<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Spinkham</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Spinkham"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Spinkham"/>
		<updated>2026-05-02T03:48:17Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=242951</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=242951"/>
				<updated>2018-08-29T20:21:15Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Add meetup tag to keep meetings up to date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leaders are Chris Romeo and [mailto:steve.pinkham@owasp.org Steve Pinkham]. The current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Eric Hart&lt;br /&gt;
* Steve Pinkham&lt;br /&gt;
* Chris Romeo&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
We hope that you will join us at our meetings soon!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;owasptriangle&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is iContact.&lt;br /&gt;
&lt;br /&gt;
We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=237407</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=237407"/>
				<updated>2018-02-08T05:49:53Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leaders are Chris Romeo and [mailto:steve.pinkham@owasp.org Steve Pinkham]. The current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Eric Hart&lt;br /&gt;
* Steve Pinkham&lt;br /&gt;
* Chris Romeo&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
&lt;br /&gt;
February 22, 2018&lt;br /&gt;
&lt;br /&gt;
Please RSVP at [https://www.meetup.com/owasptriangle/events/237687599/ https://www.meetup.com/owasptriangle/]&lt;br /&gt;
&lt;br /&gt;
====== Building an AppSec Program on the Cheap with OWASP ======&lt;br /&gt;
Explore the OWASP universe and how to build an application security program with a budget of $0 using only the open-source documents and tools that OWASP provides. Experience a practitioner's guide for how to take the most famous OWASP projects and meld them together into a working program. Projects are broken down into training/awareness/definition, builder, breaker, and defender, with an explanation of the human resources required to make this successful.&lt;br /&gt;
&lt;br /&gt;
The meetings food is being provided primarily with funds donated by HPE / Fortify. We thank them for their support of OWASP's mission to increase software security awareness and effectiveness, and hope you will let them know you appreciate it in any future interactions you have with them.&lt;br /&gt;
&lt;br /&gt;
Hope you can all join us!&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
HPE/Fortify is a Gold Chapter Supporter, and we thank them very much for their recent donation.&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is iContact.&lt;br /&gt;
&lt;br /&gt;
We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=233584</id>
		<title>OWASP DefectDojo Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=233584"/>
				<updated>2017-09-21T17:50:51Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Fixed link to getting started guide&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DefectDojo Tool Project ==&lt;br /&gt;
An open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools.&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a tracking tool written in Python / Django. DefectDojo was created in 2013 and open-sourced on March 13th, 2015. The project was started to make optimizing vulnerability tracking less painful. The top goal of DefectDojo is to reduce the amount of time security professionals spend logging vulnerabilities. DefectDojo accomplishes this by offering a templating system for vulnerabilities, imports for common vulnerability scanners, report generation, and metrics.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
DefectDojo streamlines the testing process through several 'models' that an admin can manipulate with Python code. The core models include: 'engagements', 'tests' and 'findings'. DefectDojo has supplemental models that facilitate metrics, authentication, report generation, and tools. DefectDojo is written in Python 2.7 with Django 1.8.&lt;br /&gt;
&lt;br /&gt;
Testing or installing DefectDojo is easy. There is a live demo for interested parties to try Dojo [https://github.com/rackerlabs/django-DefectDojo#demo here]. If you decide to setup an instance of Dojo for your organization, we have developed a script that handles all dependencies, configures the database, and creates a super user. Complete installation instructions are found [https://github.com/rackerlabs/django-DefectDojo#installation here]. A complete walk-through can be found [http://defectdojo.readthedocs.org/en/latest/ here]. Documented example workflows can be found [https://github.com/rackerlabs/django-DefectDojo/blob/master/doc/workflows.md].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
DefectDojo is licensed under the [https://github.com/rackerlabs/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License].&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo#demo Live Demo]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo/blob/master/docs/getting-started.rst Getting Started Guide]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo/releases What's New]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[https://www.owasp.org/index.php/User:Devgreg Greg Anderson] [mailto:greg.anderson@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[mailto:charles.neill@owasp.org Charles Neill]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Grendel Jay Paz][mailto:jay.paz@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSec_Pipeline OWASP AppSec Pipeline]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Code]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [1 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.0 Version 1.1.0 Released]&lt;br /&gt;
* [22 Dec 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.5 Version 1.0.5 Released]&lt;br /&gt;
* [08 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.4 Version 1.0.4 Released]&lt;br /&gt;
* [27 Jul 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.3 Version 1.0.3 Released]&lt;br /&gt;
* [16 Jun 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.2 Version 1.0.2 Released]&lt;br /&gt;
* [30 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.1 Version 1.0.1 Released]&lt;br /&gt;
* [02 Apr 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0 Version 1.0.0 Released]&lt;br /&gt;
* [15 Mar 2015] [https://github.com/rackerlabs/django-DefectDojo DefectDojo is open-sourced]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leaders aware of your available time to contribute to the project. It is also important to let the Leaders know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. If you are a programmer and wish to contribute code, we regularly review [https://github.com/rackerlabs/django-DefectDojo/pulls pull requests].&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for people to help translate our documentation. See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Greg Anderson - Greg wrote the original code base with Charles Neill&lt;br /&gt;
* Charles Neill - Charles wrote the original code base with Greg Anderson.&lt;br /&gt;
* Jay Paz - Jay added a multitude of functionalities / UI enhancements, that has made Dojo production ready.&lt;br /&gt;
* Michael Dong - Michael dong contributed to the baseline self-service tools.&lt;br /&gt;
*Fatimah Zohra - Fatimah also contributed to the baseline self-service tools.&lt;br /&gt;
* Aarron Weaver - Added CheckMarx support.&lt;br /&gt;
* Yaakov Saxon - Fixed ZAP and CWE parsing.&lt;br /&gt;
* Matt Valdes - Fixed an issue with the Ansible install.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
At this time, Dojo is already being used by multiple large enterprises, but there is still many aspects we want to improve. Part of our next steps is to better evangelize our work and encourage others to contribute. However, we do have a set of core contributors that actively work on the project. Feature-wise, we hope to push a proof of concept plugin that will aid in retesting automation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of March, 2016, the highest priorities for the next 6 months are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* A proof of concept plugin that will aid in retesting automation&lt;br /&gt;
* JIRA Integration&lt;br /&gt;
* Dynamic Application Tagging.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* CI / CD for pull requests&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to produce a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer any help.&lt;br /&gt;
&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template DefectDojo project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP DefectDojo&lt;br /&gt;
| project_description =OWASP DefectDojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools. &lt;br /&gt;
| project_license = [https://github.com/rackerlabs/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License]&lt;br /&gt;
| leader_name1=Greg Anderson&lt;br /&gt;
| leader_email1=greg.anderson@owasp.org&lt;br /&gt;
| leader_username1=devgreg&lt;br /&gt;
| leader_name2=Charles Neill&lt;br /&gt;
| leader_email2=charles.neill@owasp.org&lt;br /&gt;
| leader_username2=N/A&lt;br /&gt;
| leader_name3=Jay Paz&lt;br /&gt;
| leader_email3= N/A&lt;br /&gt;
| leader_username3=grendel&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:Projects|DefectDojo]]&lt;br /&gt;
[[Category:Incubator Projects|DefectDojo]]&lt;br /&gt;
[[Category:OWASP DefectDojo|DefectDojo]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=233583</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=233583"/>
				<updated>2017-09-21T15:58:33Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leaders are Chris Romeo and [mailto:steve.pinkham@owasp.org Steve Pinkham]. The current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Eric Hart&lt;br /&gt;
* Steve Pinkham&lt;br /&gt;
* Chris Romeo&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
&lt;br /&gt;
October, 2017, details TBA&lt;br /&gt;
&lt;br /&gt;
Please RSVP at https://www.meetup.com/owasptriangle/events/237687599/&lt;br /&gt;
&lt;br /&gt;
OWASP Triangle Chapter is back for 2017! We are making some changes to enhance your experience as a member of this Meetup! Starting this month, we'll provide two separate talks at each Meetup. We'll also have dinner each time, so that those coming directly from work do not go hungry! iContact is our new meeting space sponsor, so please look closely at the new location. We no longer need to collect names and employers, but still please RSVP so we ensure that we order enough food. &lt;br /&gt;
&lt;br /&gt;
We're proud to welcome Phillip Maddux (AKA Px Mx AKA foospidy) as our primary speaker. Phillip works at Signal Sciences, and will share a talk entitled &amp;quot;Application Security for the Modern Web&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
Over the last several years we’ve witnessed, and experienced, an advance towards new approaches in web technologies and the processes to deploy web applications. In this talk, we’ll explore and describe the  “Modern Web”, discuss observations on the evolution of the Secure SDLC, recognize existing challenges in achieving real-time threat visibility once web applications are deployed to production, and finally, walk through the concepts that address the challenges in fast paced “agile” development cycles. &lt;br /&gt;
&lt;br /&gt;
Before the main talk we will have food and Steve Pinkham will kick off our new series called &amp;quot;Back to Basics&amp;quot;.  Each meeting we'll have a short introductory talk covering one of the OWASP Top 10 Application Security Threats.  This month we will cover #1: Injection&lt;br /&gt;
&lt;br /&gt;
The meetings food is being provided primarily with funds donated by HPE / Fortify. We thank them for their support of OWASP's mission to increase software security awareness and effectiveness, and hope you will let them know you appreciate it in any future interactions you have with them. &lt;br /&gt;
&lt;br /&gt;
Hope you can all join us!&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
HPE/Fortify is a Gold Chapter Supporter, and we thank them very much for their recent donation.&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is iContact.&lt;br /&gt;
&lt;br /&gt;
We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=226321</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=226321"/>
				<updated>2017-02-14T03:07:32Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Eric Hart&lt;br /&gt;
* Steve PInkham&lt;br /&gt;
* Chris Romeo&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
&lt;br /&gt;
February 23, 2017&lt;br /&gt;
&lt;br /&gt;
6:30 PM to 8:30 PM&lt;br /&gt;
&lt;br /&gt;
iContact: 2121 RDU Center Drive, 4th Floor, Morrisville, NC&lt;br /&gt;
&lt;br /&gt;
Please RSVP at https://www.meetup.com/owasptriangle/events/237687599/&lt;br /&gt;
&lt;br /&gt;
OWASP Triangle Chapter is back for 2017! We are making some changes to enhance your experience as a member of this Meetup! Starting this month, we'll provide two separate talks at each Meetup. We'll also have dinner each time, so that those coming directly from work do not go hungry! iContact is our new meeting space sponsor, so please look closely at the new location. We no longer need to collect names and employers, but still please RSVP so we ensure that we order enough food. &lt;br /&gt;
&lt;br /&gt;
We're proud to welcome Phillip Maddux (AKA Px Mx AKA foospidy) as our primary speaker. Phillip works at Signal Sciences, and will share a talk entitled &amp;quot;Application Security for the Modern Web&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
Over the last several years we’ve witnessed, and experienced, an advance towards new approaches in web technologies and the processes to deploy web applications. In this talk, we’ll explore and describe the  “Modern Web”, discuss observations on the evolution of the Secure SDLC, recognize existing challenges in achieving real-time threat visibility once web applications are deployed to production, and finally, walk through the concepts that address the challenges in fast paced “agile” development cycles. &lt;br /&gt;
&lt;br /&gt;
Before the main talk we will have food and Steve Pinkham will kick off our new series called &amp;quot;Back to Basics&amp;quot;.  Each meeting we'll have a short introductory talk covering one of the OWASP Top 10 Application Security Threats.  This month we will cover #1: Injection&lt;br /&gt;
&lt;br /&gt;
The meetings food is being provided primarily with funds donated by HPE / Fortify. We thank them for their support of OWASP's mission to increase software security awareness and effectiveness, and hope you will let them know you appreciate it in any future interactions you have with them. &lt;br /&gt;
&lt;br /&gt;
Hope you can all join us!&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
HPE/Fortify is a Gold Chapter Supporter, and we thank them very much for their recent donation.&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is iContact.&lt;br /&gt;
&lt;br /&gt;
We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=226320</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=226320"/>
				<updated>2017-02-14T03:05:21Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Next Meeting */ Feb 20176 meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Eric Hart&lt;br /&gt;
* Steve PInkham&lt;br /&gt;
* Chris Romeo&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
&lt;br /&gt;
Thursday, February 23, 2017&lt;br /&gt;
6:30 PM to 8:30 PM&lt;br /&gt;
iContact&lt;br /&gt;
2121 RDU Center Drive, 4th Floor, Morrisville, NC&lt;br /&gt;
&lt;br /&gt;
Please RSVP at https://www.meetup.com/owasptriangle/events/237687599/&lt;br /&gt;
&lt;br /&gt;
OWASP Triangle Chapter is back again! We are making some changes to enhance your experience as a member of this Meetup! Starting this month, we'll provide two separate talks at each Meetup. We'll also have dinner each time, so that those coming directly from work do not go hungry! iContact is our new meeting space sponsor, so please look closely at the new location. We no longer need to collect names and employers, but still please RSVP so we ensure that we order enough food. &lt;br /&gt;
&lt;br /&gt;
We're proud to welcome Phillip Maddux (AKA Px Mx AKA foospidy) as our primary speaker. Phillip works at Signal Sciences, and will share a talk entitled &amp;quot;Application Security for the Modern Web&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
