<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shivam+Dixit</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shivam+Dixit"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Shivam_Dixit"/>
		<updated>2026-05-10T12:07:07Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=222527</id>
		<title>OWASP Vulnerable Web Applications Directory Project/Pages/Offline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=222527"/>
				<updated>2016-10-19T18:12:40Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ Damn Vulnerable Node Application - DVNA ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ download]&lt;br /&gt;
| Claudio Lacayo&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download]&lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download]&lt;br /&gt;
| Secure Ideas&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download]&lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://code.google.com/p/owasp-hackademic-challenges/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Juice_Shop_Project Juice Shop]&lt;br /&gt;
| Node/JS&lt;br /&gt;
| [https://github.com/bkimminich/juice-shop download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project NodeGoat ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/OWASP/NodeGoat git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download]&lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/owaspshepherd/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sqlmapproject/testenv SQL injection test environment]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| SQLmap Project&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository]&lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sectooladdict/wavsep WAVSEP - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/wavsep/ download (builds)] [https://code.google.com/p/wavsep/downloads/list download (old)] [https://github.com/sectooladdict/wavsep/wiki wiki]&lt;br /&gt;
| Shay Chen&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/shivamdixit/WebGoatPHP WebGoatPHP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/OWASP/OWASPWebGoatPHP git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa Xtreme Vulnerable Web Application (XVWA)]&lt;br /&gt;
| PHP/MySQL&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa download]&lt;br /&gt;
| @s4n7h0, @samanL33T&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=222525</id>
		<title>OWASP Vulnerable Web Applications Directory Project/Pages/Offline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline&amp;diff=222525"/>
				<updated>2016-10-19T18:09:49Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ Damn Vulnerable Node Application - DVNA ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/quantumfoam/DVNA/ download]&lt;br /&gt;
| Claudio Lacayo&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download]&lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download]&lt;br /&gt;
| Secure Ideas&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download]&lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://code.google.com/p/owasp-hackademic-challenges/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download]&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Juice_Shop_Project Juice Shop]&lt;br /&gt;
| Node/JS&lt;br /&gt;
| [https://github.com/bkimminich/juice-shop download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://github.com/jerryhoff/WebGoat.NET git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Node_js_Goat_Project NodeGoat ]&lt;br /&gt;
| Node.js&lt;br /&gt;
| [https://github.com/OWASP/NodeGoat git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
| &lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download]&lt;br /&gt;
| Stanford&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/owaspshepherd/ download]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sqlmapproject/testenv SQL injection test environment]&lt;br /&gt;
| PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| SQLmap Project&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository]&lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sectooladdict/wavsep WAVSEP - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://sourceforge.net/projects/wavsep/ download (builds)] [https://code.google.com/p/wavsep/downloads/list download (old)] [https://github.com/sectooladdict/wavsep/wiki wiki]&lt;br /&gt;
| Shay Chen&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide]&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/shivamdixit/WebGoatPHP WebGoatPHP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/shivamdixit/WebGoatPHP git repository]&lt;br /&gt;
| OWASP&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa Xtreme Vulnerable Web Application (XVWA)]&lt;br /&gt;
| PHP/MySQL&lt;br /&gt;
| [https://github.com/s4n7h0/xvwa download]&lt;br /&gt;
| @s4n7h0, @samanL33T&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=222362</id>
		<title>WebGoatPHP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=222362"/>
				<updated>2016-10-12T17:49:23Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:200px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP_Project_Header.jpg]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a port of WebGoat to PHP and MySQL/SQLite databases. The goal is to create an interactive teaching environment for web application security by offering lessons in the form of challenges. In each challenge the user must exploit the vulnerability to demonstrate their understanding.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/OWASP/OWASPWebGoatPHP GitHub Repo]&lt;br /&gt;
&lt;br /&gt;
==What is WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a deliberately insecure web application developed using PHP to teach web application security. It offers a set of challenges based on various vulnerabilities listed in OWASP. The application is a realistic teaching environment and supports four different modes. &lt;br /&gt;
&lt;br /&gt;
==Why WebGoatPHP?==&lt;br /&gt;
WebGoatPHP is suitable for:&lt;br /&gt;
&lt;br /&gt;
* Web Developers, to learn how to develop secure web applications&lt;br /&gt;
* Penetration Testers, to learn the different kinds of attacking scenarios &lt;br /&gt;
* Teachers, to interactively teach students about web application security&lt;br /&gt;
&lt;br /&gt;
==Contribute==&lt;br /&gt;
To contribute, fork the code on [https://github.com/shivamdixit/WebGoatPHP GitHub] and send a pull request.&lt;br /&gt;
Join the discussion on our [https://lists.owasp.org/mailman/listinfo/owasp_webgoatphp mailing list]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Different Operating Modes==&lt;br /&gt;
* Single User Mode&lt;br /&gt;
* Workshop Mode&lt;br /&gt;
* Contest Mode&lt;br /&gt;
* Secure Coding Mode&lt;br /&gt;
&lt;br /&gt;
==Types Of Challenges==&lt;br /&gt;
* Access Control Flaws&lt;br /&gt;
* AJAX Security&lt;br /&gt;
* Authentication Flaws&lt;br /&gt;
* Code Quality&lt;br /&gt;
* Injection Attacks&lt;br /&gt;
* Cross-Site Scripting(XSS) Attacks&lt;br /&gt;
* Brute Force Attacks&lt;br /&gt;
* Session Management Flaws&lt;br /&gt;
* Improper Error Handling&lt;br /&gt;
&lt;br /&gt;
==Major Contributors==&lt;br /&gt;
*[[User:Azzeddine_RAMRAMI|Azzeddine]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
*[[User:Shivam_Dixit|Shivam Dixit]]&lt;br /&gt;
*[[User:Johanna_Curiel|Johanna Curiel]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/shivamdixit/WebGoatPHP/archive/master.zip OWASP WebGoatPHP] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Post issues in CodeBounty.com for fixing&lt;br /&gt;
*Project adoption and kick off February 2016&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=221037</id>
		<title>WebGoatPHP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=221037"/>
				<updated>2016-09-05T19:23:54Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:200px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP_Project_Header.jpg]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a port of WebGoat to PHP and MySQL/SQLite databases. The goal is to create an interactive teaching environment for web application security by offering lessons in the form of challenges. In each challenge the user must exploit the vulnerability to demonstrate their understanding.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/shivamdixit/WebGoatPHP GitHub Repo]&lt;br /&gt;
&lt;br /&gt;
==What is WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a deliberately insecure web application developed using PHP to teach web application security. It offers a set of challenges based on various vulnerabilities listed in OWASP. The application is a realistic teaching environment and supports four different modes. &lt;br /&gt;
&lt;br /&gt;
==Why WebGoatPHP?==&lt;br /&gt;
WebGoatPHP is suitable for:&lt;br /&gt;
&lt;br /&gt;
* Web Developers, to learn how to develop secure web applications&lt;br /&gt;
* Penetration Testers, to learn the different kinds of attacking scenarios &lt;br /&gt;
* Teachers, to interactively teach students about web application security&lt;br /&gt;
&lt;br /&gt;
==Contribute==&lt;br /&gt;
To contribute, fork the code on [https://github.com/shivamdixit/WebGoatPHP GitHub] and send a pull request.&lt;br /&gt;
Join the discussion on our [https://lists.owasp.org/mailman/listinfo/owasp_webgoatphp mailing list]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Different Operating Modes==&lt;br /&gt;
* Single User Mode&lt;br /&gt;
* Workshop Mode&lt;br /&gt;
* Contest Mode&lt;br /&gt;
* Secure Coding Mode&lt;br /&gt;
&lt;br /&gt;
==Types Of Challenges==&lt;br /&gt;
* Access Control Flaws&lt;br /&gt;
* AJAX Security&lt;br /&gt;
* Authentication Flaws&lt;br /&gt;
* Code Quality&lt;br /&gt;
* Injection Attacks&lt;br /&gt;
* Cross-Site Scripting(XSS) Attacks&lt;br /&gt;
* Brute Force Attacks&lt;br /&gt;
* Session Management Flaws&lt;br /&gt;
* Improper Error Handling&lt;br /&gt;
&lt;br /&gt;
==Major Contributors==&lt;br /&gt;
*[[User:Azzeddine_RAMRAMI|Azzeddine]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
*[[User:Shivam_Dixit|Shivam Dixit]]&lt;br /&gt;
*[[User:Johanna_Curiel|Johanna Curiel]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/shivamdixit/WebGoatPHP/archive/master.zip OWASP WebGoatPHP] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Post issues in CodeBounty.com for fixing&lt;br /&gt;
*Project adoption and kick off February 2016&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2015_Ideas&amp;diff=189661</id>
		<title>GSoC2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2015_Ideas&amp;diff=189661"/>
				<updated>2015-02-14T05:50:23Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* OWASP CSRF Guard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2014 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check the Hackademic wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
=== Web Sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
After a very successfull OWASP Winter Code Sprint we have a brand new Sandbox feature which uses Linux Containers to create virtual space for each user. So we can host properly vulnerable challenges and maybe execute some code server side. However, the sandbox is not fully complete, we need many features here and there to make it easily deployable and improve it's administration.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simple sandbox administration frontend for the web. -- An admin console to start and kill sandboxes manually and to list the status and resources used by each one.&lt;br /&gt;
* Secure the implementation -- Now we have a functioning prototype, we know that Linux Containers are quite safe but we haven't explicitly tested our configuration and use of them.&lt;br /&gt;
* Your idea here...&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Better sandboxing&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Linux administration and some security knowledge depending on the specific project.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Source Code testing environment - Defensive Challenges ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Student performance analytics ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
We need a better way to measure the student's performance and how it varies depending on the problem. You will write a plugin (or make changes to the core depending on your implementation proposal) to gather all sorts of performance data and present them in a meaningfull way.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A page to view performance metrics of differenct students.&lt;br /&gt;
( Hackalytics )&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML, javascript. Some understanding of analytics.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New Template ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
We need a cool new template since the old one is getting pretty old.&lt;br /&gt;
You can do it  using the latest frontend bells and whistles (like angular,bootstrap or the tools of your choice).&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A new template.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Css, HTML, javascript and/or the tools you plan on using.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Gamification ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Gamification is a feature widely used in many learning platforms out there and it would be nice if we could have it too.&lt;br /&gt;
You will need to design and implement the awards, badges and whatever other feature you have in mind. You will also implement the front and backend changes necessary to present the results.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Gamification of the platform. ( Hackademicification )&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Css, HTML, javascript and/or the tools you plan on using.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Hackademic is it's community, we always welcome new ideas and cool features. Come over to the irc channel or mailing list and propose something.&lt;br /&gt;
We'd be happy to help you get it done.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Features we didn't know we needed. ;-)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in whatever tools and languages you plan on using.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoat .NET - Vulnerable Website ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The actual WebGoat .NET is a vulnerable website built in ASP.NET using C#. There are some challenges already built in but we would like to add more vulnerable features&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_WebGoat.NET#tab=Overview&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
We want  to add more modules such as &lt;br /&gt;
*WebSockets&lt;br /&gt;
*CSRF challenge&lt;br /&gt;
*Finalise testing an upgrade to the .NET framework 4.5&lt;br /&gt;
*Retest and clean up actual modules&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in .NET, HTML and C#. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Johanna Curiel, Jerry Hoff - OWASP WebGoat Project Leaders&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
===OWASP WebGoatPHP===&lt;br /&gt;
'''Description:'''&lt;br /&gt;
