;
The goal is to deliver an web-application that is easy to set-up and can run on different OS.&amp;lt;br&amp;gt;&lt;br /&gt;
For this we chosen the [http://flask.pocoo.org/ Python Flask], this runs both on Windows as Linux and is easy to install.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=195106</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=195106"/>
				<updated>2015-05-21T09:18:44Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework Project==&lt;br /&gt;
The OWASP Security Knowledge Framework Project is intended to be a tool used for building, verification and training. It's the first step in the Software (AND Security) Development Life Cycle.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
It is an expert system web-application that uses OWASP Application Security Verification Standard.&lt;br /&gt;
It support developers in pre-development (Security by design)&lt;br /&gt;
It support developers after release of code (OWASP Checklist Level 1-3)&lt;br /&gt;
Code-examples&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide and extended documentation:&amp;lt;/b&amp;gt;&lt;br /&gt;
* http://skf.readme.io/&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Video tutorials:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Pre development stage:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/wETuGtaCCfc&lt;br /&gt;
Post development stage:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/ntmiLNH_ECI&lt;br /&gt;
Knowledge base:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/p1bQQmLY7CA&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:black;&amp;quot;&amp;gt;&lt;br /&gt;
	'''[24-03-2015:]''' &amp;lt;br/&amp;gt; First Stable release of the Security Knowledge Framework! Easy install with: pip install owasp-skf Check out the Github page for more details. Unix and Windows support&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:black;&amp;quot;&amp;gt;&lt;br /&gt;
	'''[17-03-2015:]''' &amp;lt;br/&amp;gt; First Alpha release of the Security Knowledge Framework!&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
For documentation, tutorials and guide's please visit:&lt;br /&gt;
http://www.securityknowledgeframework.com,&lt;br /&gt;
for more detailed information.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Allot of colleagues at Schuberg Philis for helping and giving feedback.&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you guys, let's make it more Awesome!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: [https://waffle.io/blabla1337/skf-flask Online Scrum Board]&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your code example or knowledge-base item and add it to the master repo&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
We already had allot of the content and experience with the expert system that we created in the PoC version build with PHP.&amp;lt;br/&amp;gt;&lt;br /&gt;
The goal is to deliver an web-application that is easy to set-up and can run on different OS.&amp;lt;br&amp;gt;&lt;br /&gt;
For this we chosen the [http://flask.pocoo.org/ Python Flask], this runs both on Windows as Linux and is easy to install.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=194736</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=194736"/>
				<updated>2015-05-11T21:25:36Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework Project==&lt;br /&gt;
The OWASP Security Knowledge Framework Project is intended to be a tool used for building, verification and training. It's the first step in the Software (AND Security) Development Life Cycle.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
It is an expert system web-application that uses OWASP Application Security Verification Standard.&lt;br /&gt;
It support developers in pre-development (Security by design)&lt;br /&gt;
It support developers after release of code (OWASP Checklist Level 1-3)&lt;br /&gt;
Code-examples&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask/blob/master/README.md&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Video tutorials:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Pre development stage:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/wETuGtaCCfc&lt;br /&gt;
Post development stage:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/ntmiLNH_ECI&lt;br /&gt;
Knowledge base:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/p1bQQmLY7CA&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:black;&amp;quot;&amp;gt;&lt;br /&gt;
	'''[24-03-2015:]''' &amp;lt;br/&amp;gt; First Stable release of the Security Knowledge Framework! Easy install with: pip install owasp-skf Check out the Github page for more details. Unix and Windows support&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:black;&amp;quot;&amp;gt;&lt;br /&gt;
	'''[17-03-2015:]''' &amp;lt;br/&amp;gt; First Alpha release of the Security Knowledge Framework!&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
For documentation, tutorials and guide's please visit:&lt;br /&gt;
http://www.securityknowledgeframework.com,&lt;br /&gt;
for more detailed information.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Allot of colleagues at Schuberg Philis for helping and giving feedback.&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you guys, let's make it more Awesome!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: [https://waffle.io/blabla1337/skf-flask Online Scrum Board]&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your code example or knowledge-base item and add it to the master repo&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
We already had allot of the content and experience with the expert system that we created in the PoC version build with PHP.&amp;lt;br/&amp;gt;&lt;br /&gt;
The goal is to deliver an web-application that is easy to set-up and can run on different OS.&amp;lt;br&amp;gt;&lt;br /&gt;