Over the last several years we’ve witnessed, and experienced, an advance towards new approaches in web technologies and the processes to deploy web applications. In this talk, we’ll explore and describe the  “Modern Web”, discuss observations on the evolution of the Secure SDLC, recognize existing challenges in achieving real-time threat visibility once web applications are deployed to production, and finally, walk through the concepts that address the challenges in fast paced “agile” development cycles. &lt;br /&gt;
&lt;br /&gt;
Before the main talk we will have food and Steve Pinkham will kick off our new series called &amp;quot;Back to Basics&amp;quot;.  Each meeting we'll have a short introductory talk covering one of the OWASP Top 10 Application Security Threats.  This month we will cover #1: Injection&lt;br /&gt;
&lt;br /&gt;
The meetings food is being provided primarily with funds donated by HPE / Fortify. We thank them for their support of OWASP's mission to increase software security awareness and effectiveness, and hope you will let them know you appreciate it in any future interactions you have with them. &lt;br /&gt;
&lt;br /&gt;
Hope you can all join us!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
HPE/Fortify is a Gold Chapter Supporter, and we thank them very much for their recent donation.&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is iContact.&lt;br /&gt;
&lt;br /&gt;
We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=226319</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=226319"/>
				<updated>2017-02-14T01:23:49Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Change sponsors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Eric Hart&lt;br /&gt;
* Steve PInkham&lt;br /&gt;
* Chris Romeo&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hope you can all join us!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
HPE/Fortify is a Gold Chapter Supporter, and we thank them very much for their recent donation.&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is iContact.&lt;br /&gt;
&lt;br /&gt;
We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=225928</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=225928"/>
				<updated>2017-02-03T01:27:18Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: New board, clear old meeting anouncement&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Eric Hart&lt;br /&gt;
* Steve PInkham&lt;br /&gt;
* Chris Romeo&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hope you can all join us!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is Credit Suisse. We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=208842</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=208842"/>
				<updated>2016-02-13T16:44:53Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Jonathon Brenner&lt;br /&gt;
* Barbara Cosgriff&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Dan Fiedler&lt;br /&gt;
* Peter Hewett&lt;br /&gt;
* Luke Stephens&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
Declarative Security: Opting in to browser protections for safer apps&lt;br /&gt;
&lt;br /&gt;
Come discuss declarative security with us, and learn and/or share how you can make your apps safer with security directives like Strict Transport Security, Content Security Policy and the like. We'll cover the vulns, the protections, browser support and impact on development.&lt;br /&gt;
&lt;br /&gt;
Hope you can all join us!&lt;br /&gt;
&lt;br /&gt;
Credit Suisse is our meeting space sponsor. As for past meetups there, signups close the day before the event, and we do need answers to the signup questions of real name and employer for the security desk. Thanks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Location: Credit Suisse&lt;br /&gt;
Time: February 18, 6:30-8:00&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is Credit Suisse. We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=208841</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=208841"/>
				<updated>2016-02-13T16:43:53Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Jonathon Brenner&lt;br /&gt;
* Barbara Cosgriff&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Dan Fiedler&lt;br /&gt;
* Peter Hewett&lt;br /&gt;
* Luke Stephens&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
Declarative Security: Opting in to browser protections for safer apps&lt;br /&gt;
&lt;br /&gt;
Come discuss declarative security with us, and learn and/or share how you can make your apps safer with security directives like Strict Transport Security, Content Security Policy and the like. We'll cover the vulns, the protections, browser support and impact on development.&lt;br /&gt;
&lt;br /&gt;
Hope you can all join us!&lt;br /&gt;
&lt;br /&gt;
Credit Suisse is our meeting space sponsor. As for past meetups there, signups close the day before the event, and we do need answers to the signup questions of real name and employer for the security desk. Thanks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Location: Credit Suisse&lt;br /&gt;
Time: Febuary 13, 6:30-8:00&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is Credit Suisse. We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=202171</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=202171"/>
				<updated>2015-10-15T21:07:45Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Jonathon Brenner&lt;br /&gt;
* Barbara Cosgriff&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Dan Fiedler&lt;br /&gt;
* Peter Hewett&lt;br /&gt;
* Luke Stephens&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
Coding for Security: 5 Things a Bad Guy Wants YOU To Do&lt;br /&gt;
&lt;br /&gt;
Luke Stephens of Tek Security Group will be presenting on secure coding this month.  Luke is a great speaker with a deep and varied background, so don't miss this one!&lt;br /&gt;
For more details about the conten and to RSVP, please visit the meetup page: http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Location: Credit Suisse&lt;br /&gt;
Time: October 15, 6:30-8:30&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes. &lt;br /&gt;
&lt;br /&gt;
http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is Credit Suisse. We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=199783</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=199783"/>
				<updated>2015-09-01T16:17:23Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Next Meeting */  Put up September's meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Jonathon Brenner&lt;br /&gt;
* Barbara Cosgriff&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Dan Fiedler&lt;br /&gt;
* Peter Hewett&lt;br /&gt;
* Luke Stephens&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
Cisco’s Security Dojo: Raising the Application Security Awareness of 20,000+&lt;br /&gt;
&lt;br /&gt;
Chris Romeo of Cisco will be sharing with us his experiences guiding their Security Advocate program to drive application security awareness and improvement. &lt;br /&gt;
He will be giving the same talk a week later at the national conference, so were excited to have him present for us first! &lt;br /&gt;
For more details about the content you can see the AppSecUSA listing: http://appsecusa2015.sched.org/event/0614d5358a88cdc61652d078763b63d7&lt;br /&gt;
&lt;br /&gt;
Location: Credit Suisse&lt;br /&gt;
Time: September 17, 6:30-8:30&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes.&lt;br /&gt;
&lt;br /&gt;
For more details see our meetup page: http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is Credit Suisse. We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=199661</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=199661"/>
				<updated>2015-08-27T15:58:28Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Jonathon Brenner&lt;br /&gt;
* Barbara Cosgriff&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Dan Fiedler&lt;br /&gt;
* Peter Hewett&lt;br /&gt;
* Luke Stephens&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
Credit Suisse&lt;br /&gt;
August 27, 6:30-8:30&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes.&lt;br /&gt;
For more details see our meetup page: http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
==Current Sponsors==&lt;br /&gt;
&lt;br /&gt;
Our current meeting space sponsor is Credit Suisse. We are seeking meeting/food sponsors, please contact us if you are interested!&lt;br /&gt;
&lt;br /&gt;
==Involvement==&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, food, content and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:North Carolina]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=198547</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=198547"/>
				<updated>2015-08-07T18:16:42Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Jonathon Brenner&lt;br /&gt;
* Barbara Cosgriff&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Dan Fiedler&lt;br /&gt;
* Peter Hewett&lt;br /&gt;
* Luke Stephens&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
[[Category:North Carolina]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
Credit Suisse&lt;br /&gt;
August 27, 6:30-8:30&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes.&lt;br /&gt;
For more details see our meetup page: http://www.meetup.com/owasptriangle/&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=198546</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=198546"/>
				<updated>2015-08-07T18:15:56Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Clean up duplicate content from new template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Jonathon Brenner&lt;br /&gt;
* Barbara Cosgriff&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Dan Fiedler&lt;br /&gt;
* Peter Hewett&lt;br /&gt;
* Luke Stephens&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
[[Category:North Carolina]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
Credit Suisse&lt;br /&gt;
August 27, 6:30-8:30&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes.&lt;br /&gt;
For more details see our meetup page: http://www.meetup.com/owasptriangle/&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=198545</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=198545"/>
				<updated>2015-08-07T18:11:28Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Announce next meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Jonathon Brenner&lt;br /&gt;
* Barbara Cosgriff&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Dan Fiedler&lt;br /&gt;
* Peter Hewett&lt;br /&gt;
* Luke Stephens&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
Credit Suisse&lt;br /&gt;
August 27, 6:30-8:30&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings, but registration is required at meetup for planning purposes.&lt;br /&gt;
For more details see our meetup page: http://www.meetup.com/owasptriangle/&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to presenting or leading with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:North Carolina]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.  &lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.  The [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page] has details of our next meeting.  RSVP if possible.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=167767</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=167767"/>
				<updated>2014-02-09T23:41:59Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The current chapter leader is [mailto:steve.pinkham@owasp.org Steve Pinkham], current board consists of: &lt;br /&gt;
&lt;br /&gt;
* Jonathon Brenner&lt;br /&gt;
* Barbara Cosgriff&lt;br /&gt;
* Rich Daugherty&lt;br /&gt;
* Dan Fiedler&lt;br /&gt;
* Peter Hewett&lt;br /&gt;
* Luke Stephens&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:North Carolina]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
Various&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &lt;br /&gt;
&lt;br /&gt;
TBA.&lt;br /&gt;
&lt;br /&gt;
For more details see our meetup page: http://www.meetup.com/owaspnc/&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.  Consistent meeting space is currently our biggest need.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.  The [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page] has details of our next meeting.  RSVP if possible.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=167766</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=167766"/>
				<updated>2014-02-09T23:35:09Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Triangle|extra=The chapter leaders are [mailto:steve.pinkham@owasp.org Steve Pinkham] and [prplwiredwizard@gmail.com Morgan Todd].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Raleigh|emailarchives=http://lists.owasp.org/pipermail/owasp-Raleigh}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:North Carolina]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
Various&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &lt;br /&gt;
&lt;br /&gt;
TBA.&lt;br /&gt;
&lt;br /&gt;
For more details see our meetup page: http://www.meetup.com/owaspnc/&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.  Consistent meeting space is currently our biggest need.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.  The [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page] has details of our next meeting.  RSVP if possible.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=138480</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=138480"/>
				<updated>2012-11-02T04:32:08Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Meeting Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Welcome to the OWASP Raleigh Local Chapter homepage!== &lt;br /&gt;
&lt;br /&gt;
====Chapter Leadership====&lt;br /&gt;
Chapter Leader: [mailto:steve.pinkham@owasp.org Steve Pinkham] &amp;lt;br /&amp;gt;&lt;br /&gt;
Co-organizer: [mailto:prplwiredwizard@gmail.com Morgan Todd]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:North Carolina]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Raleigh&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
Various&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &lt;br /&gt;
&lt;br /&gt;
November 14, 2012&lt;br /&gt;
&lt;br /&gt;
Cameron Village Library, Room 202&lt;br /&gt;
1930, Clark Ave, Raleigh&lt;br /&gt;
&lt;br /&gt;
6:30PM&lt;br /&gt;
&lt;br /&gt;
For more details see our meetup page: http://www.meetup.com/owaspnc/&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.  Consistent meeting space is currently our biggest need.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.  The [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page] has details of our next meeting.  RSVP if possible.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=138479</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=138479"/>
				<updated>2012-11-02T04:28:44Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Meeting Location */  Added next meeting and other info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Welcome to the OWASP Raleigh Local Chapter homepage!== &lt;br /&gt;
&lt;br /&gt;
====Chapter Leadership====&lt;br /&gt;
Chapter Leader: [mailto:steve.pinkham@owasp.org Steve Pinkham] &amp;lt;br /&amp;gt;&lt;br /&gt;
Co-organizer: [mailto:prplwiredwizard@gmail.com Morgan Todd]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:North Carolina]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Raleigh&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
Various&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &lt;br /&gt;
&lt;br /&gt;
November 14, 2012&lt;br /&gt;
&lt;br /&gt;
Cameron Village Library, Room 202&lt;br /&gt;
1930, Clark Ave, Raleigh&lt;br /&gt;
&lt;br /&gt;
6:30PM&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.  Consistent meeting space is currently our biggest need.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.  The [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page] has details of our next meeting.  RSVP if possible.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=130218</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=130218"/>
				<updated>2012-05-21T16:00:54Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Chapter Leadership */  Add Morgan Todd as co-organizer, change Steve Pinkham to Chapter Leader to match OWASP chapter policies&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Welcome to the OWASP Raleigh Local Chapter homepage!== &lt;br /&gt;
&lt;br /&gt;
====Chapter Leadership====&lt;br /&gt;
Chapter Leader: [mailto:steve.pinkham@owasp.org Steve Pinkham] &amp;lt;br /&amp;gt;&lt;br /&gt;