[[Webgoat]] is a deliberately insecure open source software made by OWASP using Java programming language. It has a set of challenges and steps, each providing the user with one or more web application vulnerability which user tries to solve. There are also hints and auto-detection of correct solutions. &lt;br /&gt;
Since Java is not the most common web application programming language, and it doesn't have many of the bugs other languages such as PHP have when it comes to security, OWASP has [[OWASP_WebGoat_Reboot2012|dedicated in 2012]] an amount of $5000 for promotion of WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about WebGoatPHP, I suggest downloading and giving WebGoat a try. It is one of OWASP prides (about 200000 downloads).&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' WebGoatPHP first version is ready, it needs thorough testing and delivery. It also needs new challenges added and a CTF hosted on it.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' You just need to know PHP and SQL. Familiarity with web application security is recommended.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP PureCaptcha==&lt;br /&gt;
===OWASP PureCaptcha===&lt;br /&gt;
'''Description:''' &lt;br /&gt;
[[OWASP PureCaptcha]] is an OWASP project aiming to simplify CAPTCHA usage. Instead of proving rigorous APIs and many dependencies, it is a single source code file (library) that does not depend on anything and generates secure and fast CAPTCHAs, with little memory and processor footprint.&lt;br /&gt;
PureCaptcha is currently released for PHP. The candidate will port this to several other programming languages (priority on web languages) and provide full test coverage.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' PureCaptcha library for at least 3 new programming languages. Unit testing for the core version. A study on security of the generated captcha can also be performed.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisites:''' Any programming language you want to port into, as well as PHP.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Jesse Burns&lt;br /&gt;
&lt;br /&gt;
==OWASP PHP Framework==&lt;br /&gt;
===OWASP PHP Framework===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
The project has been done in the last two years, and now a framework has been built upon these libraries and security best practices. The framework intends to merge security practices with practical frameworks, and aims to be simple and lightweight.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' A secure yet robust and practical framework for PHP developers.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' This project requires at least one year of experience working with different PHP projects and frameworks. It will be too hard for someone with average PHP experience.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary&lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP RBAC Project==&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 7 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
[[OWASP RBAC project]] has already implemented this, has a wide audience and has released several minor and two major versions. Many new features and modifications are expected by the community behind this.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' OWASP RBAC project more mature by porting from PHP to other programming languages, OR adding new features and testing on the PHP version.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development skills, familiarity with one of the programming languages as well as PHP. We recommend average experience and high skills.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary, Jesse Burns&lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP PHP Widgets==&lt;br /&gt;
===OWASP PHP Widgets===&lt;br /&gt;
'''Description:''' Pull MVC (widget-based web views) has been available for many years on all major web programming languages, and even for Javascript. PHP on the other hand, lacks these and suffers a lot from forcing push MVC on its developers. There are a few libraries around, not secure and not mature at all. Providing a robust set of widgets for PHP developers not only smoothes web development process, it automatically mitigates a lot of web attacks that are based on user inputs to forms and other web elements (e.g CSRF, SQL Injection, XSS).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' OWASP PHP Widgets is currently in beta, and the candidate will spend time testing the functionalities, providing test coverage, adding new widgets and features, and building a user community.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Average PHP programming. Good experience with web applications.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Seraphimdroid==&lt;br /&gt;
&lt;br /&gt;
'''Description:''' SeraphimDroid is educational application for android devices that helps users learn about risks and threats coming from other android applications. SeraphimDroid scans your devices and teaches you about risks and threats coming from application permissions. Also this project will deliver paper on android permissions, their regular use, risks and malicious use. In second version SeraphimDroid will evolve to application firewall for android devices not allowing malicious SMS or MMS to be sent, USSD codes to be executed or calls to be called without user permission and knowledge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' After last year's GSoC first version of project was released on Google play. However, educational component, setting check, potential android widgets are still missing and would be beneficial. Also, malicious behavior prevention mechanisms should be added and some bugs should be fixed.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Average Android and JAVA programming. Knowledge of XML and SQLite Good experience with mobile applications.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Nikola Milosevic|Nikola Milosevic]]&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - VMS - OWTF Vulnerability Management System ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
We are trying to reduce the human work burden where there will be hundreds of issues listing apache out of date or php out of date. &lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
We can meta aggregate these duplicate issues into one issue of &amp;quot;outdated software / apache / php detected&amp;quot;. with XYZ list of issues in them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A separate set of scripts that allows for grouping and management of vulnerabilities (i.e. think huge assessments), to be usable *both* from inside + outside of OWTF in a separate sub-repo here: https://github.com/owtf &lt;br /&gt;
&lt;br /&gt;
VMS will have the following features:&lt;br /&gt;
* Vulnerability correlation engine which will allow for quick identification of unique vulnerability and deduplication.&lt;br /&gt;
* Vulnerability table optimization : combining redundant vulnerabilities like example : PHP &amp;lt;5.1 , PHP &amp;lt; 5.2 , PHP &amp;lt; 5.3 all suggest upgrade php so if multiple issues are reported they should be combined.&lt;br /&gt;
* Integration with existing bug tracking system like example bugzilla, jira : Should not be too hard as all such system have one or the other method exposed (REST API or similar)&lt;br /&gt;
* Fix Validation : Since we integrate with bug tracking once dev fixed the bug and code deployed we can run specific checks via * OWTF or other tool (may be specific nessus or nexpose plugin or similar.)&lt;br /&gt;
* Management Dashboard : Could be exposed to Pentester, Higher Management where stats are shown with lesser details but more of high level overview.&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/null0x00/nessus-and-reporting-karma Similar previous work for Nessus]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - HTTP Request Translator Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Problem to solve:&lt;br /&gt;
&lt;br /&gt;
There are many situations in web app pentests where just no tool will do the job and you need to script something, or mess around with the command line (classic example: sequence of steps where each step requires input from the previous step). In these situations, translating an HTTP request or a sequence of HTTP requests, takes valuable time which the pentester might just not really have.&lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
An HTTP request translator, a *standalone* *tool* that can:&lt;br /&gt;
&lt;br /&gt;
1) Be used from inside OR outside of OWTF.&lt;br /&gt;
&lt;br /&gt;
2) Translate raw HTTP requests into curl commands or bash/python/php/ruby/PowerShell scripts&lt;br /&gt;
&lt;br /&gt;
3) Provide essential quick and dirty transforms: base64 (encode/decode), urlencode (encode/decode)&lt;br /&gt;
* Transforms with boundary strings? (TBD)&lt;br /&gt;
* Individually or in bulk? (TBD)&lt;br /&gt;
&lt;br /&gt;
'''Essential Function: &amp;quot;--output&amp;quot; argument'''&lt;br /&gt;
&lt;br /&gt;
CRITICAL: The command/script should be generated so that the request is sent as literally as possible.&lt;br /&gt;
&lt;br /&gt;
Example: NO client specific headers are sent. IF the original request had &amp;quot;User-Agent: X&amp;quot;, the generated command/script should have EXACTLY that (i.e. NOT a curl user agent, etc.). Obviously, the same applies to ALL other headers.&lt;br /&gt;
&lt;br /&gt;
NOTE: Ideally the following should be implemented using an extensible plugin architecture (i.e. NEW plugins are EASY to add)&lt;br /&gt;
* http request in =&amp;gt; curl command out&lt;br /&gt;
* http request in =&amp;gt; bash script out&lt;br /&gt;
* http request in =&amp;gt; python script out&lt;br /&gt;
* http request in =&amp;gt; php script out&lt;br /&gt;
* http request in =&amp;gt; ruby script out&lt;br /&gt;
* http request in =&amp;gt; PowerShell script out&lt;br /&gt;
&lt;br /&gt;
'''Basic additional arguments:'''&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--proxy&amp;quot; argument: generates the command/script with the relevant proxy option&lt;br /&gt;
&lt;br /&gt;
		NOTE: With this the command/script may send requests through a MiTM proxy (i.e. OWTF, ZAP, Burp, etc.)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--string-search&amp;quot; argument: generates the command/script so that it:&lt;br /&gt;
&lt;br /&gt;
		1) performs the request&lt;br /&gt;
&lt;br /&gt;
		2) then searches for something in the response (i.e. literal match)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--regex-search&amp;quot; argument: generates the command/script so that it:&lt;br /&gt;
		1) performs the request&lt;br /&gt;
&lt;br /&gt;
		2) then searches for something in the response (i.e. regex match)&lt;br /&gt;
&lt;br /&gt;
'''OWTF integration'''&lt;br /&gt;
&lt;br /&gt;
The idea here, is to invoke this tool from:&lt;br /&gt;
&lt;br /&gt;
1) Single HTTP transactions:&lt;br /&gt;
&lt;br /&gt;
For example, have a button to &amp;quot;export http request&amp;quot; + then show options equivalent to the flags&lt;br /&gt;
&lt;br /&gt;
2) Multiple HTTP transactions:&lt;br /&gt;
&lt;br /&gt;
Same as with Single transactions, but letting the user &amp;quot;select a number of transactions&amp;quot; first (maybe a checkbox?).&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
'''Desired input formats:'''&lt;br /&gt;
&lt;br /&gt;
* Read raw HTTP request from stdin -Suggested default behaviour! :)-&lt;br /&gt;
&lt;br /&gt;
	Example: cat path/to/http_request.txt | http-request-translator.py --output&lt;br /&gt;
&lt;br /&gt;
* Interactive mode: read raw HTTP request from keyboard + &amp;quot;hit enter when ready&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	Suggestion: This could be a &amp;quot;-i&amp;quot; (for &amp;quot;interactive&amp;quot;) flag and/or the fallback option when &amp;quot;stdin is empty&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	Example:&lt;br /&gt;
&lt;br /&gt;
	1) User runs tool with desired flags (i.e. &amp;quot;--output ruby --proxy 127.0.0.1:1234 ...&amp;quot;, etc.)&lt;br /&gt;
&lt;br /&gt;
	2) Tool prints: &amp;quot;Please paste a raw HTTP request and hit enter when ready&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	3) User pastes a raw HTTP requests + hits enter&lt;br /&gt;
&lt;br /&gt;
	4) Tool outputs whatever is relevant for the flags + http request given&lt;br /&gt;
&lt;br /&gt;
* For bulk processing: Maybe a directory of raw http request files?&lt;br /&gt;
&lt;br /&gt;
'''Nice to have: Transforms'''&lt;br /&gt;
&lt;br /&gt;
In the context of translating raw HTTP requests into commands/scripts, what we want here is to provide some handy &amp;quot;macros&amp;quot; so that the relevant command/script is generated accordingly.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
NOTE: Assume something like the following arguments: &amp;quot;--transform-boundary=@@@@@@@ --transform-language=php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Step 1) The user provides a raw HTTP request like this:&lt;br /&gt;
&lt;br /&gt;
  GET /path/to/urlencode@@@@@@@abc d@@@@@@@/test&lt;br /&gt;
  Host: target.com&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Step 2) The tool generates a bash script like the following:&lt;br /&gt;
&lt;br /&gt;
  #!/bin/bash&lt;br /&gt;
  &lt;br /&gt;
  PARAM1=$(echo 'abc d' | php -r &amp;quot;echo urlencode(fgets(STDIN));&amp;quot;)&lt;br /&gt;
  curl ...... &amp;quot;http://target.com/path/to/$PARAM1/test&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OR a &amp;quot;curl command&amp;quot; like the following:&lt;br /&gt;
  PARAM1=$(echo 'abc d' | php -r &amp;quot;echo urlencode(fgets(STDIN));&amp;quot;); curl ...... &amp;quot;http://target.com/path/to/$PARAM1/test&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This feature can be valuable to shave a bit more time in script writing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - JavaScript Library Sniper Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
This is a project that tries to resolve a very common problem during penetration tests:&lt;br /&gt;
&lt;br /&gt;
The customer is running a number of outdated JavaScript Libraries, but there is just not enough time to determine if something useful -i.e. something *really* bad! :)- can be done with that or not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To solve this problem, we propose a *standalone* *tool* that can:&lt;br /&gt;
&lt;br /&gt;
1) Be run BOTH from inside AND outside of OWTF&lt;br /&gt;
&lt;br /&gt;
2) Build and *update* a fingerprint JavaScript library database of:&lt;br /&gt;
* Library File hashes =&amp;gt; JavaScript Library version&lt;br /&gt;
* Library File lengths =&amp;gt; JavaScript Library version&lt;br /&gt;
* (Nice to have:) As above, but for each individual github commit (possible drawback: too big?)&lt;br /&gt;
&lt;br /&gt;
3) Build and *update* a vulnerability database of:&lt;br /&gt;
* JavaScript Library version =&amp;gt; CVE - CVSS score - Vulnerability info&lt;br /&gt;
&lt;br /&gt;
4) Given a [ JavaScript file OR hash OR length ], found in the database, provides:&lt;br /&gt;
* JavaScript Library version&lt;br /&gt;
* List of vulnerabilities sorted in descending CVSS score order&lt;br /&gt;
&lt;br /&gt;
5) (very cool to have) Given a list of JavaScript files (maybe a directory), provides:&lt;br /&gt;