For this we chosen the [http://flask.pocoo.org/ Python Flask], this runs both on Windows as Linux and is easy to install.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=194735</id>
		<title>OWASP Security Knowledge Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Knowledge_Framework&amp;diff=194735"/>
				<updated>2015-05-11T21:25:06Z</updated>
		
		<summary type="html">&lt;p&gt;Riiecco: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework Project==&lt;br /&gt;
The OWASP Security Knowledge Framework Project is intended to be a tool used for building, verification and training. It's the first step in the Software (AND Security) Development Life Cycle.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
It is an expert system web-application that uses OWASP Application Security Verification Standard.&lt;br /&gt;
It support developers in pre-development (Security by design)&lt;br /&gt;
It support developers after release of code (OWASP Checklist Level 1-3)&lt;br /&gt;
Code-examples&lt;br /&gt;
&lt;br /&gt;
Our experience taught us that the current level of security the current web-applications contain is not sufficient enough to ensure security. This is mainly because web-developers simpy aren't aware of the risks and dangers are lurking, waiting to be exploited by hackers. &lt;br /&gt;
&lt;br /&gt;
Because of this we decided to develop a security tool in order to create a guide system available for all developers so they can develop applications secure by design.&lt;br /&gt;
&lt;br /&gt;
The security knowledge framework is here to support developers create secure applications. By analysing proccessing techniques in which the developers use to edit their data the application can link these techniques to different known vulnerabilities and give the developer feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner. &lt;br /&gt;
&lt;br /&gt;
The seccond stage of the application is validating if the developer properly implemented different types of defense mechanisms by means of&lt;br /&gt;
different checklists such as the application security verification standards.&lt;br /&gt;
&lt;br /&gt;
By means of the answers supplied by the developer the application again generates documentation in which it gives feedback on what defense mechanisms he forgot to implement and give him feedback regarding descriptions and solutions on how to properly implement these techniques in a safe manner.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
'''Github/source-code:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Guide's and tutorials:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Installation guide&amp;lt;/b&amp;gt;&lt;br /&gt;
* https://github.com/blabla1337/skf-flask/blob/master/README.md&amp;lt;br/&amp;gt;&lt;br /&gt;
* http://www.securityknowledgeframework.org/index.html?#guide&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Video tutorials:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Pre development stage:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/wETuGtaCCfc&lt;br /&gt;
Post development stage:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/ntmiLNH_ECI&lt;br /&gt;
Knowledge base:&amp;lt;br/&amp;gt;&lt;br /&gt;
* https://youtu.be/p1bQQmLY7CA&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[mailto:glenntencate@gmail.com Glenn ten Cate]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:r.tencate77@gmail.com Riccardo ten Cate]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:black;&amp;quot;&amp;gt;&lt;br /&gt;
	'''[24-03-2015:]''' &amp;lt;br/&amp;gt; First Stable release of the Security Knowledge Framework! Easy install with: pip install owasp-skf Check out the Github page for more details. Unix and Windows support&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:black;&amp;quot;&amp;gt;&lt;br /&gt;
	'''[17-03-2015:]''' &amp;lt;br/&amp;gt; First Alpha release of the Security Knowledge Framework!&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
For documentation, tutorials and guide's please visit:&lt;br /&gt;
http://www.securityknowledgeframework.com,&lt;br /&gt;
for more detailed information.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Riccardo ten Cate&amp;lt;br/&amp;gt;&lt;br /&gt;
Alexander Kaasjager&amp;lt;br/&amp;gt;&lt;br /&gt;
John Haley&amp;lt;br /&amp;gt;&lt;br /&gt;
Daniel Paulus&amp;lt;br /&amp;gt;&lt;br /&gt;
Erik de Kuijper&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Allot of colleagues at Schuberg Philis for helping and giving feedback.&amp;lt;br/&amp;gt;&lt;br /&gt;
Thank you guys, let's make it more Awesome!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
Check out the: [https://waffle.io/blabla1337/skf-flask Online Scrum Board]&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Submitting a Pull Request on Guthub:&lt;br /&gt;
&lt;br /&gt;
    Fork it.&lt;br /&gt;
    Create a branch (git checkout -b my_markup)&lt;br /&gt;
    Commit your changes (git commit -am &amp;quot;Added Snarkdown&amp;quot;)&lt;br /&gt;
    Push to the branch (git push origin my_markup)&lt;br /&gt;
    Open a Pull Request&lt;br /&gt;
    &lt;br /&gt;
One of the authors will check your code example or knowledge-base item and add it to the master repo&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
We already had allot of the content and experience with the expert system that we created in the PoC version build with PHP.&amp;lt;br/&amp;gt;&lt;br /&gt;
The goal is to deliver an web-application that is easy to set-up and can run on different OS.&amp;lt;br&amp;gt;&lt;br /&gt;
For this we chosen the [http://flask.pocoo.org/ Python Flask], this runs both on Windows as Linux and is easy to install.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Riiecco</name></author>	</entry>

	</feed>