Co-organizer: [mailto:prplwiredwizard@gmail.com Morgan Todd]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:North Carolina]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Raleigh&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
TBD, see Meetup page&lt;br /&gt;
&lt;br /&gt;
Next Meeting: TBD, see the [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page].&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.  The [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page] has details of our next meeting.  RSVP if possible.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=114443</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=114443"/>
				<updated>2011-07-22T20:01:51Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: OWASP NC -&amp;gt; OWASP Raleigh as Charlotte chapter is running again&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Welcome to the OWASP Raleigh Local Chapter homepage!== &lt;br /&gt;
&lt;br /&gt;
====Chapter Leadership====&lt;br /&gt;
President: [mailto:steve.pinkham@gmail.com Steve Pinkham] &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:North Carolina]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Raleigh&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
TBD, see Meetup page&lt;br /&gt;
&lt;br /&gt;
Next Meeting: TBD, see the [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page].&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.  The [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page] has details of our next meeting.  RSVP if possible.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SQL_Injection&amp;diff=109415</id>
		<title>SQL Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SQL_Injection&amp;diff=109415"/>
				<updated>2011-04-25T06:49:04Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Make pangolin reference more neutral per Content Guidelines&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Security Focus Area]]&lt;br /&gt;
__NOTOC__&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
A [[SQL injection]] attack consists of insertion or &amp;quot;injection&amp;quot; of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. &lt;br /&gt;
SQL injection attacks are a type of  [[Top 10 2007-Injection Flaws | injection attack]], in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.&lt;br /&gt;
&lt;br /&gt;
==Threat Modeling==&lt;br /&gt;
* SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. &lt;br /&gt;
* SQL Injection is very common with PHP and ASP applications due to the prevalence of older functional interfaces. Due to the nature of programmatic interfaces available, J2EE and ASP.NET applications are less likely to have easily exploited SQL injections. &lt;br /&gt;
* The severity of SQL Injection attacks is limited by the attacker’s skill and imagination, and to a lesser extent, defense in depth countermeasures, such as low privilege connections to the database server and so on. In general, consider SQL Injection a high impact severity.&lt;br /&gt;
&lt;br /&gt;
==Related Security Activities==&lt;br /&gt;
&lt;br /&gt;
===How to Avoid SQL Injection Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Guide]] article on how to [[Guide to SQL Injection | Avoid SQL Injection]] Vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
See the OWASP [[SQL Injection Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
===How to Review Code for SQL Injection Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for SQL Injection|Review Code for SQL Injection]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===How to Test for SQL Injection Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for SQL Injection    (OWASP-DV-005)|Test for SQL Injection]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
SQL injection errors occur when:&lt;br /&gt;
&lt;br /&gt;
# Data enters a program from an untrusted source. &lt;br /&gt;
# The data used to dynamically construct a SQL query &lt;br /&gt;
&lt;br /&gt;
The main consequences are:&lt;br /&gt;
&lt;br /&gt;
* '''Confidentiality''': Since SQL databases generally hold sensitive data, loss of confidentiality is a frequent problem with [[Glossary#SQL Injection|SQL Injection]] vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
* '''Authentication''': If poor SQL commands are used to check user names and passwords, it may be possible to connect to a system as another user with no previous knowledge of the password.&lt;br /&gt;
&lt;br /&gt;
* '''Authorization''': If authorization information is held in a SQL database, it may be possible to change this information through the successful exploitation of a [[Glossary#SQL Injection|SQL Injection]] vulnerability.&lt;br /&gt;
&lt;br /&gt;
* '''Integrity''': Just as it may be possible to read sensitive information, it is also possible to make changes or even delete this information with a [[Glossary#SQL Injection|SQL Injection]] attack.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors==&lt;br /&gt;
The platform affected can be:&lt;br /&gt;
* Language: SQL&lt;br /&gt;
* Platform: Any (requires interaction with a SQL database)&lt;br /&gt;
&lt;br /&gt;
[[Glossary#SQL Injection|SQL Injection]] has become a common issue with database-driven web sites. The flaw is easily detected, and easily exploited, and as such, any site or software package with even a minimal user base is likely to be subject to an attempted attack of this kind. &lt;br /&gt;
&lt;br /&gt;
Essentially, the attack is accomplished by placing a meta character into data input to then place SQL commands in the control plane, which did not exist there before. This flaw depends on the fact that SQL makes no real distinction between the control and data planes.&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
In SQL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
select id, firstname, lastname from authors&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If one provided:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Firstname: evil'ex&lt;br /&gt;
Lastname: Newman&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
the query string becomes:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
select id, firstname, lastname from authors where forename = 'evil'ex' and surname ='newman'&lt;br /&gt;
which the database attempts to run as &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Incorrect syntax near al' as the database tried to execute evil. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A safe version of the above SQL statement could be coded in Java as:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
String firstname = req.getParameter(&amp;quot;firstname&amp;quot;);&lt;br /&gt;
String lastname = req.getParameter(&amp;quot;lastname&amp;quot;);&lt;br /&gt;
// FIXME: do your own validation to detect attacks&lt;br /&gt;
String query = &amp;quot;SELECT id, firstname, lastname FROM authors WHERE forename = ? and surname = ?&amp;quot;;&lt;br /&gt;
PreparedStatement pstmt = connection.prepareStatement( query );&lt;br /&gt;
pstmt.setString( 1, firstname );&lt;br /&gt;
pstmt.setString( 2, lastname );&lt;br /&gt;
try&lt;br /&gt;
{&lt;br /&gt;
	ResultSet results = pstmt.execute( );&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&lt;br /&gt;
The following C# code dynamically constructs and executes a SQL query that searches for items matching a specified name. The query restricts the items displayed to those where owner matches the user name of the currently-authenticated user.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	...&lt;br /&gt;
	string userName = ctx.getAuthenticatedUserName();&lt;br /&gt;
	string query = &amp;quot;SELECT * FROM items WHERE owner = &amp;quot;'&amp;quot; &lt;br /&gt;
					+ userName + &amp;quot;' AND itemname = '&amp;quot;  &lt;br /&gt;
					+ ItemName.Text + &amp;quot;'&amp;quot;;&lt;br /&gt;
	sda = new SqlDataAdapter(query, conn);&lt;br /&gt;
	DataTable dt = new DataTable();&lt;br /&gt;
	sda.Fill(dt);&lt;br /&gt;
	...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The query that this code intends to execute follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items&lt;br /&gt;
	WHERE owner = &lt;br /&gt;
	AND itemname = ;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, because the query is constructed dynamically by concatenating a constant base query string and a user input string, the query only behaves correctly if itemName does not contain a single-quote character. If an attacker with the user name wiley enters the string &amp;quot;name' OR 'a'='a&amp;quot; for itemName, then the query becomes the following:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items&lt;br /&gt;
	WHERE owner = 'wiley'&lt;br /&gt;
	AND itemname = 'name' OR 'a'='a';&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The addition of the OR 'a'='a' condition causes the where clause to always evaluate to true, so the query becomes logically equivalent to the much simpler query:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This simplification of the query allows the attacker to bypass the requirement that the query only return items owned by the authenticated user; the query now returns all entries stored in the items table, regardless of their specified owner.&lt;br /&gt;
&lt;br /&gt;
===Example 3===&lt;br /&gt;
&lt;br /&gt;
This example examines the effects of a different malicious value passed to the query constructed and executed in Example 1. If an attacker with the user name hacker enters the string &amp;quot;hacker'); DELETE FROM items; --&amp;quot; for itemName, then the query becomes the following two queries:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items &lt;br /&gt;
	WHERE owner = 'hacker'&lt;br /&gt;
	AND itemname = 'name';&lt;br /&gt;
&lt;br /&gt;
	DELETE FROM items;&lt;br /&gt;
&lt;br /&gt;
	--'&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Many database servers, including Microsoft® SQL Server 2000, allow multiple SQL statements separated by semicolons to be executed at once. While this attack string results in an error in Oracle and other database servers that do not allow the batch-execution of statements separated by semicolons, in databases that do allow batch execution, this type of attack allows the attacker to execute arbitrary commands against the database.&lt;br /&gt;
&lt;br /&gt;
Notice the trailing pair of hyphens (--), which specifies to most database servers that the remainder of the statement is to be treated as a comment and not executed. In this case the comment character serves to remove the trailing single-quote left over from the modified query. In a database where comments are not allowed to be used in this way, the general attack could still be made effective using a trick similar to the one shown in Example 1. If an attacker enters the string &amp;quot;name'); DELETE FROM items; SELECT * FROM items WHERE 'a'='a&amp;quot;, the following three valid statements will be created:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	SELECT * FROM items &lt;br /&gt;
	WHERE owner = 'hacker'&lt;br /&gt;
	AND itemname = 'name';&lt;br /&gt;
&lt;br /&gt;
	DELETE FROM items;&lt;br /&gt;
&lt;br /&gt;
	SELECT * FROM items WHERE 'a'='a';&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
One traditional approach to preventing SQL injection attacks is to handle them as an input validation problem and either accept only characters from a whitelist of safe values or identify and escape a blacklist of potentially malicious values. Whitelisting can be a very effective means of enforcing strict input validation rules, but parameterized SQL statements require less maintenance and can offer more guarantees with respect to security. As is almost always the case, blacklisting is riddled with loopholes that make it ineffective at preventing SQL injection attacks. For example, attackers can:&lt;br /&gt;
&lt;br /&gt;
* Target fields that are not quoted &lt;br /&gt;
* Find ways to bypass the need for certain escaped meta-characters &lt;br /&gt;
* Use stored procedures to hide the injected meta-characters &lt;br /&gt;
&lt;br /&gt;
Manually escaping characters in input to SQL queries can help, but it will not make your application secure from SQL injection attacks.&lt;br /&gt;
&lt;br /&gt;
Another solution commonly proposed for dealing with SQL injection attacks is to use stored procedures. Although stored procedures prevent some types of SQL injection attacks, they fail to protect against many others. For example, the following PL/SQL procedure is vulnerable to the same SQL injection attack shown in the first example.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	procedure get_item (&lt;br /&gt;
		itm_cv IN OUT ItmCurTyp,&lt;br /&gt;
		usr in varchar2,&lt;br /&gt;
		itm in varchar2)&lt;br /&gt;
	is&lt;br /&gt;
		open itm_cv for ' SELECT * FROM items WHERE ' ||&lt;br /&gt;
				'owner = '''|| usr || &lt;br /&gt;
				' AND itemname = ''' || itm || '''';&lt;br /&gt;
	end get_item;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stored procedures typically help prevent SQL injection attacks by limiting the types of statements that can be passed to their parameters. However, there are many ways around the limitations and many interesting statements that can still be passed to stored procedures. Again, stored procedures can prevent some exploits, but they will not make your application secure against SQL injection attacks.&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
* [[:Category:Command Execution]] &lt;br /&gt;
* [[Injection problem]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Top 10 2007-Injection Flaws | injection attack]]&lt;br /&gt;
* [[Blind SQL Injection]]&lt;br /&gt;
* [[Code Injection]]&lt;br /&gt;
* [[Double Encoding]]&lt;br /&gt;
* [[Interpreter_Injection#ORM_Injection]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[Input Validation]]&lt;br /&gt;
* [[Output Validation]]&lt;br /&gt;
* [[Static Code Analysis]]&lt;br /&gt;
[[Category:FIXME|this was the text that was here before we added the links. Can it be deleted?&lt;br /&gt;
Avoidance and mitigation &lt;br /&gt;
&lt;br /&gt;
* Requirements specification: A non-SQL style database which is not subject to this flaw may be chosen.&lt;br /&gt;
&lt;br /&gt;
* Implementation: Use vigorous white-list style checking on any user input that may be used in an SQL command. Rather than escape meta-characters, it is safest to disallow them entirely. Reason: Later use of data that has been entered in the database may neglect to escape meta-characters before use.&lt;br /&gt;
&lt;br /&gt;
* Image:Advanced Topics on SQL Injection Protection.ppt&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==References ==&lt;br /&gt;
* [http://www.greensql.net/ GreenSQL Open Source SQL Injection Filter] - An Open Source database firewall used to protect databases from SQL injection attacks.&lt;br /&gt;
* [http://www.net-security.org/dl/articles/IntegrigyIntrotoSQLInjectionAttacks.pdf An Introduction to SQL Injection Attacks for Oracle Developers] - This also includes recommended defenses.&lt;br /&gt;
* OWASP [[:Category:OWASP_SQLiX_Project | SQLiX Project]] - An SQL Injection Scanner.&lt;br /&gt;
* [http://www.nosec.org/en/pangolin.html Pangolin] - Closed source SQL Injection Scanner.&lt;br /&gt;
[[Category:Injection Attack]]&lt;br /&gt;
[[category:Attack]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=106704</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=106704"/>
				<updated>2011-03-12T20:28:54Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Chapter Leadership */ Removed Victor Fayed after non-response of over a month&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Welcome to the OWASP North Carolina Local Chapter homepage!== &lt;br /&gt;
&lt;br /&gt;
====Chapter Leadership====&lt;br /&gt;
President: [mailto:steve.pinkham@gmail.com Steve Pinkham] &amp;lt;br /&amp;gt;&lt;br /&gt;
Vice President: [mailto://CWhitesock(@)coastalfcu(.)org Chris Whitesock] &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Raleigh&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
TBD, see Meetup page&lt;br /&gt;
&lt;br /&gt;
Next Meeting: TBD, see the [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page].&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.  The [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page] has details of our next meeting.  RSVP if possible.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=106236</id>
		<title>OWASP AppSec DC 2010 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=106236"/>
				<updated>2011-03-04T14:21:18Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Add new video releases&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