* ALL Library/vulnerability matches described on 4)&lt;br /&gt;
	&lt;br /&gt;
Once the standalone tool is built and verified to be working, OWTF should be able to:&lt;br /&gt;
&lt;br /&gt;
Feature 1) GREP plugin improvement (Web Application Fingerprint):&lt;br /&gt;
&lt;br /&gt;
Step 1) Lookup file lengths and hashes in the &amp;quot;JavaScript library database&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Step 2) If a match is found: provide the list of known vulnerabilities against &amp;quot;JavaScript library X&amp;quot; to the user&lt;br /&gt;
&lt;br /&gt;
Feature 2) SEMI-PASSIVE plugin improvement (Web Application Fingerprint):&lt;br /&gt;
&lt;br /&gt;
1) Requests all referenced BUT missing JavaScript files -i.e. scanners won't load JavaScript files! :)-&lt;br /&gt;
&lt;br /&gt;
2) re-runs the GREP plugin on the new files (i.e. to avoid missing vulns due to unrequested JavaScript files)&lt;br /&gt;
&lt;br /&gt;
Potential projects worth having a look for potential overlap/inspiration:&lt;br /&gt;
* [https://owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check?]&lt;br /&gt;
&lt;br /&gt;
How many JavaScript libraries should be included?&lt;br /&gt;
* As many as possible, but especially the major ones: jQuery, knockout, etc.&lt;br /&gt;
* &amp;quot;Nirvana&amp;quot; Nice to have: ALL Individual versions of ALL JavaScript files from ALL opensource projects, (ideally) even if the project is not a JavaScript library -i.e. JavaScript files from Joomla, Wordpress, etc.-&lt;br /&gt;
&lt;br /&gt;
Common JavaScript library fingerprinting techniques include:&lt;br /&gt;
* Parse the JavaScript file and grab the version from there&lt;br /&gt;
* Determine the JavaScript version based on a hash of the file&lt;br /&gt;
* Determine the JavaScript version based on the length of the file&lt;br /&gt;
&lt;br /&gt;
Other Challenges:&lt;br /&gt;
* &amp;quot;the file&amp;quot; could be &amp;quot;the minimised file&amp;quot;, &amp;quot;the expanded file&amp;quot; or even &amp;quot;a specific JavaScript file from Library X&amp;quot;&lt;br /&gt;
* When the JavaScript file does not match a specific version:&lt;br /&gt;
	1) The commit that matches the closest should (ideally) be found&lt;br /&gt;
	2) The NEXT library version after that commit (if present) should be found&lt;br /&gt;
	3) From there, it is about reusing the knowledge to figure out public vulnerabilities, CVSS scores, etc. again&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Health Monitor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
In some cases, especially on large assessments (think: &amp;gt; 30 URLs) a number of things often go wrong and OWTF needs to recover from everything, which is difficult.&lt;br /&gt;
&lt;br /&gt;
For this reason, OWTF needs an independent module, which is completely detached from OWTF (a different process), to ensure the health of the assessment is in check at all times, this includes the following:&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Alerting mechanisms'''&lt;br /&gt;
&lt;br /&gt;
When any of the monitor alerts (see below) is triggered. The OWTF user will be notified immediately through ALL of the following means:&lt;br /&gt;
* Playing an mp3 song (both local and possibly remote locations)&lt;br /&gt;
* Scan status overview on the CLI&lt;br /&gt;
* Scan status overview on the GUI&lt;br /&gt;
&lt;br /&gt;
NOTE: A configuration file from where the user can enable/disable/configure all these mechanisms is desired.&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Corrective mechanisms'''&lt;br /&gt;
&lt;br /&gt;
Corrective mechanisms are also expected in this project, these will be accomplished sending OWTF api messages such as:&lt;br /&gt;
* Stop this tool&lt;br /&gt;
* Freeze this process (to continue later)&lt;br /&gt;
* Freeze the whole scan (to continue later)&lt;br /&gt;
&lt;br /&gt;
Additional mechanisms:&lt;br /&gt;
* Show a ranking of files that take the most space&lt;br /&gt;
&lt;br /&gt;
'''Feature 3) Target monitor'''&lt;br /&gt;
&lt;br /&gt;
Brief overview:&lt;br /&gt;
&lt;br /&gt;
All target URLs are checked for availability periodically (i.e. once x 5 minutes?), if a URL in scope goes down the pentester is alerted (see above).&lt;br /&gt;
&lt;br /&gt;
Potential approach: Check if length of 1st page changes every 60 seconds.&lt;br /&gt;
&lt;br /&gt;
NOTE: It might be needed to change this on the fly.&lt;br /&gt;
&lt;br /&gt;
More background&lt;br /&gt;
&lt;br /&gt;
Consider the following scenario:&lt;br /&gt;
&lt;br /&gt;
Current Situation aka &amp;quot;problem to solve&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
1) Website X goes down during a scan&lt;br /&gt;
&lt;br /&gt;
2) the customer notices&lt;br /&gt;
&lt;br /&gt;
3) the customer tells the boss&lt;br /&gt;
&lt;br /&gt;
4) the boss tells the pentester&lt;br /&gt;
&lt;br /&gt;
5) the pentester stops the tool which was *still* trying to scan THAT target (!!!!)&lt;br /&gt;
&lt;br /&gt;
Desired situation aka &amp;quot;solution&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
It would be much more professional AND efficient that:&lt;br /&gt;
&lt;br /&gt;
1) The pentester notices&lt;br /&gt;
&lt;br /&gt;
2) The pentester tells the boss&lt;br /&gt;
&lt;br /&gt;
3) The boss tells the customer&lt;br /&gt;
&lt;br /&gt;
4) OWTF stops the tool because it knows that website is DEAD anyway&lt;br /&gt;
&lt;br /&gt;
A target monitor could easily do this with heartbeat requests + playing mp3s&lt;br /&gt;
&lt;br /&gt;
The target monitor will use the api to tell OWTF &amp;quot;this target is dead: freeze(stop?) current tests, skip target in future tests&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Feature 4) Disk space monitor'''&lt;br /&gt;
&lt;br /&gt;
Another problem that is relatively common in large assessments, is that all disk space is used and the scanning box becomes unresponsive or crashes. When this happens it is too late, the pentester may also see this coming but wonder “which are the biggest files in the filesystem that I can delete”, it is not ideal to have to look for these files in a moment when the scanning box is about to crash :).&lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
Regularly monitor how much disk space is left, especially on the partition where OWTF is writing the review (but also tool directories such as /home/username/.w3af/tmp, etc.). Keep track of files created by OWTF and all called tools and sort them by size in descending order. Then when the disk space is going low (i.e. predefined threshold), an mp3 or similar is played and this list is displayed to the user, so that they know what to delete to survive :).&lt;br /&gt;
&lt;br /&gt;
'''Feature 5) Network/Internet Connectivity monitor'''&lt;br /&gt;
&lt;br /&gt;
Sometimes it may also happen that ISP, etc. connectivity go down in the middle of a scan, this is often a very unfortunate situation since most tools are scanning in parallel and they won’t be able to produce a report OR even resume (i.e. A LOT is lost). The goal here is that OWTF does all of the following automatically:&lt;br /&gt;
&lt;br /&gt;
1) Detects the lack of connectivity&lt;br /&gt;
&lt;br /&gt;
2) Freezes all the tools (read: processes) in progress&lt;br /&gt;
&lt;br /&gt;
3) Resumes the scan when the connectivity is back.&lt;br /&gt;
&lt;br /&gt;
'''Feature 6) Tool crash detection'''&lt;br /&gt;
&lt;br /&gt;
Sometimes, certain tools (most notably, ahem, w3af), when they crash they do NOT exit. This leaves OWTF in a difficult position where 1+ process is waiting for nothing, forever (i.e. because “Tool X” will never finish)&lt;br /&gt;
&lt;br /&gt;
'''Feature 7) Tool (Plugin?) CPU/RAM/Bandwidth abuse detection and correction'''&lt;br /&gt;
&lt;br /&gt;
OWTF needs to notice when some tools crash and/or “go beserk” with RAM/CPU/Bandwidth consumption, this is different from the existing built-in checks in OWTF like “do not launch a new tool if there is less than XYZ RAM free” and more like “if tool X is using &amp;gt; XYZ of the available RAM/CPU/Bandwidth” and this is (potentially) negatively affecting other tools/tests, then throttle it.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Installation Improvements and Package manager ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
This project is to implement what was suggested in the following github issue:&lt;br /&gt;
[https://github.com/owtf/owtf/issues/192 https://github.com/owtf/owtf/issues/192]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Recently i tried to make a fresh installation of OWTF. The installation process takes too much time. Is there any way to make the installation faster?&lt;br /&gt;
Having a private server with:&lt;br /&gt;
* pre-installed files for VMs&lt;br /&gt;
* pre-configured and patched tools&lt;br /&gt;
* Merged Lists&lt;br /&gt;
* Pre-configured certificates&lt;br /&gt;
Additionally a minimal installation which will install the core of OWTF with the option of update can increase the installation speed. The update procedure will start fetching the latest file versions from the server and copy them to the right path.&lt;br /&gt;
Additional ideas are welcome.&lt;br /&gt;
&lt;br /&gt;
-- They could be hosted on Dropbox or a private VPS :)&lt;br /&gt;
&lt;br /&gt;
2 Installation Modes&lt;br /&gt;
* For high speed connections (Downloading the files uncompressed)&lt;br /&gt;
* For low speed connections (Downloading the files compressed)&lt;br /&gt;
and the installation crashed because i runned out of space in the vm&lt;br /&gt;
IMPORTANT NOTE: OWTF should check the available disk space BEFORE installation starts + warn the user if problems are likely&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Excellent reliability (i.e. proper exception handling, etc.)&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Testing Framework Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Top features'''&lt;br /&gt;
&lt;br /&gt;
In this improvement phase, the Testing Framework should:&lt;br /&gt;
* (Top Prio) Focus more on functional tests&lt;br /&gt;
For example: Improve coverage of OWASP Testing Guide, PTES, etc. (lots of room for improvement there!)&lt;br /&gt;
* (Top Prio) Put together a great wiki documentation section for contributors&lt;br /&gt;
The goal here is to help contributors write tests for the functionality that they implement. This should be as easy as possible.&lt;br /&gt;
* (Top Prio) Fix the current Travis issues :)&lt;br /&gt;
* (Nice to have) Bring the unit tests up to speed with the codebase&lt;br /&gt;
This will be challenging but very worth trying after top priorities.&lt;br /&gt;
The wiki should be heavily updated so that contributors create their own unit tests easily moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''General background'''&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Tool utilities module ===&lt;br /&gt;
&lt;br /&gt;
'''WARNING: This idea is taken from the 1st round of OWCS selections (Sept. 15th), please do NOT apply'''&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The spirit of this feature is something that may or may not be used from OWTF: These are utilities that may be chained together by OWTF OR a penetration tester using the command line. The idea is to automate mundane tasks that take time but may provide a lever to a penetration tester short on time.&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Vulnerable software version database:'''&lt;br /&gt;
&lt;br /&gt;
Implement a searchable vulnerable software version database so that a penetration tester enters a version and gets vulnerabilities sorted by criticality with MAX Impact vulnerabilities at the top (possibly: CVSS score in DESC order).&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
[http://www.cvedetails.com/vulnerability-list.php?vendor_id=74&amp;amp;product_id=128&amp;amp;version_id=149817&amp;amp;page=1&amp;amp;hasexp=0&amp;amp;opdos=0&amp;amp;opec=0&amp;amp;opov=0&amp;amp;opcsrf=0&amp;amp;opgpriv=0&amp;amp;opsqli=0&amp;amp;opxss=0&amp;amp;opdirt=0&amp;amp;opmemc=0&amp;amp;ophttprs=0&amp;amp;opbyp=0&amp;amp;opfileinc=0&amp;amp;opginf=0&amp;amp;cvssscoremin=0&amp;amp;cvssscoremax=0&amp;amp;year=0&amp;amp;month=0&amp;amp;cweid=0&amp;amp;order=3&amp;amp;trc=17&amp;amp;sha=0d26af6f3ba8ea20af18d089df40c252ea09b711 Vulnerabilities against specific software version]&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Nmap output file merger:'''&lt;br /&gt;
&lt;br /&gt;
Unify nmap files *without* losing data: XML, text and greppable formats&lt;br /&gt;
For example: Sometimes 2 scans pass through the same port, one returns the server version, the other does not, we obviously do not want to lose banner information :).&lt;br /&gt;
&lt;br /&gt;
'''Feature 3) Nmap output file vulnerability mapper'''&lt;br /&gt;
&lt;br /&gt;
From an nmap output file, get the unique software version banners, and provide a list of (maybe in tabs?):&lt;br /&gt;
&lt;br /&gt;
1) CVEs in reverse order of CVSS score, with links.&lt;br /&gt;
&lt;br /&gt;
2) Metasploit modules available for each CVE / issue&lt;br /&gt;
&lt;br /&gt;
NOTE: Can supply an *old* shell script for reference&lt;br /&gt;
&lt;br /&gt;
3) Servers/ports affected (i.e. all server / port combinations using that software version)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 4) URL target list creator:'''&lt;br /&gt;
&lt;br /&gt;
Turn all “speaks http” ports (from any nmap format) into a list of URL targets for OWTF&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 5) Hydra command creator:'''&lt;br /&gt;
&lt;br /&gt;
nmap file in =&amp;gt; Hydra command list out&lt;br /&gt;
&lt;br /&gt;
grep http auth / login pages in output files to identify login interfaces =&amp;gt; Hydra command list out&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 6) WP-scan command creator:'''&lt;br /&gt;
&lt;br /&gt;
look at all URLs (i.e. nmap file), check if they might be running word press, generate a list of suggested wp-scan commands for all targets that might be running word press&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Excellent reliability (i.e. proper exception handling, etc.)&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
We are in the process of deciding the set of ZAP projects for Google Summer of Code 2015.&lt;br /&gt;
&lt;br /&gt;
You can follow (and join in) the discussions on the ZAP Developer Group: https://groups.google.com/d/msg/zaproxy-develop/Uy0JPkzsI_s/Bj7OTSkISCIJ&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184896</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184896"/>
				<updated>2014-11-06T21:22:43Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* Task 3: WebGoatPHP logo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Latam Tour 2015 logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the Latam Tour 2015. The logo must resemble previous editions of the Tour and represent the Latin America region. It would be better if the new logo is based on the OWASP logo. As a reference, here is the Latam Tour 2014 Logo:&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/f/f3/OWASP_Latam_Tour_Logo_2014.png&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Latam Tour 2015 logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Fabio Cerullo&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Implement &amp;quot;remember me&amp;quot; feature ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 2: Make workshop mode dashboard responsive ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In workshop mode of the application, the side panel of admin dashboard is not responsive i.e it does not fits well in smaller size screen resolutions. If the screen size is small the side panel should shrink into a smaller panel preferably at the bottom of the application.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Panel perfectly adjusts on small screen resolutions.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