====Training 11/08====&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 1 - Nov 8th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
&amp;lt;!-- Training Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Training 11/09==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 2 - Nov 9th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''159B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
&amp;lt;!-- Training Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 1 - 11/10==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 1 - Nov 10th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''Defense (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Metrics (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Government (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:50-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Welcome and Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Neal Ziring|Keynote: Neal Ziring]]&amp;lt;br&amp;gt;National Security Agency&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820731 Video] | [[Media: OWASP-appsec2010-app_assurance-nziring-20101110.ppt | Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | OWASP Status Update&amp;lt;br&amp;gt;[[OWASP:About#Global_Board_Members| OWASP Board]]&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18821089 Video] | [http://www.owasp.org/images/0/0f/OWASPDC2010-v1.pdf Slides]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30-10:45 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Redspin30x120.png|link=http://www.redspin.com]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:45-11:30 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Python Basics for Web App Pentesters]]&amp;lt;br&amp;gt;Justin Searle &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19346235 Video] | [[Media: Python_Basics_for_Web_App_Pentesters.zip|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Drive By Downloads: How To Avoid Getting A Cap Popped In Your App]]&amp;lt;br&amp;gt;Neil Daswani&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Dasient_11_10_10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Secure Code Review: Enterprise Metrics]]&amp;lt;br&amp;gt;Richard Tychansky&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:OWASP_-_Secure_Code_Review_Enterprise_Metrics.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise]]&amp;lt;br&amp;gt;Joe Jarzombek &amp;amp; Tom Millar&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18802696 Video] | [[Media:SwA_SCRM_10Nov2010_jj.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:30-11:35 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:35-12:20 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[White and Black box testing of Lotus Domino Applications]]&amp;lt;br&amp;gt;Ari Elias-bachrach and Casey Pike&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19344945 Video] | [[Media: Domino_testing_presentation.ppt‎ | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Protecting Federal Government from Web 2.0 Application Security Risks]]&amp;lt;br&amp;gt;Sarbari Gupta&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Protecting_Federal_Government_from_Web_2.0_Application_Security_Risks_-_Sarbari_Gupta_FINAL.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Measuring Security: 5 KPIs for Successful Web App Security Programs]]&amp;lt;br&amp;gt;Rafal Los&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820054 Video] | [[Media:Magic_Numbers_-_5_KPIs_for_Measuring_WebAppSec_Program_Success_v3.2.pdf | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Security Risk and the Software Supply Chain]]&amp;lt;br&amp;gt;Karen Goertzel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:BoozAllen-AppSecDC2010-sw_scrm.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:20-1:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:20-2:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Pen Testing with Iron]]&amp;lt;br&amp;gt;Andrew Wilson &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:PenTestingWithIron.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Providing application-level assurance through DNSSEC]]&amp;lt;br&amp;gt;Suresh Krishnaswamy, Wes Hardaker and Russ Mundy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Providing-Application-level-Assurance-through-DNSSEC-final.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[H.....t.....t....p.......p....o....s....t]]&amp;lt;br&amp;gt;Onn Chee &amp;amp; Tom Brennan &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18818757 Video] | [http://www.owasp.org/images/4/43/Layer_7_DDOS.pdf Slides]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Understanding How They Attack Your Weaknesses: CAPEC]]&amp;lt;br&amp;gt;Sean Barnum&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Making Security Measurable&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19618464 Video] | [[Media:Making_Security_Measurable_-_CWE_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Understanding How They Attack Your Weaknesses&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19629525 Video] | [[Media:Understanding_How_They_Attack_Your_Weaknesses-CAPEC_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:05-2:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | Break&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:10-2:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking Oracle From Web Apps]]&amp;lt;br&amp;gt;Sumit Siddharth&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19357262 Video] | [[Media: Hacking_Oracle_From_Web_Apps_2.0.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[GuardRails: A Nearly Painless Solution to Insecure Web Applications|GuardRails: A (Nearly) Painless Solution to Insecure Web Applications]]&amp;lt;br&amp;gt;Jonathan Burket, Patrick Mutchler, Michael Weaver and Muzzammil Zaveri&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19355417 Video] | [[Media:Guardrails_owasp_final.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Framed! Security-patching Common Web Development Frameworks]] - Panel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18808494 Video]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:55-3:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:SecureIdeas_30X65.png|link=http://www.secureideas.net]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:10-3:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[wXf: Web Exploitation Framework]]&amp;lt;br&amp;gt;Ken Johnson and Chris Gates&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19104630 Video] | [[Media: WXf_ASDC_Presentation.odp.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[The Strengths of Combining Code Review with Application Penetration Testing]]&amp;lt;br&amp;gt;Dave Wichers&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19104928 Video] | [[Media: 2010-DC_The_Power_of_Code_Review.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Dealing with Web Application Security, Regulation Style]]&amp;lt;br&amp;gt;Andrew Weidenhamer&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/19629938 Video] | [[Media: Andrew_Weidenhamer_AppSecDC_Presentation.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Ensuring Software Assurance Process Maturity]]&amp;lt;br&amp;gt;Edmund Wotring&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/19914698 Video] | [[Media:20101110_-_Ensuring_Software_Assurance_Process_Maturity_-_Final.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:55-4:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:00-4:45 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Pen-Test Panel]]&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/19908268 Video]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Botnet Resistant Coding: Protecting Your Users from Script Kiddies]]&amp;lt;br&amp;gt;Fabian Rothschild and Peter Greko&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Bot_res_enc.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;1&amp;quot; | [[OWASP Broken Web Applications Project Update]]&amp;lt;br&amp;gt;Chuck Willis&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19331937 Video] | [[Media:Chuck_Willis_OWASPBWA_for_OWASP_AppSecDC_2010-11-10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group]]&amp;lt;br&amp;gt;Michele Moss&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105480 Video] | [[Media: OWASP_DC_2010_Moss_fin.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation]]&amp;lt;br&amp;gt;Joshua Windsor and Joshua Pauli&amp;lt;br&amp;gt;Video | [[Media: Smashing_WebGoat_-_AppSecDC_Presentation.odp.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:45-4:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:50-5:35 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners]]&amp;lt;br&amp;gt;David Shelly, Randy Marchany &amp;amp; Joseph Tront&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984178 Video] | [[Media:Closing_the_Gap_AppSecDC_Shelly.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Using Misuse Cases to Articulate Vulnerabilities to Stakeholders]]&amp;lt;br&amp;gt;Scott Mendenhall&amp;lt;br&amp;gt;Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Federal Perspectives on Application Security]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Web Hacking Incident Database (WHID) Report]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19337407 Video] | [[Media:AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:30-7:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Cocktails sponsored by [[Image:Trustwave50x250.png|link=https://www.trustwave.com/‎‎]]&lt;br /&gt;
&amp;lt;!-- Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 2 - 11/11==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 2 - Nov 11th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''New Frontiers (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Process (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:55-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Day 2 Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Ron Ross|Keynote: Ron Ross]]&amp;lt;br&amp;gt;National Institute of Standards and Technology&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18826138 Video] | [[Media: OWASP-11-11-2010-Ross.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:15 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Trustwave30x150.png|link=https://www.trustwave.com/‎‎]] &lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:15-11:00 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking SAP BusinessObjects]]&amp;lt;br&amp;gt;Joshua Abraham and Will Vandevanter&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/19891280 Video] | Slides &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Cloudy with a chance of hack!]]&amp;lt;br&amp;gt;Lars Ewe&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Cloudy_with_a_chance_of_hack_Nov_2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Don't Judge a Website by its Icon - Read the Label!|Don’t Judge a Website by its Icon – Read the Label!]]&amp;lt;br&amp;gt;Jeff Williams&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:2010-11_OWASP_Software_Labels.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18980995 Video] | [[Media: ApplicationPortfolioRiskRanking_BanishingFUDWithStructureAndNumbers_Content.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:00-11:05 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:05-11:50 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Deconstructing ColdFusion ]]&amp;lt;br&amp;gt;Chris Eng and Brandon Creighton&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/19912816 Video] | [[Media: OWASP_AppSec_DC_2010_-_Deconstructing_ColdFusion.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Declarative Web Security]]&amp;lt;br&amp;gt;Brandon Sterne&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/18984410 Video] | [[Media: Mozilla_OWASP_AppSec_2010_DC.pdf‎|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Secure Coding Practices Quick Reference Guide]]&amp;lt;br&amp;gt;Keith Turpin&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105173 Video] | [[Media: Secure_Coding_Practices_Quick_Ref_4.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Code Reviewing Strategies]]&amp;lt;br&amp;gt;Andrew Wilson and John Hoopes&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:CodeReviewStrategies.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:50-11:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:55-12:40 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Friendly Traitor 2 Features are hot but giving up our secrets is not!]]&amp;lt;br&amp;gt;Kevin Johnson and Mike Poor&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18810353 Video] | [[Media: Friendly_Traitor_2.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files]]&amp;lt;br&amp;gt;Aleksandr Yampolskiy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Exploiting_Media_For_Fun_and_Profit.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Open Source Web Entry Firewall]]&amp;lt;br&amp;gt;Ivan Buetler&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_Open_Source_Web_Entry_Server_V2.2.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Microsoft's Security Development Lifecycle for Agile Development]]&amp;lt;br&amp;gt;Nick Coblentz&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105707 Video] | [[Media:OWASP_AppSec_DC_2010_-_Microsoft_SDL-Agile_Presentation_-_Nick_Coblentz_2010-11-11.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:40-1:40 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:40-2:25 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking .NET Applications at Runtime: A Dynamic Attack]]&amp;lt;br&amp;gt;Jon McCoy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984620 Video] | [[Media: AppSecDC_-_Attacking_.NET_Applications_at_Runtime.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Life in the Clouds: a Service Provider's View]]&amp;lt;br&amp;gt;Michael Smith&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820461 Video] | [[Media: Life_In_the_Clouds.Smith.AppSecDC2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Solving Real World Problems with ESAPI]]&amp;lt;br&amp;gt;Chris Schmidt&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:ESAPI-2010-AppSecDC.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Financial Services Panel]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:25-2:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:30-3:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[JavaSnoop: How to hack anything written in Java]]&amp;lt;br&amp;gt;Arshan Dabirsiaghi&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19051012 Video] | [[Media:JavaSnoop_-_OWASP_AppSec_DC_2010.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Social Zombies Gone Wild: Totally Exposed and Uncensored]]&amp;lt;br&amp;gt;Kevin Johnson and Tom Eston&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18827316 Video] | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Attack Detection and Prevention with OWASP AppSensor]]&amp;lt;br&amp;gt;Colin Watson&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/19631724 Video] | [[Media:AppSecDC-colin-watson-appsensor.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:15-3:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:AppSecDC-2010-Syngress75x30.gif‎‎|link=http://www.syngress.com/]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30-4:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Unlocking the Toolkit: Attacking Google Web Toolkit]]&amp;lt;br&amp;gt;Ron Gutierrez&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Attacking_Google_Web_Toolkit.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: SmartPhonesDumbApps_OWASPDC_20101111_Content.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ModSecurity Core Rule Set]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Implementing a Secure Software Development Program]]&amp;lt;br&amp;gt;Darren Death&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:15-4:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:20-5:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Constricting the Web: Offensive Python for Web Hackers]]&amp;lt;br&amp;gt;Marcin Wielgoszewski and Nathan Hamiel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/19632487 Video] | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Threats from Economical Improvement]]&amp;lt;br&amp;gt;Eduardo Neves&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Threats_from_Economical_Improvement_OWASP_AppSec_2010_LR.key.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ESAPI SwingSet]]&amp;lt;br&amp;gt;Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Esapi_swingset_talk_dc.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform]]&amp;lt;br&amp;gt;Benjamin Tomhave&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/19908922 Video] | [[Media: Carrot-stick-consequences-AppSecDC-2010.key.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:05-5:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Closing Remarks/Prizes&amp;lt;br&amp;gt;The OWASP AppSec DC Team&amp;lt;!-- Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_2010]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Summit_2011_Working_Sessions/Session009&amp;diff=104531</id>