CSS (media queries), HTML&lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/26&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
style/dashboard.css&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 3: WebGoatPHP logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on the OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
=== Task 4: WebGoatPHP deployment screencast ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deploy the application on the local server without using vagrant and record a screencast of the process. Upload to a video streaming service and comment link on the melange for mentor to review.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The screencast should clearly contain all the steps required for the deployment and how to troubleshoot most common errors in the whole process.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with an operating system (Linux/Windows)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 5: Create a SQL injection challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Single user mode of WebGoatPHP consist of set of challenges. These challenges simulate various real world security vulnerabilities in web applications. You have to add a challenge under category &amp;quot;Injection Attacks&amp;quot; which simulates a SQL injection vulnerability in single user mode. The input data must be of type string and the challenge should mimic some real world scenario.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A challenge which helps user understand SQLi vulnerability by allowing him to exploit the vulnerability.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/SQL_Injection&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/blob/master/README.md#adding-a-lessonchallenge&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 6-20: WebGoatPHP challenges screencast series ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In this task you are required to record screencast of how to solve a particular single user mode challenge. The screencast should start by providing an overview of the vulnerability that will be exploited, then step by step instructions on how to exploit the vulnerability. The screencast should conclude on a note that how to avoid this vulnerability in your application. The length of the screencast would vary according to the challenge but it should neither be too long nor too short.&lt;br /&gt;
&lt;br /&gt;
Task    - Screencast of challenge.....&lt;br /&gt;
&lt;br /&gt;
Task 6  - HTTP Basic&lt;br /&gt;
&lt;br /&gt;
Task 7  - Using Access Control Matrix&lt;br /&gt;
&lt;br /&gt;
Task 8  - Business Layer Access Control&lt;br /&gt;
&lt;br /&gt;
Task 9  - Path Based Access Control&lt;br /&gt;
&lt;br /&gt;
Task 10 - Same Origin Policy Protection&lt;br /&gt;
&lt;br /&gt;
Task 11 - Forgot Password&lt;br /&gt;
&lt;br /&gt;
Task 12 - Discover clues in HTML&lt;br /&gt;
&lt;br /&gt;
Task 13 - JS Obfuscation&lt;br /&gt;
&lt;br /&gt;
Task 14 - XSS 1 (Reflected)&lt;br /&gt;
&lt;br /&gt;
Task 15 - XSS 2 (Stored)&lt;br /&gt;
&lt;br /&gt;
Task 16 - XSS 3 (DOM)&lt;br /&gt;
&lt;br /&gt;
Task 17 - Fail Open Authentication&lt;br /&gt;
&lt;br /&gt;
Task 18 - Log Spoofing&lt;br /&gt;
&lt;br /&gt;
Task 19 - Numeric SQL Injection&lt;br /&gt;
&lt;br /&gt;
Task 20 - XPATH injection&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A screencast explaining the vulnerability involved in a particular challenge.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184895</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184895"/>
				<updated>2014-11-06T21:15:59Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* OWASP WebGoatPHP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Latam Tour 2015 logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the Latam Tour 2015. The logo must resemble previous editions of the Tour and represent the Latin America region. It would be better if the new logo is based on the OWASP logo. As a reference, here is the Latam Tour 2014 Logo:&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/f/f3/OWASP_Latam_Tour_Logo_2014.png&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Latam Tour 2015 logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Fabio Cerullo&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Implement &amp;quot;remember me&amp;quot; feature ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 2: Make workshop mode dashboard responsive ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In workshop mode of the application, the side panel of admin dashboard is not responsive i.e it does not fits well in smaller size screen resolutions. If the screen size is small the side panel should shrink into a smaller panel preferably at the bottom of the application.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Panel perfectly adjusts on small screen resolutions.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
CSS (media queries), HTML&lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/26&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
style/dashboard.css&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 3: WebGoatPHP logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 4: WebGoatPHP deployment screencast ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deploy the application on the local server without using vagrant and record a screencast of the process. Upload to a video streaming service and comment link on the melange for mentor to review.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The screencast should clearly contain all the steps required for the deployment and how to troubleshoot most common errors in the whole process.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with an operating system (Linux/Windows)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 5: Create a SQL injection challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Single user mode of WebGoatPHP consist of set of challenges. These challenges simulate various real world security vulnerabilities in web applications. You have to add a challenge under category &amp;quot;Injection Attacks&amp;quot; which simulates a SQL injection vulnerability in single user mode. The input data must be of type string and the challenge should mimic some real world scenario.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A challenge which helps user understand SQLi vulnerability by allowing him to exploit the vulnerability.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/SQL_Injection&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/blob/master/README.md#adding-a-lessonchallenge&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 6-20: WebGoatPHP challenges screencast series ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In this task you are required to record screencast of how to solve a particular single user mode challenge. The screencast should start by providing an overview of the vulnerability that will be exploited, then step by step instructions on how to exploit the vulnerability. The screencast should conclude on a note that how to avoid this vulnerability in your application. The length of the screencast would vary according to the challenge but it should neither be too long nor too short.&lt;br /&gt;
&lt;br /&gt;
Task    - Screencast of challenge.....&lt;br /&gt;
&lt;br /&gt;
Task 6  - HTTP Basic&lt;br /&gt;
&lt;br /&gt;
Task 7  - Using Access Control Matrix&lt;br /&gt;
&lt;br /&gt;
Task 8  - Business Layer Access Control&lt;br /&gt;
&lt;br /&gt;
Task 9  - Path Based Access Control&lt;br /&gt;
&lt;br /&gt;
Task 10 - Same Origin Policy Protection&lt;br /&gt;
&lt;br /&gt;
Task 11 - Forgot Password&lt;br /&gt;
&lt;br /&gt;
Task 12 - Discover clues in HTML&lt;br /&gt;
&lt;br /&gt;
Task 13 - JS Obfuscation&lt;br /&gt;
&lt;br /&gt;
Task 14 - XSS 1 (Reflected)&lt;br /&gt;
&lt;br /&gt;
Task 15 - XSS 2 (Stored)&lt;br /&gt;
&lt;br /&gt;
Task 16 - XSS 3 (DOM)&lt;br /&gt;
&lt;br /&gt;
Task 17 - Fail Open Authentication&lt;br /&gt;
&lt;br /&gt;
Task 18 - Log Spoofing&lt;br /&gt;
&lt;br /&gt;
Task 19 - Numeric SQL Injection&lt;br /&gt;
&lt;br /&gt;
Task 20 - XPATH injection&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A screencast explaining the vulnerability involved in a particular challenge.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184894</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184894"/>
				<updated>2014-11-06T21:15:20Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* Task 6-20: WebGoatPHP challenges screencast series */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Latam Tour 2015 logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the Latam Tour 2015. The logo must resemble previous editions of the Tour and represent the Latin America region. It would be better if the new logo is based on the OWASP logo. As a reference, here is the Latam Tour 2014 Logo:&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/f/f3/OWASP_Latam_Tour_Logo_2014.png&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Latam Tour 2015 logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Fabio Cerullo&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Implement &amp;quot;remember me&amp;quot; feature ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 2: Make workshop mode dashboard responsive ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In workshop mode of the application, the side panel of admin dashboard is not responsive i.e it does not fits well in smaller size screen resolutions. If the screen size is small the side panel should shrink into a smaller panel preferably at the bottom of the application.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Panel perfectly adjusts on small screen resolutions.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
CSS (media queries), HTML&lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/26&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
style/dashboard.css&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 3: WebGoatPHP logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 4: WebGoatPHP deployment screencast ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deploy the application on the local server without using vagrant and record a screencast of the process. Upload to a video streaming service and comment link on the melange for mentor to review.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The screencast should clearly contain all the steps required for the deployment and how to troubleshoot most common errors in the whole process.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with an operating system (Linux/Windows)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 5: Create a SQL injection challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Single user mode of WebGoatPHP consist of set of challenges. These challenges simulate various real world security vulnerabilities in web applications. You have to add a challenge under category &amp;quot;Injection Attacks&amp;quot; which simulates a SQL injection vulnerability in single user mode. The input data must be of type string and the challenge should mimic some real world scenario.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A challenge which helps user understand SQLi vulnerability by allowing him to exploit the vulnerability.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/SQL_Injection&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/blob/master/README.md#adding-a-lessonchallenge&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
=== Task 6-20: WebGoatPHP challenges screencast series ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In this task you are required to record screencast of how to solve a particular single user mode challenge. The screencast should start by providing an overview of the vulnerability that will be exploited, then step by step instructions on how to exploit the vulnerability. The screencast should conclude on a note that how to avoid this vulnerability in your application. The length of the screencast would vary according to the challenge but it should neither be too long nor too short.&lt;br /&gt;
&lt;br /&gt;
Task    - Screencast of challenge.....&lt;br /&gt;
&lt;br /&gt;
Task 6  - HTTP Basic&lt;br /&gt;
&lt;br /&gt;
Task 7  - Using Access Control Matrix&lt;br /&gt;
&lt;br /&gt;
Task 8  - Business Layer Access Control&lt;br /&gt;
&lt;br /&gt;
Task 9  - Path Based Access Control&lt;br /&gt;
&lt;br /&gt;
Task 10 - Same Origin Policy Protection&lt;br /&gt;
&lt;br /&gt;
Task 11 - Forgot Password&lt;br /&gt;
&lt;br /&gt;
Task 12 - Discover clues in HTML&lt;br /&gt;
&lt;br /&gt;
Task 13 - JS Obfuscation&lt;br /&gt;
&lt;br /&gt;
Task 14 - XSS 1 (Reflected)&lt;br /&gt;
&lt;br /&gt;
Task 15 - XSS 2 (Stored)&lt;br /&gt;
&lt;br /&gt;
Task 16 - XSS 3 (DOM)&lt;br /&gt;
&lt;br /&gt;
Task 17 - Fail Open Authentication&lt;br /&gt;
&lt;br /&gt;
Task 18 - Log Spoofing&lt;br /&gt;
&lt;br /&gt;
Task 19 - Numeric SQL Injection&lt;br /&gt;
&lt;br /&gt;
Task 20 - XPATH injection&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A screencast explaining the vulnerability involved in a particular challenge.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184893</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184893"/>
				<updated>2014-11-06T21:13:55Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* Task 5: Create a SQL injection challenge */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Latam Tour 2015 logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the Latam Tour 2015. The logo must resemble previous editions of the Tour and represent the Latin America region. It would be better if the new logo is based on the OWASP logo. As a reference, here is the Latam Tour 2014 Logo:&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/f/f3/OWASP_Latam_Tour_Logo_2014.png&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Latam Tour 2015 logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Fabio Cerullo&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Implement &amp;quot;remember me&amp;quot; feature ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 2: Make workshop mode dashboard responsive ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In workshop mode of the application, the side panel of admin dashboard is not responsive i.e it does not fits well in smaller size screen resolutions. If the screen size is small the side panel should shrink into a smaller panel preferably at the bottom of the application.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Panel perfectly adjusts on small screen resolutions.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
CSS (media queries), HTML&lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/26&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