		<title>Talk:Summit 2011 Working Sessions/Session009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Summit_2011_Working_Sessions/Session009&amp;diff=104531"/>
				<updated>2011-02-08T19:37:20Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Add CSP friendliness as a potential recomendation criteria&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm remote, but just wanted to suggest that Content Security Policy is a significantly game changing technology that it should be discussed also. For CSP to be effective, the Unobtrusive Javascript paradigm must be adopted by the frameworks. This should be part of any recomendation produced by this body.&lt;br /&gt;
&lt;br /&gt;
--Spinkham&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session009/Deliverable_3&amp;diff=104530</id>
		<title>Summit 2011 Working Sessions/Session009/Deliverable 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session009/Deliverable_3&amp;diff=104530"/>
				<updated>2011-02-08T19:36:26Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: sign my blurb ;-)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''Deliverable 3''' ==&lt;br /&gt;
&lt;br /&gt;
'''White paper or standard for what we want the web frameworks to provide in terms of XSS defenses. Turning the XSS Prevention Cheat Sheet into a standard/metric for frameworks would be great.''' &lt;br /&gt;
&lt;br /&gt;
To be filled in.&lt;br /&gt;
&lt;br /&gt;
I'm remote, but just wanted to suggest that Content Security Policy is a significantly game changing technology that it should be discussed also.&lt;br /&gt;
For CSP to be effective, the [http://en.wikipedia.org/wiki/Unobtrusive_JavaScript Unobtrusive Javascript] paradigm must be adopted by the frameworks.  This should be part of any recomendation produced by this body.&lt;br /&gt;
&lt;br /&gt;
-Spinkham&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session009/Deliverable_3&amp;diff=104529</id>
		<title>Summit 2011 Working Sessions/Session009/Deliverable 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session009/Deliverable_3&amp;diff=104529"/>
				<updated>2011-02-08T19:35:40Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Suggest CSP friendliness as a criteria&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''Deliverable 3''' ==&lt;br /&gt;
&lt;br /&gt;
'''White paper or standard for what we want the web frameworks to provide in terms of XSS defenses. Turning the XSS Prevention Cheat Sheet into a standard/metric for frameworks would be great.''' &lt;br /&gt;
&lt;br /&gt;
To be filled in.&lt;br /&gt;
&lt;br /&gt;
I'm remote, but just wanted to suggest that Content Security Policy is a significantly game changing technology that it should be discussed also.&lt;br /&gt;
For CSP to be effective, the [http://en.wikipedia.org/wiki/Unobtrusive_JavaScript Unobtrusive Javascript] paradigm must be adopted by the frameworks.  This should be part of any recomendation produced by this body.&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Summit_2011_Working_Sessions/Session068&amp;diff=104526</id>
		<title>Talk:Summit 2011 Working Sessions/Session068</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Summit_2011_Working_Sessions/Session068&amp;diff=104526"/>
				<updated>2011-02-08T18:38:02Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aparently there was a collaboration link posted for the session? Can anyone put that here for reference?&lt;br /&gt;
&lt;br /&gt;
I'll put my $0.02 here in the mean time.&lt;br /&gt;
&lt;br /&gt;
We should make the easy stuff go away, have the hard stuff well documented, and go to where devs are.  They're too busy to come to us.&lt;br /&gt;
&lt;br /&gt;
What can be solved by a framework or with a mechanism like a CSP flag should be, and what can't should be documented in the framework or language docs.&lt;br /&gt;
&lt;br /&gt;
Simply put, if you want to give devs security information, it needs to be in the places the devs go.  That can include links to external resources for more details, but the first place the dev goes to for examples and documentation has to cover security well. &lt;br /&gt;
&lt;br /&gt;
OWASP also needs to connect with publishers to further that goal.&lt;br /&gt;
&lt;br /&gt;
-- SPinkham&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Summit_2011_Working_Sessions/Session068&amp;diff=104525</id>
		<title>Talk:Summit 2011 Working Sessions/Session068</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Summit_2011_Working_Sessions/Session068&amp;diff=104525"/>
				<updated>2011-02-08T18:36:53Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Created page with &amp;quot;Aparently there was a collabotation link posted for the session? Can anyone put that here for reference?  I'll put my $0.02 here in the mean time.  We should make the easy stuff ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aparently there was a collabotation link posted for the session? Can anyone put that here for reference?&lt;br /&gt;
&lt;br /&gt;
I'll put my $0.02 here in the mean time.&lt;br /&gt;
&lt;br /&gt;
We should make the easy stuff go away,have the hard stuff well documented,and go to where devs are.They're too busy to come to us.&lt;br /&gt;
&lt;br /&gt;
What can be solved by a framework or CSP flag should be, and what can't should be documented in the framework or language docs. Simply put, if you want to give devs security information, it needs to be in the places the devs go.  That can include links to external resources for more details, but the first place the dev goes to for examples and documentation has to cover security well. &lt;br /&gt;
&lt;br /&gt;
OWASP needs to connect with publishers to further that goal.&lt;br /&gt;
&lt;br /&gt;
-- SPinkham&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=104410</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=104410"/>
				<updated>2011-02-08T13:58:37Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Edits for change in leadership team&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Welcome to the OWASP North Carolina Local Chapter homepage!== &lt;br /&gt;
&lt;br /&gt;
====Chapter Leadership====&lt;br /&gt;
President: [mailto:steve.pinkham@gmail.com Steve Pinkham] &amp;lt;br /&amp;gt;&lt;br /&gt;
Vice President: [mailto://CWhitesock(@)coastalfcu(.)org Chris Whitesock] &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
Higher Ed: [mailto:fayedv(@)meredith(.)edu Victor Fayed] &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Raleigh&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
TBD, see Meetup page&lt;br /&gt;
&lt;br /&gt;
Next Meeting: TBD, see the [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page].&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please don't hesitate to contact the leadership team if you would like to assist the local chapter in any way.&lt;br /&gt;
&lt;br /&gt;
We accept flattery, suggestions, and snide remarks as well as monetary, time, and facilities donations.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.  The [http://www.meetup.com/owaspnc/ OWASP NC meetup.com page] has details of our next meeting.  RSVP if possible.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in some ongoing projects our membership is already involved in, as well as being open to new projects.&lt;br /&gt;
&lt;br /&gt;
Please contact the leadership team if you are interested in helping out!&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=104409</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=104409"/>
				<updated>2011-02-08T13:52:05Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Welcome to the OWASP North Carolina Local Chapter homepage!== &lt;br /&gt;
&lt;br /&gt;
====Chapter Leadership====&lt;br /&gt;
President: [mailto:steve.pinkham(@)gmail(.)com Steve Pinkham] &amp;lt;br /&amp;gt;&lt;br /&gt;
Vice President: [mailto://CWhitesock(@)coastalfcu(.)org Chris Whitesock] &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
Higher Ed: [mailto:fayedv(@)meredith(.)edu Victor Fayed] &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Raleigh&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
TBD, see Meetup page&lt;br /&gt;
&lt;br /&gt;
Next Meeting: TBD, see Meetup page&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please contact mmenefee[at]gmail[dot]com if you would like to assist with helping grow the local chapter.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we are soliciting interest in new and ongoing projects our membership is involved in. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.&lt;br /&gt;
&lt;br /&gt;
Click [http://www.meetup.com/owaspnc/ here] for details of our next meeting, and RSVP&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are soliciting interest in &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:steve.pinkham(@)gmail(.)com Steve Pinkham] if you are interested in helping out!&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=104408</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=104408"/>
				<updated>2011-02-08T13:49:59Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Meeting Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Welcome to the OWASP North Carolina Local Chapter homepage!== &lt;br /&gt;
&lt;br /&gt;
====Chapter Leadership====&lt;br /&gt;
President: [mailto:steve.pinkham(@)gmail(.)com Steve Pinkham] &amp;lt;br /&amp;gt;&lt;br /&gt;
Vice President: [mailto://CWhitesock(@)coastalfcu(.)org Chris Whitesock] &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
Higher Ed: [mailto:fayedv(@)meredith(.)edu Victor Fayed] &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Raleigh&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
TBD, see Meetup page&lt;br /&gt;
&lt;br /&gt;
Next Meeting: TBD, see Meetup page&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please contact mmenefee[at]gmail[dot]com if you would like to assist with helping grow the local chapter.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we will be sponsoring several already in-development tools. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.&lt;br /&gt;
&lt;br /&gt;
Click [http://www.meetup.com/owaspnc/ here] for details of our next meeting, and RSVP&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are currently engaged in several new OWASP project initiatives, mostly surrounding passive assessment techniques used during the pen testing process. If you are interested in helping out, we need some development assistance. &lt;br /&gt;
&lt;br /&gt;
We are currently developing in PHP, Perl &amp;amp; Python, using MySQl for back-end storage. &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:mmenefee(at)gmail(.)com Mike Menefee] if you are interested in helping out!&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Triangle&amp;diff=104406</id>
		<title>Triangle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Triangle&amp;diff=104406"/>
				<updated>2011-02-08T13:48:57Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Chapter Leadership */  Change Mike to Steve, see mailing list for details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Welcome to the OWASP North Carolina Local Chapter homepage!== &lt;br /&gt;
&lt;br /&gt;
====Chapter Leadership====&lt;br /&gt;
President: [mailto:steve.pinkham(@)gmail(.)com Steve Pinkham] &amp;lt;br /&amp;gt;&lt;br /&gt;
Vice President: [mailto://CWhitesock(@)coastalfcu(.)org Chris Whitesock] &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Industry Advisers:&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
Higher Ed: [mailto:fayedv(@)meredith(.)edu Victor Fayed] &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
We are looking for board members and industry advisers, so if you are interested, please contact us!&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Participation==&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [https://www.owasp.org/index.php/Chapter_Rules/ Chapter Rules]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Join the Chapter by signing up on our &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Raleigh mailing list]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or, you can view our Mailing List Archives [http://lists.owasp.org/pipermail/owasp-raleigh/ here]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Raleigh&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Meeting Location==&lt;br /&gt;
''Coastal Federal Credit Union Headquarters&amp;lt;br /&amp;gt;&lt;br /&gt;
''1000 St Albans Drive&amp;lt;br /&amp;gt;&lt;br /&gt;
''Raleigh NC, 27609&amp;lt;br /&amp;gt;&lt;br /&gt;
''Google Map [http://www.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1000+St+Albans+Dr,+Raleigh,+NC+27609&amp;amp;jsv=141e&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=36.589577,93.164063&amp;amp;ie=UTF8&amp;amp;ei=BBxxSe62I4GyMLnSmbcH&amp;amp;sig2=lHNDCIwg7EhUum2l_DAR7Q&amp;amp;cd=1&amp;amp;cid=35832537,-78621982,13423347940142949601&amp;amp;li=lmd here]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next Meeting: February 17th 6:30-8:30 PM&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Raleigh NC Chapter is looking for new members. Please contact mmenefee[at]gmail[dot]com if you would like to assist with helping grow the local chapter.&lt;br /&gt;
&lt;br /&gt;
Aside from regular meetings with guest speakers from other chapters and organizations, we will be sponsoring several already in-development tools. If you have any interest in contributing to these projects, please let me know.  &lt;br /&gt;
&lt;br /&gt;
As always -- everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
====Events====&lt;br /&gt;
----&lt;br /&gt;
Our Chapter meetings and events are scheduled at Meetup.com.&lt;br /&gt;
&lt;br /&gt;
Click [http://www.meetup.com/owaspnc/ here] for details of our next meeting, and RSVP&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
We are currently engaged in several new OWASP project initiatives, mostly surrounding passive assessment techniques used during the pen testing process. If you are interested in helping out, we need some development assistance. &lt;br /&gt;
&lt;br /&gt;
We are currently developing in PHP, Perl &amp;amp; Python, using MySQl for back-end storage. &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:mmenefee(at)gmail(.)com Mike Menefee] if you are interested in helping out!&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Summit_2011_Working_Sessions/Session056&amp;diff=104405</id>
		<title>Talk:Summit 2011 Working Sessions/Session056</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Summit_2011_Working_Sessions/Session056&amp;diff=104405"/>
				<updated>2011-02-08T13:47:19Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Created page with &amp;quot;This session is not on the list of static or dynamic talks for the conference. Is it still happening?&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This session is not on the list of static or dynamic talks for the conference. Is it still happening?&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103380</id>
		<title>OWASP AppSec DC 2010 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103380"/>
				<updated>2011-02-04T17:32:02Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: More vimeo video links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
====Training 11/08====&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 1 - Nov 8th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
&amp;lt;!-- Training Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Training 11/09==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 2 - Nov 9th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''159B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
&amp;lt;!-- Training Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 1 - 11/10==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 1 - Nov 10th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''Defense (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Metrics (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Government (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:50-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Welcome and Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Neal Ziring|Keynote: Neal Ziring]]&amp;lt;br&amp;gt;National Security Agency&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820731 Video] | [[Media: OWASP-appsec2010-app_assurance-nziring-20101110.ppt | Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | OWASP Status Update&amp;lt;br&amp;gt;[[OWASP:About#Global_Board_Members| OWASP Board]]&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18821089 Video] | [http://www.owasp.org/images/0/0f/OWASPDC2010-v1.pdf Slides]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30-10:45 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Redspin30x120.png|link=http://www.redspin.com]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:45-11:30 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Python Basics for Web App Pentesters]]&amp;lt;br&amp;gt;Justin Searle &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19346235 Video] | [[Media: Python_Basics_for_Web_App_Pentesters.zip|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Drive By Downloads: How To Avoid Getting A Cap Popped In Your App]]&amp;lt;br&amp;gt;Neil Daswani&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Dasient_11_10_10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Secure Code Review: Enterprise Metrics]]&amp;lt;br&amp;gt;Richard Tychansky&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:OWASP_-_Secure_Code_Review_Enterprise_Metrics.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise]]&amp;lt;br&amp;gt;Joe Jarzombek &amp;amp; Tom Millar&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18802696 Video] | [[Media:SwA_SCRM_10Nov2010_jj.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:30-11:35 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:35-12:20 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[White and Black box testing of Lotus Domino Applications]]&amp;lt;br&amp;gt;Ari Elias-bachrach and Casey Pike&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19344945 Video] | [[Media: Domino_testing_presentation.ppt‎ | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Protecting Federal Government from Web 2.0 Application Security Risks]]&amp;lt;br&amp;gt;Sarbari Gupta&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Protecting_Federal_Government_from_Web_2.0_Application_Security_Risks_-_Sarbari_Gupta_FINAL.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Measuring Security: 5 KPIs for Successful Web App Security Programs]]&amp;lt;br&amp;gt;Rafal Los&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820054 Video] | [[Media:Magic_Numbers_-_5_KPIs_for_Measuring_WebAppSec_Program_Success_v3.2.pdf | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Security Risk and the Software Supply Chain]]&amp;lt;br&amp;gt;Karen Goertzel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:BoozAllen-AppSecDC2010-sw_scrm.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:20-1:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:20-2:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Pen Testing with Iron]]&amp;lt;br&amp;gt;Andrew Wilson &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:PenTestingWithIron.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Providing application-level assurance through DNSSEC]]&amp;lt;br&amp;gt;Suresh Krishnaswamy, Wes Hardaker and Russ Mundy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Providing-Application-level-Assurance-through-DNSSEC-final.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[H.....t.....t....p.......p....o....s....t]]&amp;lt;br&amp;gt;Onn Chee &amp;amp; Tom Brennan &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18818757 Video] | [http://www.owasp.org/images/4/43/Layer_7_DDOS.pdf Slides]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Understanding How They Attack Your Weaknesses: CAPEC]]&amp;lt;br&amp;gt;Sean Barnum&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Making Security Measurable&amp;lt;br&amp;gt;Video | [[Media:Making_Security_Measurable_-_CWE_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Understanding How They Attack Your Weaknesses&amp;lt;br&amp;gt;Video | [[Media:Understanding_How_They_Attack_Your_Weaknesses-CAPEC_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:05-2:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | Break&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:10-2:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking Oracle From Web Apps]]&amp;lt;br&amp;gt;Sumit Siddharth&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19357262 Video] | [[Media: Hacking_Oracle_From_Web_Apps_2.0.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[GuardRails: A Nearly Painless Solution to Insecure Web Applications|GuardRails: A (Nearly) Painless Solution to Insecure Web Applications]]&amp;lt;br&amp;gt;Jonathan Burket, Patrick Mutchler, Michael Weaver and Muzzammil Zaveri&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19355417 Video] | [[Media:Guardrails_owasp_final.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Framed! Security-patching Common Web Development Frameworks]] - Panel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18808494 Video]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:55-3:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:SecureIdeas_30X65.png|link=http://www.secureideas.net]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:10-3:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[wXf: Web Exploitation Framework]]&amp;lt;br&amp;gt;Ken Johnson and Chris Gates&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19104630 Video] | [[Media: WXf_ASDC_Presentation.odp.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[The Strengths of Combining Code Review with Application Penetration Testing]]&amp;lt;br&amp;gt;Dave Wichers&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19104928 Video] | [[Media: 2010-DC_The_Power_of_Code_Review.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Dealing with Web Application Security, Regulation Style]]&amp;lt;br&amp;gt;Andrew Weidenhamer&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Andrew_Weidenhamer_AppSecDC_Presentation.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Ensuring Software Assurance Process Maturity]]&amp;lt;br&amp;gt;Edmund Wotring&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:20101110_-_Ensuring_Software_Assurance_Process_Maturity_-_Final.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:55-4:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:00-4:45 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Pen-Test Panel]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Botnet Resistant Coding: Protecting Your Users from Script Kiddies]]&amp;lt;br&amp;gt;Fabian Rothschild and Peter Greko&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Bot_res_enc.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;1&amp;quot; | [[OWASP Broken Web Applications Project Update]]&amp;lt;br&amp;gt;Chuck Willis&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19331937 Video] | [[Media:Chuck_Willis_OWASPBWA_for_OWASP_AppSecDC_2010-11-10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group]]&amp;lt;br&amp;gt;Michele Moss&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105480 Video] | [[Media: OWASP_DC_2010_Moss_fin.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation]]&amp;lt;br&amp;gt;Joshua Windsor and Joshua Pauli&amp;lt;br&amp;gt;Video | [[Media: Smashing_WebGoat_-_AppSecDC_Presentation.odp.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:45-4:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:50-5:35 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners]]&amp;lt;br&amp;gt;David Shelly, Randy Marchany &amp;amp; Joseph Tront&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984178 Video] | [[Media:Closing_the_Gap_AppSecDC_Shelly.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Using Misuse Cases to Articulate Vulnerabilities to Stakeholders]]&amp;lt;br&amp;gt;Scott Mendenhall&amp;lt;br&amp;gt;Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Federal Perspectives on Application Security]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Web Hacking Incident Database (WHID) Report]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19337407 Video] | [[Media:AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:30-7:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Cocktails sponsored by [[Image:Trustwave50x250.png|link=https://www.trustwave.com/‎‎]]&lt;br /&gt;
&amp;lt;!-- Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 2 - 11/11==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 2 - Nov 11th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''New Frontiers (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Process (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:55-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Day 2 Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Ron Ross|Keynote: Ron Ross]]&amp;lt;br&amp;gt;National Institute of Standards and Technology&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18826138 Video] | [[Media: OWASP-11-11-2010-Ross.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:15 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Trustwave30x150.png|link=https://www.trustwave.com/‎‎]] &lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:15-11:00 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking SAP BusinessObjects]]&amp;lt;br&amp;gt;Joshua Abraham and Will Vandevanter&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Cloudy with a chance of hack!]]&amp;lt;br&amp;gt;Lars Ewe&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Cloudy_with_a_chance_of_hack_Nov_2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Don't Judge a Website by its Icon - Read the Label!|Don’t Judge a Website by its Icon – Read the Label!]]&amp;lt;br&amp;gt;Jeff Williams&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:2010-11_OWASP_Software_Labels.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18980995 Video] | [[Media: ApplicationPortfolioRiskRanking_BanishingFUDWithStructureAndNumbers_Content.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:00-11:05 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:05-11:50 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Deconstructing ColdFusion ]]&amp;lt;br&amp;gt;Chris Eng and Brandon Creighton&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_AppSec_DC_2010_-_Deconstructing_ColdFusion.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Declarative Web Security]]&amp;lt;br&amp;gt;Brandon Sterne&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/18984410 Video] | [[Media: Mozilla_OWASP_AppSec_2010_DC.pdf‎|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Secure Coding Practices Quick Reference Guide]]&amp;lt;br&amp;gt;Keith Turpin&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105173 Video] | [[Media: Secure_Coding_Practices_Quick_Ref_4.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Code Reviewing Strategies]]&amp;lt;br&amp;gt;Andrew Wilson and John Hoopes&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:CodeReviewStrategies.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:50-11:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:55-12:40 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Friendly Traitor 2 Features are hot but giving up our secrets is not!]]&amp;lt;br&amp;gt;Kevin Johnson and Mike Poor&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18810353 Video] | [[Media: Friendly_Traitor_2.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files]]&amp;lt;br&amp;gt;Aleksandr Yampolskiy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Exploiting_Media_For_Fun_and_Profit.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Open Source Web Entry Firewall]]&amp;lt;br&amp;gt;Ivan Buetler&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_Open_Source_Web_Entry_Server_V2.2.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Microsoft's Security Development Lifecycle for Agile Development]]&amp;lt;br&amp;gt;Nick Coblentz&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105707 Video] | [[Media:OWASP_AppSec_DC_2010_-_Microsoft_SDL-Agile_Presentation_-_Nick_Coblentz_2010-11-11.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:40-1:40 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:40-2:25 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking .NET Applications at Runtime: A Dynamic Attack]]&amp;lt;br&amp;gt;Jon McCoy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984620 Video] | [[Media: AppSecDC_-_Attacking_.NET_Applications_at_Runtime.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Life in the Clouds: a Service Provider's View]]&amp;lt;br&amp;gt;Michael Smith&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820461 Video] | [[Media: Life_In_the_Clouds.Smith.AppSecDC2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Solving Real World Problems with ESAPI]]&amp;lt;br&amp;gt;Chris Schmidt&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:ESAPI-2010-AppSecDC.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Financial Services Panel]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:25-2:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:30-3:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[JavaSnoop: How to hack anything written in Java]]&amp;lt;br&amp;gt;Arshan Dabirsiaghi&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19051012 Video] | [[Media:JavaSnoop_-_OWASP_AppSec_DC_2010.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Social Zombies Gone Wild: Totally Exposed and Uncensored]]&amp;lt;br&amp;gt;Kevin Johnson and Tom Eston&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18827316 Video] | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Attack Detection and Prevention with OWASP AppSensor]]&amp;lt;br&amp;gt;Colin Watson&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC-colin-watson-appsensor.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:15-3:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:AppSecDC-2010-Syngress75x30.gif‎‎|link=http://www.syngress.com/]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30-4:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Unlocking the Toolkit: Attacking Google Web Toolkit]]&amp;lt;br&amp;gt;Ron Gutierrez&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Attacking_Google_Web_Toolkit.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: SmartPhonesDumbApps_OWASPDC_20101111_Content.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ModSecurity Core Rule Set]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Implementing a Secure Software Development Program]]&amp;lt;br&amp;gt;Darren Death&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:15-4:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:20-5:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Constricting the Web: Offensive Python for Web Hackers]]&amp;lt;br&amp;gt;Marcin Wielgoszewski and Nathan Hamiel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Threats from Economical Improvement]]&amp;lt;br&amp;gt;Eduardo Neves&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Threats_from_Economical_Improvement_OWASP_AppSec_2010_LR.key.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ESAPI SwingSet]]&amp;lt;br&amp;gt;Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Esapi_swingset_talk_dc.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform]]&amp;lt;br&amp;gt;Benjamin Tomhave&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Carrot-stick-consequences-AppSecDC-2010.key.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:05-5:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Closing Remarks/Prizes&amp;lt;br&amp;gt;The OWASP AppSec DC Team&amp;lt;!-- Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_2010]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103379</id>
		<title>OWASP AppSec DC 2010 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103379"/>
				<updated>2011-02-04T17:29:32Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: More vimeo video links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
====Training 11/08====&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 1 - Nov 8th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