style/dashboard.css&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 3: WebGoatPHP logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 4: WebGoatPHP deployment screencast ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deploy the application on the local server without using vagrant and record a screencast of the process. Upload to a video streaming service and comment link on the melange for mentor to review.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The screencast should clearly contain all the steps required for the deployment and how to troubleshoot most common errors in the whole process.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with an operating system (Linux/Windows)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 5: Create a SQL injection challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Single user mode of WebGoatPHP consist of set of challenges. These challenges simulate various real world security vulnerabilities in web applications. You have to add a challenge under category &amp;quot;Injection Attacks&amp;quot; which simulates a SQL injection vulnerability in single user mode. The input data must be of type string and the challenge should mimic some real world scenario.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A challenge which helps user understand SQLi vulnerability by allowing him to exploit the vulnerability.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/SQL_Injection&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/blob/master/README.md#adding-a-lessonchallenge&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
=== Task 6-20: WebGoatPHP challenges screencast series ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In this task you are required to record screencast of how to solve a particular single user mode challenge. The screencast should start by providing an overview of the vulnerability that will be exploited, then step by step instructions on how to exploit the vulnerability. The screencast should conclude on a note that how to avoid this vulnerability in your application. The length of the screencast would vary according to the challenge but it should neither be too long nor too short.&lt;br /&gt;
&lt;br /&gt;
Task    - Screencast of challenge&lt;br /&gt;
--------------------------------&lt;br /&gt;
Task 6  - HTTP Basic&lt;br /&gt;
Task 7  - Using Access Control Matrix&lt;br /&gt;
Task 8  - Business Layer Access Control&lt;br /&gt;
Task 9  - Path Based Access Control&lt;br /&gt;
Task 10 - Same Origin Policy Protection&lt;br /&gt;
Task 11 - Forgot Password&lt;br /&gt;
Task 12 - Discover clues in HTML&lt;br /&gt;
Task 13 - JS Obfuscation&lt;br /&gt;
Task 14 - XSS 1 (Reflected)&lt;br /&gt;
Task 15 - XSS 2 (Stored)&lt;br /&gt;
Task 16 - XSS 3 (DOM)&lt;br /&gt;
Task 17 - Fail Open Authentication&lt;br /&gt;
Task 18 - Log Spoofing&lt;br /&gt;
Task 19 - Numeric SQL Injection&lt;br /&gt;
Task 20 - XPATH injection&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A screencast explaining the vulnerability involved in a particular challenge.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184892</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184892"/>
				<updated>2014-11-06T21:12:31Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* OWASP WebGoatPHP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Latam Tour 2015 logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the Latam Tour 2015. The logo must resemble previous editions of the Tour and represent the Latin America region. It would be better if the new logo is based on the OWASP logo. As a reference, here is the Latam Tour 2014 Logo:&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/f/f3/OWASP_Latam_Tour_Logo_2014.png&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Latam Tour 2015 logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Fabio Cerullo&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Implement &amp;quot;remember me&amp;quot; feature ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 2: Make workshop mode dashboard responsive ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In workshop mode of the application, the side panel of admin dashboard is not responsive i.e it does not fits well in smaller size screen resolutions. If the screen size is small the side panel should shrink into a smaller panel preferably at the bottom of the application.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Panel perfectly adjusts on small screen resolutions.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
CSS (media queries), HTML&lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/26&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
style/dashboard.css&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 3: WebGoatPHP logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 4: WebGoatPHP deployment screencast ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deploy the application on the local server without using vagrant and record a screencast of the process. Upload to a video streaming service and comment link on the melange for mentor to review.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The screencast should clearly contain all the steps required for the deployment and how to troubleshoot most common errors in the whole process.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with an operating system (Linux/Windows)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 5: Create a SQL injection challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Single user mode of WebGoatPHP consist of set of challenges. These challenges simulate various real world security vulnerabilities in web applications. You have to add a challenge under category &amp;quot;Injection Attacks&amp;quot; which simulates a SQL injection vulnerability in single user mode. The input data must be of type string and the challenge should mimic some real world scenario.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A challenge which helps user understand SQLi vulnerability by allowing him to exploit the vulnerability.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/SQL_Injection&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/blob/master/README.md#adding-a-lessonchallenge&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 6-20: WebGoatPHP challenges screencast series ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In this task you are required to record screencast of how to solve a particular single user mode challenge. The screencast should start by providing an overview of the vulnerability that will be exploited, then step by step instructions on how to exploit the vulnerability. The screencast should conclude on a note that how to avoid this vulnerability in your application. The length of the screencast would vary according to the challenge but it should neither be too long nor too short.&lt;br /&gt;
&lt;br /&gt;
Task    - Screencast of challenge&lt;br /&gt;
--------------------------------&lt;br /&gt;
Task 6  - HTTP Basic&lt;br /&gt;
Task 7  - Using Access Control Matrix&lt;br /&gt;
Task 8  - Business Layer Access Control&lt;br /&gt;
Task 9  - Path Based Access Control&lt;br /&gt;
Task 10 - Same Origin Policy Protection&lt;br /&gt;
Task 11 - Forgot Password&lt;br /&gt;
Task 12 - Discover clues in HTML&lt;br /&gt;
Task 13 - JS Obfuscation&lt;br /&gt;
Task 14 - XSS 1 (Reflected)&lt;br /&gt;
Task 15 - XSS 2 (Stored)&lt;br /&gt;
Task 16 - XSS 3 (DOM)&lt;br /&gt;
Task 17 - Fail Open Authentication&lt;br /&gt;
Task 18 - Log Spoofing&lt;br /&gt;
Task 19 - Numeric SQL Injection&lt;br /&gt;
Task 20 - XPATH injection&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A screencast explaining the vulnerability involved in a particular challenge.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184887</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184887"/>
				<updated>2014-11-06T20:37:07Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* OWASP WebGoatPHP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP WIKI Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Implement &amp;quot;remember me&amp;quot; feature ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 2: Make workshop mode dashboard responsive ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In workshop mode of the application, the side panel of admin dashboard is not responsive i.e it does not fits well in smaller size screen resolutions. If the screen size is small the side panel should shrink into a smaller panel preferably at the bottom of the application.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Panel perfectly adjusts on small screen resolutions.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
CSS (media queries), HTML&lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/26&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
style/dashboard.css&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 3: WebGoatPHP logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 4: WebGoatPHP deployment screencast ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deploy the application on the local server without using vagrant and record a screencast of the process. Upload to a video streaming service and comment link on the melange for mentor to review.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The screencast should clearly contain all the steps required for the deployment and how to troubleshoot most common errors in the whole process.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with an operating system (Linux/Windows)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184886</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184886"/>
				<updated>2014-11-06T20:27:19Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* OWASP WebGoatPHP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP WIKI Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Implement &amp;quot;remember me&amp;quot; feature ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 2: Make workshop mode dashboard responsive ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In workshop mode of the application, the side panel of admin dashboard is not responsive i.e it does not fits well in smaller size screen resolutions. If the screen size is small the side panel should shrink into a smaller panel preferably at the bottom of the application.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Panel perfectly adjusts on small screen resolutions.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
CSS (media queries), HTML&lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/26&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
style/dashboard.css&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 3: WebGoatPHP logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184885</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184885"/>
				<updated>2014-11-06T20:26:13Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* OWASP WebGoatPHP Task 3 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP WIKI Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Implement &amp;quot;remember me&amp;quot; feature ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
=== Task 2: Make workshop mode dashboard responsive ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In workshop mode of the application, the side panel of admin dashboard is not responsive i.e it does not fits well in smaller size screen resolutions. If the screen size is small the side panel should shrink into a smaller panel preferably at the bottom of the application.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Panel perfectly adjusts on small screen resolutions.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
CSS (media queries), HTML&lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/26&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
style/dashboard.css&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Task 3: WebGoatPHP logo ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP logo in either psd or jpeg format.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184884</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184884"/>
				<updated>2014-11-06T20:24:34Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* OWASP WebGoatPHP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP WIKI Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== Task 1: Implement &amp;quot;remember me&amp;quot; feature ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
=== Task 2: Make workshop mode dashboard responsive ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In workshop mode of the application, the side panel of admin dashboard is not responsive i.e it does not fits well in smaller size screen resolutions. If the screen size is small the side panel should shrink into a smaller panel preferably at the bottom of the application.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Panel perfectly adjusts on small screen resolutions.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
CSS (media queries), HTML&lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/26&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
style/dashboard.css&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP WebGoatPHP Task 3 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP Logo.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184882</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184882"/>
				<updated>2014-11-06T20:14:59Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* OWASP WebGoatPHP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP WIKI Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP WebGoatPHP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP WebGoatPHP Task 2 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Design a new logo for the application. The logo must resemble various aspects of the application. It would be better if the new logo is based on OWASP logo. &lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Design&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
WebGoatPHP Logo.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Familiarity with Photoshop/GIMP or any other designing software.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184881</id>
		<title>OWASP Code Kids 2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Kids_2015_Ideas&amp;diff=184881"/>
				<updated>2014-11-06T20:06:41Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: /* OWASP WebGoatPHP Task 1 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Task Categories=&lt;br /&gt;
&lt;br /&gt;
The tasks are grouped into the categories described below. '''Please make sure each task is assigned a category.'''&lt;br /&gt;
&lt;br /&gt;
'''Code:''' Tasks related to writing or refactoring code.&lt;br /&gt;
&lt;br /&gt;
'''Documentation/Training:''' Tasks related to creating/editing documents and helping others learn more&lt;br /&gt;
&lt;br /&gt;
'''Outreach/Research:''' Tasks related to community management, outreach/marketing, or studying problems and recommending solutions&lt;br /&gt;
&lt;br /&gt;
'''Quality Assurance:''' Tasks related to testing and ensuring code is of high quality&lt;br /&gt;
&lt;br /&gt;
'''User Interface:''' Tasks related to user experience research or user interface design and interaction&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZAP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Eg. Code Category&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WIKI ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP WIKI Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Task description&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Describe the expected results of the task&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' XXXXXX&lt;br /&gt;
&lt;br /&gt;
== OWASP WebGoatPHP ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP WebGoatPHP Task 1 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Implement a secure &amp;quot;Remember me&amp;quot; feature in user login form using cookies. At present the remember me check box is present in the form but it does nothing.&lt;br /&gt;
&lt;br /&gt;
'''Task Category:'''&lt;br /&gt;
&lt;br /&gt;
Code&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
If user checks the &amp;quot;remember me&amp;quot; check box when logging in, then the user will not be required to login every time he visits the application within X days.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Reference:'''&lt;br /&gt;
&lt;br /&gt;
https://github.com/shivamdixit/WebGoatPHP/issues/45&lt;br /&gt;
&lt;br /&gt;
'''Code:'''&lt;br /&gt;
&lt;br /&gt;
app/control/user/login.php&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Shivam Dixit&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=178800</id>
		<title>WebGoatPHP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=178800"/>
				<updated>2014-07-15T03:36:09Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a port of WebGoat to PHP and MySQL/SQLite databases. The goal is to create an interactive teaching environment for web application security by offering lessons in the form of challenges. In each challenge the user must exploit the vulnerability to demonstrate their understanding.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/shivamdixit/WebGoatPHP GitHub Repo]&lt;br /&gt;
&lt;br /&gt;
==What is WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a deliberately insecure web application developed using PHP to teach web application security. It offers a set of challenges based on various vulnerabilities listed in OWASP. The application is a realistic teaching environment and supports four different modes. &lt;br /&gt;
&lt;br /&gt;
==Why WebGoatPHP?==&lt;br /&gt;
WebGoatPHP is suitable for:&lt;br /&gt;
&lt;br /&gt;
* Web Developers, to learn how to develop secure web applications&lt;br /&gt;
* Penetration Testers, to learn the different kinds of attacking scenarios &lt;br /&gt;
* Teachers, to interactively teach students about web application security&lt;br /&gt;
&lt;br /&gt;
==Contribute==&lt;br /&gt;
To contribute, fork the code on [https://github.com/shivamdixit/WebGoatPHP GitHub] and send a pull request.&lt;br /&gt;
Join the discussion on our [https://lists.owasp.org/mailman/listinfo/owasp_webgoatphp mailing list]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Different Operating Modes==&lt;br /&gt;
* Single User Mode&lt;br /&gt;
* Workshop Mode&lt;br /&gt;
* Contest Mode&lt;br /&gt;
* Secure Coding Mode&lt;br /&gt;
&lt;br /&gt;
==Types Of Challenges==&lt;br /&gt;
* Access Control Flaws&lt;br /&gt;
* AJAX Security&lt;br /&gt;
* Authentication Flaws&lt;br /&gt;
* Code Quality&lt;br /&gt;
* Injection Attacks&lt;br /&gt;
* Cross-Site Scripting(XSS) Attacks&lt;br /&gt;
* Brute Force Attacks&lt;br /&gt;
* Session Management Flaws&lt;br /&gt;
* Improper Error Handling&lt;br /&gt;
&lt;br /&gt;
==Major Contributors==&lt;br /&gt;
*[[User:Johanna_Curiel|Johanna Curiel]]&lt;br /&gt;
*[[User:Shivam_Dixit|Shivam Dixit]]&lt;br /&gt;
*[[User:Azzeddine_RAMRAMI|Azzeddine]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/shivamdixit/WebGoatPHP/archive/master.zip OWASP WebGoatPHP] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Website ==&lt;br /&gt;
&lt;br /&gt;
http://webgoatphp.com/&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
==Classifications==&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=177694</id>
		<title>WebGoatPHP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=177694"/>
				<updated>2014-06-29T00:34:16Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a port of WebGoat to PHP and MySQL/SQLite databases. The goal is to create an interactive teaching environment for web application security by offering lessons in the form of challenges. In each challenge the user must exploit the vulnerability to demonstrate their understanding.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/shivamdixit/WebGoatPHP GitHub Repo]&lt;br /&gt;
&lt;br /&gt;
==What is WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a deliberately insecure web application developed using PHP to teach web application security. It offers a set of challenges based on various vulnerabilities listed in OWASP. The application is a realistic teaching environment and supports four different modes. &lt;br /&gt;
&lt;br /&gt;
==Why WebGoatPHP?==&lt;br /&gt;
WebGoatPHP is suitable for:&lt;br /&gt;
&lt;br /&gt;
* Web Developers, to learn how to develop secure web applications&lt;br /&gt;
* Penetration Testers, to learn the different kinds of attacking scenarios &lt;br /&gt;
* Teachers, to interactively teach students about web application security&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Different Operating Modes==&lt;br /&gt;
* Single User Mode&lt;br /&gt;
* Workshop Mode&lt;br /&gt;
* Contest Mode&lt;br /&gt;
* Secure Coding Mode&lt;br /&gt;
&lt;br /&gt;
==Types Of Challenges==&lt;br /&gt;
* Access Control Flaws&lt;br /&gt;
* AJAX Security&lt;br /&gt;
* Authentication Flaws&lt;br /&gt;
* Code Quality&lt;br /&gt;
* Injection Attacks&lt;br /&gt;
* Cross-Site Scripting(XSS) Attacks&lt;br /&gt;
* Brute Force Attacks&lt;br /&gt;
* Session Management Flaws&lt;br /&gt;
* Improper Error Handling&lt;br /&gt;
&lt;br /&gt;
==Major Contributors==&lt;br /&gt;
*[[User:Johanna_Curiel|Johanna Curiel]]&lt;br /&gt;
*[[User:Azzeddine_RAMRAMI|Azzeddine]]&lt;br /&gt;
*[[User:Shivam_Dixit|Shivam Dixit]]&lt;br /&gt;
&lt;br /&gt;
To contribute, fork the code on github and send a pull request. Join the discussion on our [https://lists.owasp.org/mailman/listinfo/owasp_webgoatphp mailing list]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/shivamdixit/WebGoatPHP/archive/master.zip OWASP WebGoatPHP] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Website ==&lt;br /&gt;
&lt;br /&gt;
http://webgoatphp.com/&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
==Classifications==&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=177690</id>
		<title>User:Shivam Dixit</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=177690"/>
				<updated>2014-06-28T09:23:10Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==About==&lt;br /&gt;
Shivam is a pre-final year undergraduate student at LNM Institute of Information Technology, Jaipur, India. He is majoring in Computer Science and has been developing web applications since 2012. Shivam is enthusiastic about web application security and actively contributing to OWASP projects since 2013.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
Shivam is contributing to the project [[WebGoatPHP| OWASP WebGoatPHP]] in Google Summer Of Code '14.&lt;br /&gt;
&lt;br /&gt;
==Contact==&lt;br /&gt;
Email: shivam.dixit[at]owasp[dot]org&lt;br /&gt;
&lt;br /&gt;
Github: https://github.com/shivamdixit&lt;br /&gt;
&lt;br /&gt;
Homepage: http://shivamdixit.com&lt;br /&gt;
&lt;br /&gt;
Twitter: @shivamd001&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=177689</id>
		<title>User:Shivam Dixit</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=177689"/>
				<updated>2014-06-28T09:18:48Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==About==&lt;br /&gt;
Shivam is a pre-final year undergraduate student at LNM Institute of Information Technology, Jaipur, India. He is majoring in Computer Science and has been developing web applications since 2012. Shivam is enthusiastic about web application security and actively contributing to OWASP projects since 2013.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
Shivam is contributing to the project [[WebGoatPHP| OWASP WebGoatPHP]] in Google Summer Of Code '14.&lt;br /&gt;
&lt;br /&gt;
==Contact==&lt;br /&gt;
Email: shivam.dixit[at]owasp[dot]org&lt;br /&gt;
&lt;br /&gt;
Github: https://github.com/shivamdixit&lt;br /&gt;
&lt;br /&gt;
Homepage: http://shivamdixit.com&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=177688</id>
		<title>WebGoatPHP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=177688"/>
				<updated>2014-06-28T08:57:30Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a port of WebGoat to PHP and MySQL/SQLite databases. The goal is to create an interactive teaching environment for web application security by offering lessons in the form of challenges. In each challenge the user must exploit the vulnerability to demonstrate their understanding.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/shivamdixit/WebGoatPHP GitHub Repo]&lt;br /&gt;
&lt;br /&gt;
==What is WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a deliberately insecure web application developed using PHP to teach web application security. It offers a set of challenges based on various vulnerabilities listed in OWASP. The application is a realistic teaching environment and supports four different modes. &lt;br /&gt;
&lt;br /&gt;
==Why WebGoatPHP?==&lt;br /&gt;
WebGoatPHP is suitable for:&lt;br /&gt;
&lt;br /&gt;
* Web Developers, to learn how to develop secure web applications&lt;br /&gt;
* Penetration Testers, to learn the different kinds of attacking scenarios &lt;br /&gt;
* Teachers, to interactively teach students about web application security&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Different Operating Modes==&lt;br /&gt;
* Single User Mode&lt;br /&gt;
* Workshop Mode&lt;br /&gt;
* Contest Mode&lt;br /&gt;
* Secure Coding Mode&lt;br /&gt;
&lt;br /&gt;
==Types Of Challenges==&lt;br /&gt;
* Access Control Flaws&lt;br /&gt;
* AJAX Security&lt;br /&gt;
* Authentication Flaws&lt;br /&gt;
* Code Quality&lt;br /&gt;
* Injection Attacks&lt;br /&gt;
* Cross-Site Scripting(XSS) Attacks&lt;br /&gt;
* Brute Force Attacks&lt;br /&gt;
* Session Management Flaws&lt;br /&gt;
* Improper Error Handling&lt;br /&gt;
&lt;br /&gt;
==Major Contributors==&lt;br /&gt;
*[[User:Johanna_Curiel|Johanna Curiel]]&lt;br /&gt;
*[[User:Azzeddine_RAMRAMI|Azzeddine]]&lt;br /&gt;
*[[User:Shivam_Dixit|Shivam Dixit]]&lt;br /&gt;
&lt;br /&gt;
To contribute, fork the code on github and send a pull request. If you have any questions write to shivam[dot]dixit[at]owasp[dot]org&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
==Project Leader==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/shivamdixit/WebGoatPHP/archive/master.zip OWASP WebGoatPHP] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Website ==&lt;br /&gt;
&lt;br /&gt;
http://webgoatphp.com/&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
==Classifications==&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=177687</id>
		<title>WebGoatPHP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=177687"/>
				<updated>2014-06-28T08:52:19Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a port of WebGoat to PHP and MySQL/SQLite databases. The goal is to create an interactive teaching environment for web application security by offering lessons in the form of challenges. In each challenge the user must exploit the vulnerability to demonstrate their understanding.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/shivamdixit/WebGoatPHP GitHub Repo]&lt;br /&gt;
&lt;br /&gt;
==What is WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a deliberately insecure web application developed using PHP to teach web application security. It offers a set of challenges based on various vulnerabilities listed in OWASP. The application is a realistic teaching environment and supports four different modes. &lt;br /&gt;
&lt;br /&gt;
==Why WebGoatPHP?==&lt;br /&gt;
WebGoatPHP is suitable for:&lt;br /&gt;
&lt;br /&gt;
* Web Developers, to learn how to develop secure web applications&lt;br /&gt;
* Penetration Testers, to learn the different kinds of attacking scenarios &lt;br /&gt;
* Teachers, to interactively teach students about web application security&lt;br /&gt;
&lt;br /&gt;
==Project leader==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Different Operating Modes==&lt;br /&gt;
* Single User Mode&lt;br /&gt;
* Workshop Mode&lt;br /&gt;
* Contest Mode&lt;br /&gt;
* Secure Coding Mode&lt;br /&gt;
&lt;br /&gt;
==Types Of Challenges==&lt;br /&gt;
* Access Control Flaws&lt;br /&gt;
* AJAX Security&lt;br /&gt;
* Authentication Flaws&lt;br /&gt;
* Code Quality&lt;br /&gt;
* Injection Attacks&lt;br /&gt;
* Cross-Site Scripting(XSS) Attacks&lt;br /&gt;
* Brute Force Attacks&lt;br /&gt;
* Session Management Flaws&lt;br /&gt;
* Improper Error Handling&lt;br /&gt;
&lt;br /&gt;
==Major Contributors==&lt;br /&gt;
*[[User:Johanna_Curiel|Johanna Curiel]]&lt;br /&gt;
*[[User:Shivam_Dixit|Shivam Dixit]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/shivamdixit/WebGoatPHP/archive/master.zip OWASP WebGoatPHP] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Website ==&lt;br /&gt;
&lt;br /&gt;
http://webgoatphp.com/&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
==Classifications==&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=177686</id>
		<title>WebGoatPHP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoatPHP&amp;diff=177686"/>
				<updated>2014-06-28T08:51:22Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a port of WebGoat to PHP and MySQL/SQLite databases. The goal is to create an interactive teaching environment for web application security by offering lessons in the form of challenges. In each challenge the user must exploit the vulnerability to demonstrate their understanding.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/shivamdixit/WebGoatPHP GitHub Repo]&lt;br /&gt;
&lt;br /&gt;
==What is WebGoatPHP==&lt;br /&gt;
WebGoatPHP is a deliberately insecure web application developed using PHP to teach web application security. It offers a set of challenges based on various vulnerabilities listed in OWASP. The application is a realistic teaching environment and supports four different modes. &lt;br /&gt;
&lt;br /&gt;
==Why WebGoatPHP?==&lt;br /&gt;
WebGoatPHP is suitable for:&lt;br /&gt;
&lt;br /&gt;
* Web Developers, to learn how to develop secure web applications&lt;br /&gt;
* Penetration Testers, to learn the different kinds of attacking scenarios &lt;br /&gt;
* Teachers, to interactively teach students about web application security&lt;br /&gt;
&lt;br /&gt;
==Project leader==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Major Contributors==&lt;br /&gt;
*[[User:Johanna_Curiel|Johanna Curiel]]&lt;br /&gt;
*[[User:Shivam_Dixit|Shivam Dixit]]&lt;br /&gt;
&lt;br /&gt;
==Different Operating Modes==&lt;br /&gt;
* Single User Mode&lt;br /&gt;
* Workshop Mode&lt;br /&gt;
* Contest Mode&lt;br /&gt;
* Secure Coding Mode&lt;br /&gt;
&lt;br /&gt;
==Types Of Challenges==&lt;br /&gt;
* Access Control Flaws&lt;br /&gt;
* AJAX Security&lt;br /&gt;
* Authentication Flaws&lt;br /&gt;