&amp;lt;!-- Training Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Training 11/09==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 2 - Nov 9th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''159B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
&amp;lt;!-- Training Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 1 - 11/10==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 1 - Nov 10th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''Defense (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Metrics (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Government (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:50-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Welcome and Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Neal Ziring|Keynote: Neal Ziring]]&amp;lt;br&amp;gt;National Security Agency&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820731 Video] | [[Media: OWASP-appsec2010-app_assurance-nziring-20101110.ppt | Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | OWASP Status Update&amp;lt;br&amp;gt;[[OWASP:About#Global_Board_Members| OWASP Board]]&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18821089 Video] | [http://www.owasp.org/images/0/0f/OWASPDC2010-v1.pdf Slides]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30-10:45 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Redspin30x120.png|link=http://www.redspin.com]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:45-11:30 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Python Basics for Web App Pentesters]]&amp;lt;br&amp;gt;Justin Searle &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Python_Basics_for_Web_App_Pentesters.zip|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Drive By Downloads: How To Avoid Getting A Cap Popped In Your App]]&amp;lt;br&amp;gt;Neil Daswani&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Dasient_11_10_10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Secure Code Review: Enterprise Metrics]]&amp;lt;br&amp;gt;Richard Tychansky&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:OWASP_-_Secure_Code_Review_Enterprise_Metrics.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise]]&amp;lt;br&amp;gt;Joe Jarzombek &amp;amp; Tom Millar&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18802696 Video] | [[Media:SwA_SCRM_10Nov2010_jj.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:30-11:35 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:35-12:20 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[White and Black box testing of Lotus Domino Applications]]&amp;lt;br&amp;gt;Ari Elias-bachrach and Casey Pike&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Domino_testing_presentation.ppt‎ | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Protecting Federal Government from Web 2.0 Application Security Risks]]&amp;lt;br&amp;gt;Sarbari Gupta&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Protecting_Federal_Government_from_Web_2.0_Application_Security_Risks_-_Sarbari_Gupta_FINAL.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Measuring Security: 5 KPIs for Successful Web App Security Programs]]&amp;lt;br&amp;gt;Rafal Los&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820054 Video] | [[Media:Magic_Numbers_-_5_KPIs_for_Measuring_WebAppSec_Program_Success_v3.2.pdf | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Security Risk and the Software Supply Chain]]&amp;lt;br&amp;gt;Karen Goertzel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:BoozAllen-AppSecDC2010-sw_scrm.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:20-1:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:20-2:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Pen Testing with Iron]]&amp;lt;br&amp;gt;Andrew Wilson &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:PenTestingWithIron.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Providing application-level assurance through DNSSEC]]&amp;lt;br&amp;gt;Suresh Krishnaswamy, Wes Hardaker and Russ Mundy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Providing-Application-level-Assurance-through-DNSSEC-final.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[H.....t.....t....p.......p....o....s....t]]&amp;lt;br&amp;gt;Onn Chee &amp;amp; Tom Brennan &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18818757 Video] | [http://www.owasp.org/images/4/43/Layer_7_DDOS.pdf Slides]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Understanding How They Attack Your Weaknesses: CAPEC]]&amp;lt;br&amp;gt;Sean Barnum&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Making Security Measurable&amp;lt;br&amp;gt;Video | [[Media:Making_Security_Measurable_-_CWE_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Understanding How They Attack Your Weaknesses&amp;lt;br&amp;gt;Video | [[Media:Understanding_How_They_Attack_Your_Weaknesses-CAPEC_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:05-2:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | Break&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:10-2:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking Oracle From Web Apps]]&amp;lt;br&amp;gt;Sumit Siddharth&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Hacking_Oracle_From_Web_Apps_2.0.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[GuardRails: A Nearly Painless Solution to Insecure Web Applications|GuardRails: A (Nearly) Painless Solution to Insecure Web Applications]]&amp;lt;br&amp;gt;Jonathan Burket, Patrick Mutchler, Michael Weaver and Muzzammil Zaveri&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Guardrails_owasp_final.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Framed! Security-patching Common Web Development Frameworks]] - Panel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18808494 Video]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:55-3:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:SecureIdeas_30X65.png|link=http://www.secureideas.net]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:10-3:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[wXf: Web Exploitation Framework]]&amp;lt;br&amp;gt;Ken Johnson and Chris Gates&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19104630 Video] | [[Media: WXf_ASDC_Presentation.odp.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[The Strengths of Combining Code Review with Application Penetration Testing]]&amp;lt;br&amp;gt;Dave Wichers&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19104928 Video] | [[Media: 2010-DC_The_Power_of_Code_Review.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Dealing with Web Application Security, Regulation Style]]&amp;lt;br&amp;gt;Andrew Weidenhamer&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Andrew_Weidenhamer_AppSecDC_Presentation.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Ensuring Software Assurance Process Maturity]]&amp;lt;br&amp;gt;Edmund Wotring&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:20101110_-_Ensuring_Software_Assurance_Process_Maturity_-_Final.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:55-4:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:00-4:45 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Pen-Test Panel]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Botnet Resistant Coding: Protecting Your Users from Script Kiddies]]&amp;lt;br&amp;gt;Fabian Rothschild and Peter Greko&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Bot_res_enc.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;1&amp;quot; | [[OWASP Broken Web Applications Project Update]]&amp;lt;br&amp;gt;Chuck Willis&amp;lt;br&amp;gt;Video | [[Media:Chuck_Willis_OWASPBWA_for_OWASP_AppSecDC_2010-11-10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group]]&amp;lt;br&amp;gt;Michele Moss&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105480 Video] | [[Media: OWASP_DC_2010_Moss_fin.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation]]&amp;lt;br&amp;gt;Joshua Windsor and Joshua Pauli&amp;lt;br&amp;gt;Video | [[Media: Smashing_WebGoat_-_AppSecDC_Presentation.odp.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:45-4:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:50-5:35 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners]]&amp;lt;br&amp;gt;David Shelly, Randy Marchany &amp;amp; Joseph Tront&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984178 Video] | [[Media:Closing_the_Gap_AppSecDC_Shelly.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Using Misuse Cases to Articulate Vulnerabilities to Stakeholders]]&amp;lt;br&amp;gt;Scott Mendenhall&amp;lt;br&amp;gt;Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Federal Perspectives on Application Security]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Web Hacking Incident Database (WHID) Report]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;Video | [[Media:AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:30-7:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Cocktails sponsored by [[Image:Trustwave50x250.png|link=https://www.trustwave.com/‎‎]]&lt;br /&gt;
&amp;lt;!-- Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 2 - 11/11==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 2 - Nov 11th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''New Frontiers (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Process (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:55-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Day 2 Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Ron Ross|Keynote: Ron Ross]]&amp;lt;br&amp;gt;National Institute of Standards and Technology&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18826138 Video] | [[Media: OWASP-11-11-2010-Ross.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:15 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Trustwave30x150.png|link=https://www.trustwave.com/‎‎]] &lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:15-11:00 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking SAP BusinessObjects]]&amp;lt;br&amp;gt;Joshua Abraham and Will Vandevanter&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Cloudy with a chance of hack!]]&amp;lt;br&amp;gt;Lars Ewe&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Cloudy_with_a_chance_of_hack_Nov_2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Don't Judge a Website by its Icon - Read the Label!|Don’t Judge a Website by its Icon – Read the Label!]]&amp;lt;br&amp;gt;Jeff Williams&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:2010-11_OWASP_Software_Labels.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18980995 Video] | [[Media: ApplicationPortfolioRiskRanking_BanishingFUDWithStructureAndNumbers_Content.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:00-11:05 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:05-11:50 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Deconstructing ColdFusion ]]&amp;lt;br&amp;gt;Chris Eng and Brandon Creighton&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_AppSec_DC_2010_-_Deconstructing_ColdFusion.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Declarative Web Security]]&amp;lt;br&amp;gt;Brandon Sterne&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/18984410 Video] | [[Media: Mozilla_OWASP_AppSec_2010_DC.pdf‎|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Secure Coding Practices Quick Reference Guide]]&amp;lt;br&amp;gt;Keith Turpin&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105173 Video] | [[Media: Secure_Coding_Practices_Quick_Ref_4.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Code Reviewing Strategies]]&amp;lt;br&amp;gt;Andrew Wilson and John Hoopes&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:CodeReviewStrategies.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:50-11:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:55-12:40 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Friendly Traitor 2 Features are hot but giving up our secrets is not!]]&amp;lt;br&amp;gt;Kevin Johnson and Mike Poor&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18810353 Video] | [[Media: Friendly_Traitor_2.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files]]&amp;lt;br&amp;gt;Aleksandr Yampolskiy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Exploiting_Media_For_Fun_and_Profit.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Open Source Web Entry Firewall]]&amp;lt;br&amp;gt;Ivan Buetler&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_Open_Source_Web_Entry_Server_V2.2.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Microsoft's Security Development Lifecycle for Agile Development]]&amp;lt;br&amp;gt;Nick Coblentz&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105707 Video] | [[Media:OWASP_AppSec_DC_2010_-_Microsoft_SDL-Agile_Presentation_-_Nick_Coblentz_2010-11-11.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:40-1:40 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:40-2:25 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking .NET Applications at Runtime: A Dynamic Attack]]&amp;lt;br&amp;gt;Jon McCoy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984620 Video] | [[Media: AppSecDC_-_Attacking_.NET_Applications_at_Runtime.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Life in the Clouds: a Service Provider's View]]&amp;lt;br&amp;gt;Michael Smith&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820461 Video] | [[Media: Life_In_the_Clouds.Smith.AppSecDC2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Solving Real World Problems with ESAPI]]&amp;lt;br&amp;gt;Chris Schmidt&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:ESAPI-2010-AppSecDC.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Financial Services Panel]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:25-2:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:30-3:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[JavaSnoop: How to hack anything written in Java]]&amp;lt;br&amp;gt;Arshan Dabirsiaghi&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19051012 Video] | [[Media:JavaSnoop_-_OWASP_AppSec_DC_2010.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Social Zombies Gone Wild: Totally Exposed and Uncensored]]&amp;lt;br&amp;gt;Kevin Johnson and Tom Eston&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18827316 Video] | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Attack Detection and Prevention with OWASP AppSensor]]&amp;lt;br&amp;gt;Colin Watson&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC-colin-watson-appsensor.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:15-3:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:AppSecDC-2010-Syngress75x30.gif‎‎|link=http://www.syngress.com/]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30-4:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Unlocking the Toolkit: Attacking Google Web Toolkit]]&amp;lt;br&amp;gt;Ron Gutierrez&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Attacking_Google_Web_Toolkit.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: SmartPhonesDumbApps_OWASPDC_20101111_Content.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ModSecurity Core Rule Set]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Implementing a Secure Software Development Program]]&amp;lt;br&amp;gt;Darren Death&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:15-4:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:20-5:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Constricting the Web: Offensive Python for Web Hackers]]&amp;lt;br&amp;gt;Marcin Wielgoszewski and Nathan Hamiel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Threats from Economical Improvement]]&amp;lt;br&amp;gt;Eduardo Neves&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Threats_from_Economical_Improvement_OWASP_AppSec_2010_LR.key.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ESAPI SwingSet]]&amp;lt;br&amp;gt;Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Esapi_swingset_talk_dc.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform]]&amp;lt;br&amp;gt;Benjamin Tomhave&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Carrot-stick-consequences-AppSecDC-2010.key.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:05-5:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Closing Remarks/Prizes&amp;lt;br&amp;gt;The OWASP AppSec DC Team&amp;lt;!-- Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_2010]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103378</id>
		<title>OWASP AppSec DC 2010 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103378"/>
				<updated>2011-02-04T17:26:42Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: More vimeo video links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