* Code Quality&lt;br /&gt;
* Injection Attacks&lt;br /&gt;
* Cross-Site Scripting(XSS) Attacks&lt;br /&gt;
* Brute Force Attacks&lt;br /&gt;
* Session Management Flaws&lt;br /&gt;
* Improper Error Handling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/shivamdixit/WebGoatPHP/archive/master.zip OWASP WebGoatPHP] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Website ==&lt;br /&gt;
&lt;br /&gt;
http://webgoatphp.com/&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
==Classifications==&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=175253</id>
		<title>User:Shivam Dixit</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=175253"/>
				<updated>2014-05-19T10:11:11Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am a pre-final year undergraduate student in LNM Institute of Information Technology, Jaipur, India. My major field of study is Computer Science. I am a web application security enthusiast and web developer.&lt;br /&gt;
&lt;br /&gt;
I'm Google Summer Of Code student for the project OWASP WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
I also actively contributor to OWASP PHP Security project.&lt;br /&gt;
&lt;br /&gt;
'''Github''' : https://github.com/shivamdixit&lt;br /&gt;
&lt;br /&gt;
'''Blog'''   : http://shivamdixit.com&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=175252</id>
		<title>User:Shivam Dixit</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=175252"/>
				<updated>2014-05-19T10:10:28Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am a pre-final year undergraduate student in LNM Institute of Information Technology, Jaipur, India. My major field of study is Computer Science. I am a web application security enthusiast and web developer.&lt;br /&gt;
&lt;br /&gt;
I'm Google Summer Of Code student for the project OWASP WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
I also actively contributor to OWASP PHP Security project.&lt;br /&gt;
&lt;br /&gt;
Github : https://github.com/shivamdixit&lt;br /&gt;
Blog   : http://shivamdixit.com&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=175240</id>
		<title>User:Shivam Dixit</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shivam_Dixit&amp;diff=175240"/>
				<updated>2014-05-19T07:34:24Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am a pre-final year undergraduate student in LNM Institute of Information Technology, Jaipur, India. My major field of study is Computer Science. I am a web application security enthusiast and web developer.&lt;br /&gt;
&lt;br /&gt;
I'm Google Summer Of Code student for the project OWASP WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
I also actively contributor to OWASP PHP Security project.&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC&amp;diff=170996</id>
		<title>GSoC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC&amp;diff=170996"/>
				<updated>2014-03-28T12:52:52Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP has been selected as an official Google Summer of Code (“GSoC”) mentoring organization in 2014!'''&lt;br /&gt;
&lt;br /&gt;
Open source software is changing the world and creating the future.&lt;br /&gt;
Want to help shaping it? We’re looking for students to join us in making 2014 the best Summer of Code yet!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;'''STUDENTS: THE PROPOSAL SUBMISSION PERIOD WILL BE OPEN UNTIL MARCH 21ST 19:00UTC - SUBMIT YOUR APPLICATION NOW HERE:'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.google-melange.com/gsoc/homepage/google/gsoc2014 '''GOOGLE MELANGE''']&lt;br /&gt;
&lt;br /&gt;
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.&lt;br /&gt;
&lt;br /&gt;
All students currently enrolled in an accredited institution are welcome to participate in the Google Summer of Code 2014 program, hopefully along with the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
Below you could find all the instructions on how to participate.&lt;br /&gt;
&lt;br /&gt;
== What is GSOC? ==&lt;br /&gt;
&lt;br /&gt;
The Google Summer of Code program (“GSoC”) is designed to encourage student participation in open source development. Through GSoC, accepted student applicants will be paired with OWASP mentors that will guide them through their coding tasks.&lt;br /&gt;
&lt;br /&gt;
Benefits to students include:&lt;br /&gt;
&lt;br /&gt;
* Gaining exposure to real-world software development scenarios,&lt;br /&gt;
* An opportunity for employment in areas related to their academic pursuits and&lt;br /&gt;
* Google will be offering successful student contributors a 5,500 USD stipend, enabling them to focus on their coding projects for three months. &lt;br /&gt;
&lt;br /&gt;
This program is done completely online. Students and mentors from more than 100 countries have participated in past years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions common to all participants==&lt;br /&gt;
&lt;br /&gt;
All participants should take a look at the [http://code.google.com/p/google-summer-of-code/ Summer of Code Program Wiki] every now and then to be informed about updates and advices. It is also important to read the [http://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2013/help_page Summer of Code FAQ], as it contains useful information.&lt;br /&gt;
All participants will need a Google account in order to join the program. You'll save some time if you create one now.&lt;br /&gt;
&lt;br /&gt;
===Programming Language===&lt;br /&gt;
&lt;br /&gt;
While the majority of OWASP tools are developed using C++/Java, we do accept other languages, including (but not limited to) Python, Ruby and C#. C++ will be accepted for any project. Submissions and ideas for projects in any other language should specifically mention the choice.&lt;br /&gt;
&lt;br /&gt;
==Instructions for students==&lt;br /&gt;
&lt;br /&gt;
Are you a student and want to code for an OWASP project? &lt;br /&gt;
Here are the steps and some tips on getting started:&lt;br /&gt;
&lt;br /&gt;
1) Think of a good idea – For reference see&lt;br /&gt;
[https://www.owasp.org/index.php/GSoC2014_Ideas GSoC 2014 Ideas]&lt;br /&gt;
&lt;br /&gt;
2) Do some research yourself based on the idea, write up a proposal draft &lt;br /&gt;
&lt;br /&gt;
3) Post it to the mailing list at https://groups.google.com/d/forum/owasp-gsoc for initial discussions with OWASP mentors.&lt;br /&gt;
&lt;br /&gt;
4) Based on feedback, write a full proposal – See template below:&lt;br /&gt;
https://www.owasp.org/index.php/GSoC_SAT&lt;br /&gt;
&lt;br /&gt;
5) Submit your proposal to Google from March 10th to March 21st 2014.&lt;br /&gt;
&lt;br /&gt;
Students wishing to participate in GSoC must realize this is a formal commitment to produce code for the selected OWASP Project during three months. You will also take some resources from OWASP project leaders, who will dedicate a portion of their time to mentor you. Therefore, we'd like to have candidates who are committed to helping OWASP mission. You don't have to be a proven developer -- in fact, this whole program is meant to facilitate joining OWASP and other Open Source communities. However, experience in coding and applications are welcome.&lt;br /&gt;
&lt;br /&gt;
You should start familiarising yourself with the components that you plan on working on before the start date. OWASP Project Mentors are available on the mailing list https://groups.google.com/d/forum/owasp-gsoc for help. &lt;br /&gt;
&lt;br /&gt;
===General instructions===&lt;br /&gt;
First of all, please read the instructions common to all participants and the [http://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2014/help_page GSoC FAQ]. Pay special attention to the '''Eligibility''' section of the FAQ.&lt;br /&gt;
&lt;br /&gt;
===Recommended steps===&lt;br /&gt;
* Read Google's instructions for participating&lt;br /&gt;
* Take a look at the list of ideas&lt;br /&gt;
* Come up with project that you're interested in&lt;br /&gt;
* Write a first draft proposal and get someone to review it for you&lt;br /&gt;
* Submit it using Google's web interface&lt;br /&gt;
&lt;br /&gt;
Coming up with an interesting idea is probably the most difficult part of all. It should be something interesting for an OWASP Project, and more importantly for you. It also has to be something that you can realistically achieve in the time available to you.&lt;br /&gt;
&lt;br /&gt;
Finding out what the most pressing issues are in the projects you're interested in is a good start. You can optionally join the mailing lists for that project: you can make acquaintance with developers and your potential mentor, as well as start learning the codebase. We recommend strongly doing that and we will look favourably on applications from students who have started to act like Open Source developers.&lt;br /&gt;
&lt;br /&gt;
===Student proposal guidelines===&lt;br /&gt;
A project proposal is what you will be judged upon. So, as a general recommendation, write a clear proposal on what you plan to do, what your project is and what it is not, etc. Several websites now contain hints and other useful information on writing up such proposals.&lt;br /&gt;
OWASP does not require a specific format or specific list of information, but there is an application template on the OWASP page in Google Melange with some specific points that you should address in your application:&lt;br /&gt;
* Who are you? What are you studying?&lt;br /&gt;
* What exactly do you intend to do? What will not be done?&lt;br /&gt;
* Why are you the right person for this task?&lt;br /&gt;
* To what extent are you familiar with the software you're proposing to work with? Have you used it? Have you read the source? Have  you modified the source?&lt;br /&gt;
* How many hours are you going to work on this a week? 10? 20? 30? 40?&lt;br /&gt;
* Do you have other commitments that we should know about? If so, please suggest a way to compensate if it will take much time away from Summer of Code.&lt;br /&gt;
* Are you comfortable working independently under a supervisor or mentor who is several thousand miles away, not to mention 12 time zones away? How will you work with your mentor to track your work? Have you worked in this style before?&lt;br /&gt;
* If your native language is not English, are you comfortable working closely with a supervisor whose native language is English? What is your native language, as that may help us find a mentor who has the same native language?&lt;br /&gt;
* Where do you live, and can we assign a mentor who is local to you so you can meet in a coffee shop for lunch?&lt;br /&gt;
&lt;br /&gt;
After you have written your proposal, you should get it reviewed. Do not rely on the OWASP mentors to do it for you via the web interface: they will only send back a proposal if they find it lacking. Instead, ask a colleague or a developer to do it for you.&lt;br /&gt;
&lt;br /&gt;
===Hints===&lt;br /&gt;
'''Submit your proposal early:''' early submissions get more attention from developers for the simple fact that they have more time to dedicate to reading them. The more people see it, the more it'll get known.&lt;br /&gt;
&lt;br /&gt;
'''Do not leave it all to the last minute:''' while it is Google that is operating the webserver, it would be wise to expect a last-minute overload on the server. So, make sure you send your application before the final rush. Also, note that the applications submitted very late will get the least attention from mentors, so you may get a low vote because of that.&lt;br /&gt;
&lt;br /&gt;
'''Keep it simple:''' we don't need a 10-page essay on the project and on you (Google won't even let you submit a text that long). You just need to be concise and precise.&lt;br /&gt;
&lt;br /&gt;
'''Know what you are talking about:''' the last thing we need is for students to submit ideas that cannot be accomplished realistically or ideas that aren't even remotely related to OWASP Projects. If your idea is unusual, be sure to explain why you have chosen OWASP to be your mentoring organisation.&lt;br /&gt;
&lt;br /&gt;
'''Aim wide:''' submit more than one proposal, to different OWASP Projects. We also recommend submitting to more than one organisation too. This will increase your chances of being chosen.&lt;br /&gt;
&lt;br /&gt;
The PostgreSQL project has also released a list of [http://www.postgresql.org/developer/summerofcodeadvice.html hints] that you can take a look.&lt;br /&gt;
&lt;br /&gt;
==Instructions for mentors==&lt;br /&gt;
===Ideas===&lt;br /&gt;
If you're a developer and you wish to participate in Summer of Code, you can do it in two ways: the first and easiest is to make a proposal in the [https://www.owasp.org/index.php/GSoC2014_Ideas ideas] page. Take a look at what the different OWASP Projects needs or what you feel should have. Feel free to submit ideas even if you cannot elaborate too much on them.&lt;br /&gt;
&lt;br /&gt;
The second possibility is to be a mentor for a more specific idea. If you wish to do that, please read the instructions common to all participants and the Summer of Code FAQ. Also, please contact the project leader for your application or module and get the go-ahead from him/her. Then edit the ideas page, adding your idea.&lt;br /&gt;
&lt;br /&gt;
Your idea proposal should be a brief description of what the project is, what the desired goals would be, what the student should know and your email address for contact. Please note, though, that the students are not required to follow your idea to the letter, so regard your proposal as just a suggestion.&lt;br /&gt;
&lt;br /&gt;
===Mentoring===&lt;br /&gt;
If you wish to help us even more, you can be an OWASP mentor. We will potentially assign a student to you who has never worked on such a large project and will need some help. Make sure you're up for the task.&lt;br /&gt;
When subscribing yourself as a mentor, please make sure that your application or module maintainer is aware of that. Ask him/her to send the Summer of Code OWASP Administrators an email confirming to know you. This is just a formality to make sure you are a real person we can trust -- the administrators cannot know all active developers by their Google account ID.&lt;br /&gt;
&lt;br /&gt;
If you would like to get an idea of what is involved in being a good mentor, be sure to read the [http://www.booki.cc/gsoc-mentoring mentoring guide]. &lt;br /&gt;
&lt;br /&gt;
You will be subscribed to a mailing list to discuss ideas. We will also require you to read the proposals as they come in and you will be allowed to vote on the proposals, according to rules we will publish later.&lt;br /&gt;
&lt;br /&gt;
Finally, know that we will never assign you to a project you do not want to work on. We will not assign you more projects than you can/want to take on either. And you will have a backup mentor, just in case something unforeseen takes place.&lt;br /&gt;
&lt;br /&gt;
===Subscribing as mentor===&lt;br /&gt;
To subscribe as mentor, you need to complete a few easy steps.&lt;br /&gt;
* Contact the OWASP GSoC administrators to let them know which project you want to mentor for&lt;br /&gt;
* Log in to [http://www.google-melange.com/ Google Melange]&lt;br /&gt;
* Apply as a mentor for OWASP&lt;br /&gt;
* Subscribe to https://groups.google.com/d/forum/owasp-gsoc&lt;br /&gt;
&lt;br /&gt;
'''The current list of GSOC 2014 Mentors are:'''&lt;br /&gt;
* Abraham Aranguren&lt;br /&gt;
* Mennouchi Islam Azeddine&lt;br /&gt;
* Ryan Barnett&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Spyros Gasteratos&lt;br /&gt;
* Gareth Heyes&lt;br /&gt;
* Krzysztof Kotowicz&lt;br /&gt;
* Andres Morales&lt;br /&gt;
* Kostas Papapanagiotou&lt;br /&gt;
* Andres Riancho&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
* Prasad Shenoy&lt;br /&gt;
* Breno Silva&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Kevin W. Wall&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions for OWASP Project Leaders==&lt;br /&gt;
If you are an OWASP Project Leader, you may be contacted by developers in your project about an idea he wants to submit. &lt;br /&gt;
You should judge whether the idea being proposed coincides with the general goals for your OWASP Project. If you feel that is not the case, you should reply to your developer and suggest that he modify the proposal.&lt;br /&gt;
You do not need yourself to be a mentor, but we would like you to.&lt;br /&gt;
&lt;br /&gt;
==Contact OWASP GSoC Admininstrators==&lt;br /&gt;
To reach the OWASP administrators for Summer of Code, please send an email to the GSOC Administrators below.&lt;br /&gt;
&lt;br /&gt;
'''The GSOC 2014 Administrators are:'''&lt;br /&gt;
&lt;br /&gt;
* Kostas Papapanagiotou (konstantinos@owasp.org)&lt;br /&gt;
* Fabio Cerullo (fcerullo@owasp.org)&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SQL_Injection&amp;diff=170995</id>
		<title>SQL Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SQL_Injection&amp;diff=170995"/>
				<updated>2014-03-28T12:51:28Z</updated>
		
		<summary type="html">&lt;p&gt;Shivam Dixit: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Security Focus Area]]&lt;br /&gt;
__NOTOC__&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
A [[SQL injection]] attack consists of insertion or &amp;quot;injection&amp;quot; of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. &lt;br /&gt;
SQL injection attacks are a type of  [[Top 10 2007-Injection Flaws | injection attack]], in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.&lt;br /&gt;
&lt;br /&gt;
==Threat Modeling==&lt;br /&gt;
* SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. &lt;br /&gt;
* SQL Injection is very common with PHP and ASP applications due to the prevalence of older functional interfaces. Due to the nature of programmatic interfaces available, J2EE and ASP.NET applications are less likely to have easily exploited SQL injections. &lt;br /&gt;
* The severity of SQL Injection attacks is limited by the attacker’s skill and imagination, and to a lesser extent, defense in depth countermeasures, such as low privilege connections to the database server and so on. In general, consider SQL Injection a high impact severity.&lt;br /&gt;
&lt;br /&gt;
==Related Security Activities==&lt;br /&gt;
&lt;br /&gt;
===How to Avoid SQL Injection Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Guide]] article on how to [[Guide to SQL Injection | Avoid SQL Injection]] Vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
See the OWASP [[SQL Injection Prevention Cheat Sheet]].&amp;lt;br&amp;gt;&lt;br /&gt;
See the OWASP [[Query Parameterization Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
===How to Review Code for SQL Injection Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for SQL Injection|Review Code for SQL Injection]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===How to Test for SQL Injection Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for SQL Injection    (OWASP-DV-005)|Test for SQL Injection]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
SQL injection errors occur when:&lt;br /&gt;
&lt;br /&gt;
# Data enters a program from an untrusted source. &lt;br /&gt;
# The data used to dynamically construct a SQL query &lt;br /&gt;
&lt;br /&gt;
The main consequences are:&lt;br /&gt;
&lt;br /&gt;
* '''Confidentiality''': Since SQL databases generally hold sensitive data, loss of confidentiality is a frequent problem with [[Glossary#SQL Injection|SQL Injection]] vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
* '''Authentication''': If poor SQL commands are used to check user names and passwords, it may be possible to connect to a system as another user with no previous knowledge of the password.&lt;br /&gt;
&lt;br /&gt;
* '''Authorization''': If authorization information is held in a SQL database, it may be possible to change this information through the successful exploitation of a [[Glossary#SQL Injection|SQL Injection]] vulnerability.&lt;br /&gt;
&lt;br /&gt;
* '''Integrity''': Just as it may be possible to read sensitive information, it is also possible to make changes or even delete this information with a [[Glossary#SQL Injection|SQL Injection]] attack.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors==&lt;br /&gt;
The platform affected can be:&lt;br /&gt;
* Language: SQL&lt;br /&gt;
* Platform: Any (requires interaction with a SQL database)&lt;br /&gt;
&lt;br /&gt;
[[Glossary#SQL Injection|SQL Injection]] has become a common issue with database-driven web sites. The flaw is easily detected, and easily exploited, and as such, any site or software package with even a minimal user base is likely to be subject to an attempted attack of this kind. &lt;br /&gt;
&lt;br /&gt;
Essentially, the attack is accomplished by placing a meta character into data input to then place SQL commands in the control plane, which did not exist there before. This flaw depends on the fact that SQL makes no real distinction between the control and data planes.&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
In SQL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
select id, firstname, lastname from authors&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If one provided:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Firstname: evil'ex&lt;br /&gt;
Lastname: Newman&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
the query string becomes:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
select id, firstname, lastname from authors where forename = 'evil'ex' and surname ='newman'&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
which the database attempts to run as:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Incorrect syntax near il' as the database tried to execute evil. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A safe version of the above SQL statement could be coded in Java as:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
String firstname = req.getParameter(&amp;quot;firstname&amp;quot;);&lt;br /&gt;
String lastname = req.getParameter(&amp;quot;lastname&amp;quot;);&lt;br /&gt;
// FIXME: do your own validation to detect attacks&lt;br /&gt;
String query = &amp;quot;SELECT id, firstname, lastname FROM authors WHERE forename = ? and surname = ?&amp;quot;;&lt;br /&gt;
PreparedStatement pstmt = connection.prepareStatement( query );&lt;br /&gt;
pstmt.setString( 1, firstname );&lt;br /&gt;
pstmt.setString( 2, lastname );&lt;br /&gt;
try&lt;br /&gt;
{&lt;br /&gt;
	ResultSet results = pstmt.execute( );&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&lt;br /&gt;
The following C# code dynamically constructs and executes a SQL query that searches for items matching a specified name. The query restricts the items displayed to those where owner matches the user name of the currently-authenticated user.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	...&lt;br /&gt;
	string userName = ctx.getAuthenticatedUserName();&lt;br /&gt;
	string query = &amp;quot;SELECT * FROM items WHERE owner = &amp;quot;'&amp;quot; &lt;br /&gt;
					+ userName + &amp;quot;' AND itemname = '&amp;quot;  &lt;br /&gt;
					+ ItemName.Text + &amp;quot;'&amp;quot;;&lt;br /&gt;
	sda = new SqlDataAdapter(query, conn);&lt;br /&gt;
	DataTable dt = new DataTable();&lt;br /&gt;
	sda.Fill(dt);&lt;br /&gt;
	...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The query that this code intends to execute follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items&lt;br /&gt;
	WHERE owner = &lt;br /&gt;
	AND itemname = ;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, because the query is constructed dynamically by concatenating a constant base query string and a user input string, the query only behaves correctly if itemName does not contain a single-quote character. If an attacker with the user name wiley enters the string &amp;quot;name' OR 'a'='a&amp;quot; for itemName, then the query becomes the following:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items&lt;br /&gt;
	WHERE owner = 'wiley'&lt;br /&gt;
	AND itemname = 'name' OR 'a'='a';&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The addition of the OR 'a'='a' condition causes the where clause to always evaluate to true, so the query becomes logically equivalent to the much simpler query:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This simplification of the query allows the attacker to bypass the requirement that the query only return items owned by the authenticated user; the query now returns all entries stored in the items table, regardless of their specified owner.&lt;br /&gt;
&lt;br /&gt;
===Example 3===&lt;br /&gt;
&lt;br /&gt;
This example examines the effects of a different malicious value passed to the query constructed and executed in Example 1. If an attacker with the user name hacker enters the string &amp;quot;name'); DELETE FROM items; --&amp;quot; for itemName, then the query becomes the following two queries:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items &lt;br /&gt;
	WHERE owner = 'hacker'&lt;br /&gt;
	AND itemname = 'name';&lt;br /&gt;
&lt;br /&gt;
	DELETE FROM items;&lt;br /&gt;
&lt;br /&gt;
	--'&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Many database servers, including Microsoft® SQL Server 2000, allow multiple SQL statements separated by semicolons to be executed at once. While this attack string results in an error in Oracle and other database servers that do not allow the batch-execution of statements separated by semicolons, in databases that do allow batch execution, this type of attack allows the attacker to execute arbitrary commands against the database.&lt;br /&gt;
&lt;br /&gt;
Notice the trailing pair of hyphens (--), which specifies to most database servers that the remainder of the statement is to be treated as a comment and not executed. In this case the comment character serves to remove the trailing single-quote left over from the modified query. In a database where comments are not allowed to be used in this way, the general attack could still be made effective using a trick similar to the one shown in Example 1. If an attacker enters the string &amp;quot;name'); DELETE FROM items; SELECT * FROM items WHERE 'a'='a&amp;quot;, the following three valid statements will be created:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items &lt;br /&gt;
	WHERE owner = 'hacker'&lt;br /&gt;
	AND itemname = 'name';&lt;br /&gt;
&lt;br /&gt;
	DELETE FROM items;&lt;br /&gt;
&lt;br /&gt;
	SELECT * FROM items WHERE 'a'='a';&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
One traditional approach to preventing SQL injection attacks is to handle them as an input validation problem and either accept only characters from a whitelist of safe values or identify and escape a blacklist of potentially malicious values. Whitelisting can be a very effective means of enforcing strict input validation rules, but parameterized SQL statements require less maintenance and can offer more guarantees with respect to security. As is almost always the case, blacklisting is riddled with loopholes that make it ineffective at preventing SQL injection attacks. For example, attackers can:&lt;br /&gt;
&lt;br /&gt;
* Target fields that are not quoted &lt;br /&gt;
* Find ways to bypass the need for certain escaped meta-characters &lt;br /&gt;
* Use stored procedures to hide the injected meta-characters &lt;br /&gt;
&lt;br /&gt;
Manually escaping characters in input to SQL queries can help, but it will not make your application secure from SQL injection attacks.&lt;br /&gt;
&lt;br /&gt;
Another solution commonly proposed for dealing with SQL injection attacks is to use stored procedures. Although stored procedures prevent some types of SQL injection attacks, they fail to protect against many others. For example, the following PL/SQL procedure is vulnerable to the same SQL injection attack shown in the first example.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	procedure get_item (&lt;br /&gt;
		itm_cv IN OUT ItmCurTyp,&lt;br /&gt;
		usr in varchar2,&lt;br /&gt;
		itm in varchar2)&lt;br /&gt;
	is&lt;br /&gt;
		open itm_cv for ' SELECT * FROM items WHERE ' ||&lt;br /&gt;
				'owner = '''|| usr || &lt;br /&gt;
				' AND itemname = ''' || itm || '''';&lt;br /&gt;
	end get_item;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stored procedures typically help prevent SQL injection attacks by limiting the types of statements that can be passed to their parameters. However, there are many ways around the limitations and many interesting statements that can still be passed to stored procedures. Again, stored procedures can prevent some exploits, but they will not make your application secure against SQL injection attacks.&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
* [[:Category:Command Execution]] &lt;br /&gt;
* [[Injection problem]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Top 10 2007-Injection Flaws | injection attack]]&lt;br /&gt;
* [[Blind SQL Injection]]&lt;br /&gt;
* [[Code Injection]]&lt;br /&gt;
* [[Double Encoding]]&lt;br /&gt;
* [[Interpreter_Injection#ORM_Injection]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[Input Validation]]&lt;br /&gt;
* [[Output Validation]]&lt;br /&gt;
* [[Static Code Analysis]]&lt;br /&gt;
[[Category:FIXME|this was the text that was here before we added the links. Can it be deleted?&lt;br /&gt;
Avoidance and mitigation &lt;br /&gt;
&lt;br /&gt;
* Requirements specification: A non-SQL style database which is not subject to this flaw may be chosen.&lt;br /&gt;
&lt;br /&gt;
* Implementation: Use vigorous white-list style checking on any user input that may be used in an SQL command. Rather than escape meta-characters, it is safest to disallow them entirely. Reason: Later use of data that has been entered in the database may neglect to escape meta-characters before use.&lt;br /&gt;
&lt;br /&gt;
* Image:Advanced Topics on SQL Injection Protection.ppt&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==References ==&lt;br /&gt;
* [http://www.websec.ca/kb/sql_injection SQL Injection Knowledge Base] - A reference guide for MySQL, MSSQL and Oracle SQL Injection attacks.&lt;br /&gt;
* [http://www.greensql.net/ GreenSQL Open Source SQL Injection Filter] - An Open Source database firewall used to protect databases from SQL injection attacks.&lt;br /&gt;
* [http://www.net-security.org/dl/articles/IntegrigyIntrotoSQLInjectionAttacks.pdf An Introduction to SQL Injection Attacks for Oracle Developers] - This also includes recommended defenses.&lt;br /&gt;
* OWASP [[:Category:OWASP_SQLiX_Project | SQLiX Project]] - An SQL Injection Scanner.&lt;br /&gt;
* [http://www.nosec.org/en/pangolin.html Pangolin] - Closed source SQL Injection Scanner.&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Shivam Dixit</name></author>	</entry>

	</feed>