====Training 11/08====&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 1 - Nov 8th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
&amp;lt;!-- Training Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Training 11/09==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 2 - Nov 9th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''159B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
&amp;lt;!-- Training Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 1 - 11/10==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 1 - Nov 10th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''Defense (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Metrics (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Government (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:50-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Welcome and Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Neal Ziring|Keynote: Neal Ziring]]&amp;lt;br&amp;gt;National Security Agency&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820731 Video] | [[Media: OWASP-appsec2010-app_assurance-nziring-20101110.ppt | Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | OWASP Status Update&amp;lt;br&amp;gt;[[OWASP:About#Global_Board_Members| OWASP Board]]&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18821089 Video] | [http://www.owasp.org/images/0/0f/OWASPDC2010-v1.pdf Slides]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30-10:45 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Redspin30x120.png|link=http://www.redspin.com]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:45-11:30 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Python Basics for Web App Pentesters]]&amp;lt;br&amp;gt;Justin Searle &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Python_Basics_for_Web_App_Pentesters.zip|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Drive By Downloads: How To Avoid Getting A Cap Popped In Your App]]&amp;lt;br&amp;gt;Neil Daswani&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Dasient_11_10_10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Secure Code Review: Enterprise Metrics]]&amp;lt;br&amp;gt;Richard Tychansky&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:OWASP_-_Secure_Code_Review_Enterprise_Metrics.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise]]&amp;lt;br&amp;gt;Joe Jarzombek &amp;amp; Tom Millar&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18802696 Video] | [[Media:SwA_SCRM_10Nov2010_jj.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:30-11:35 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:35-12:20 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[White and Black box testing of Lotus Domino Applications]]&amp;lt;br&amp;gt;Ari Elias-bachrach and Casey Pike&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Domino_testing_presentation.ppt‎ | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Protecting Federal Government from Web 2.0 Application Security Risks]]&amp;lt;br&amp;gt;Sarbari Gupta&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Protecting_Federal_Government_from_Web_2.0_Application_Security_Risks_-_Sarbari_Gupta_FINAL.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Measuring Security: 5 KPIs for Successful Web App Security Programs]]&amp;lt;br&amp;gt;Rafal Los&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820054 Video] | [[Media:Magic_Numbers_-_5_KPIs_for_Measuring_WebAppSec_Program_Success_v3.2.pdf | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Security Risk and the Software Supply Chain]]&amp;lt;br&amp;gt;Karen Goertzel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:BoozAllen-AppSecDC2010-sw_scrm.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:20-1:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:20-2:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Pen Testing with Iron]]&amp;lt;br&amp;gt;Andrew Wilson &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:PenTestingWithIron.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Providing application-level assurance through DNSSEC]]&amp;lt;br&amp;gt;Suresh Krishnaswamy, Wes Hardaker and Russ Mundy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Providing-Application-level-Assurance-through-DNSSEC-final.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[H.....t.....t....p.......p....o....s....t]]&amp;lt;br&amp;gt;Onn Chee &amp;amp; Tom Brennan &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18818757 Video] | [http://www.owasp.org/images/4/43/Layer_7_DDOS.pdf Slides]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Understanding How They Attack Your Weaknesses: CAPEC]]&amp;lt;br&amp;gt;Sean Barnum&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Making Security Measurable&amp;lt;br&amp;gt;Video | [[Media:Making_Security_Measurable_-_CWE_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Understanding How They Attack Your Weaknesses&amp;lt;br&amp;gt;Video | [[Media:Understanding_How_They_Attack_Your_Weaknesses-CAPEC_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:05-2:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | Break&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:10-2:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking Oracle From Web Apps]]&amp;lt;br&amp;gt;Sumit Siddharth&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Hacking_Oracle_From_Web_Apps_2.0.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[GuardRails: A Nearly Painless Solution to Insecure Web Applications|GuardRails: A (Nearly) Painless Solution to Insecure Web Applications]]&amp;lt;br&amp;gt;Jonathan Burket, Patrick Mutchler, Michael Weaver and Muzzammil Zaveri&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Guardrails_owasp_final.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Framed! Security-patching Common Web Development Frameworks]] - Panel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18808494 Video]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:55-3:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:SecureIdeas_30X65.png|link=http://www.secureideas.net]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:10-3:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[wXf: Web Exploitation Framework]]&amp;lt;br&amp;gt;Ken Johnson and Chris Gates&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: WXf_ASDC_Presentation.odp.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[The Strengths of Combining Code Review with Application Penetration Testing]]&amp;lt;br&amp;gt;Dave Wichers&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: 2010-DC_The_Power_of_Code_Review.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Dealing with Web Application Security, Regulation Style]]&amp;lt;br&amp;gt;Andrew Weidenhamer&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Andrew_Weidenhamer_AppSecDC_Presentation.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Ensuring Software Assurance Process Maturity]]&amp;lt;br&amp;gt;Edmund Wotring&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:20101110_-_Ensuring_Software_Assurance_Process_Maturity_-_Final.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:55-4:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:00-4:45 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Pen-Test Panel]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Botnet Resistant Coding: Protecting Your Users from Script Kiddies]]&amp;lt;br&amp;gt;Fabian Rothschild and Peter Greko&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Bot_res_enc.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;1&amp;quot; | [[OWASP Broken Web Applications Project Update]]&amp;lt;br&amp;gt;Chuck Willis&amp;lt;br&amp;gt;Video | [[Media:Chuck_Willis_OWASPBWA_for_OWASP_AppSecDC_2010-11-10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group]]&amp;lt;br&amp;gt;Michele Moss&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_DC_2010_Moss_fin.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation]]&amp;lt;br&amp;gt;Joshua Windsor and Joshua Pauli&amp;lt;br&amp;gt;Video | [[Media: Smashing_WebGoat_-_AppSecDC_Presentation.odp.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:45-4:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:50-5:35 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners]]&amp;lt;br&amp;gt;David Shelly, Randy Marchany &amp;amp; Joseph Tront&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984178 Video] | [[Media:Closing_the_Gap_AppSecDC_Shelly.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Using Misuse Cases to Articulate Vulnerabilities to Stakeholders]]&amp;lt;br&amp;gt;Scott Mendenhall&amp;lt;br&amp;gt;Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Federal Perspectives on Application Security]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Web Hacking Incident Database (WHID) Report]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;Video | [[Media:AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:30-7:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Cocktails sponsored by [[Image:Trustwave50x250.png|link=https://www.trustwave.com/‎‎]]&lt;br /&gt;
&amp;lt;!-- Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 2 - 11/11==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 2 - Nov 11th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''New Frontiers (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Process (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:55-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Day 2 Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Ron Ross|Keynote: Ron Ross]]&amp;lt;br&amp;gt;National Institute of Standards and Technology&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18826138 Video] | [[Media: OWASP-11-11-2010-Ross.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:15 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Trustwave30x150.png|link=https://www.trustwave.com/‎‎]] &lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:15-11:00 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking SAP BusinessObjects]]&amp;lt;br&amp;gt;Joshua Abraham and Will Vandevanter&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Cloudy with a chance of hack!]]&amp;lt;br&amp;gt;Lars Ewe&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Cloudy_with_a_chance_of_hack_Nov_2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Don't Judge a Website by its Icon - Read the Label!|Don’t Judge a Website by its Icon – Read the Label!]]&amp;lt;br&amp;gt;Jeff Williams&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:2010-11_OWASP_Software_Labels.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18980995 Video] | [[Media: ApplicationPortfolioRiskRanking_BanishingFUDWithStructureAndNumbers_Content.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:00-11:05 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:05-11:50 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Deconstructing ColdFusion ]]&amp;lt;br&amp;gt;Chris Eng and Brandon Creighton&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_AppSec_DC_2010_-_Deconstructing_ColdFusion.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Declarative Web Security]]&amp;lt;br&amp;gt;Brandon Sterne&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/18984410 Video] | [[Media: Mozilla_OWASP_AppSec_2010_DC.pdf‎|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Secure Coding Practices Quick Reference Guide]]&amp;lt;br&amp;gt;Keith Turpin&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Secure_Coding_Practices_Quick_Ref_4.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Code Reviewing Strategies]]&amp;lt;br&amp;gt;Andrew Wilson and John Hoopes&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:CodeReviewStrategies.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:50-11:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:55-12:40 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Friendly Traitor 2 Features are hot but giving up our secrets is not!]]&amp;lt;br&amp;gt;Kevin Johnson and Mike Poor&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18810353 Video] | [[Media: Friendly_Traitor_2.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files]]&amp;lt;br&amp;gt;Aleksandr Yampolskiy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Exploiting_Media_For_Fun_and_Profit.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Open Source Web Entry Firewall]]&amp;lt;br&amp;gt;Ivan Buetler&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_Open_Source_Web_Entry_Server_V2.2.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Microsoft's Security Development Lifecycle for Agile Development]]&amp;lt;br&amp;gt;Nick Coblentz&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_AppSec_DC_2010_-_Microsoft_SDL-Agile_Presentation_-_Nick_Coblentz_2010-11-11.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:40-1:40 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:40-2:25 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking .NET Applications at Runtime: A Dynamic Attack]]&amp;lt;br&amp;gt;Jon McCoy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984620 Video] | [[Media: AppSecDC_-_Attacking_.NET_Applications_at_Runtime.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Life in the Clouds: a Service Provider's View]]&amp;lt;br&amp;gt;Michael Smith&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820461 Video] | [[Media: Life_In_the_Clouds.Smith.AppSecDC2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Solving Real World Problems with ESAPI]]&amp;lt;br&amp;gt;Chris Schmidt&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:ESAPI-2010-AppSecDC.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Financial Services Panel]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:25-2:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:30-3:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[JavaSnoop: How to hack anything written in Java]]&amp;lt;br&amp;gt;Arshan Dabirsiaghi&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:JavaSnoop_-_OWASP_AppSec_DC_2010.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Social Zombies Gone Wild: Totally Exposed and Uncensored]]&amp;lt;br&amp;gt;Kevin Johnson and Tom Eston&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18827316 Video] | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Attack Detection and Prevention with OWASP AppSensor]]&amp;lt;br&amp;gt;Colin Watson&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC-colin-watson-appsensor.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:15-3:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:AppSecDC-2010-Syngress75x30.gif‎‎|link=http://www.syngress.com/]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30-4:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Unlocking the Toolkit: Attacking Google Web Toolkit]]&amp;lt;br&amp;gt;Ron Gutierrez&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Attacking_Google_Web_Toolkit.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: SmartPhonesDumbApps_OWASPDC_20101111_Content.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ModSecurity Core Rule Set]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Implementing a Secure Software Development Program]]&amp;lt;br&amp;gt;Darren Death&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:15-4:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:20-5:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Constricting the Web: Offensive Python for Web Hackers]]&amp;lt;br&amp;gt;Marcin Wielgoszewski and Nathan Hamiel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Threats from Economical Improvement]]&amp;lt;br&amp;gt;Eduardo Neves&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Threats_from_Economical_Improvement_OWASP_AppSec_2010_LR.key.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ESAPI SwingSet]]&amp;lt;br&amp;gt;Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Esapi_swingset_talk_dc.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform]]&amp;lt;br&amp;gt;Benjamin Tomhave&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Carrot-stick-consequences-AppSecDC-2010.key.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:05-5:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Closing Remarks/Prizes&amp;lt;br&amp;gt;The OWASP AppSec DC Team&amp;lt;!-- Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_2010]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103377</id>
		<title>OWASP AppSec DC 2010 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103377"/>
				<updated>2011-02-04T17:23:30Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: More vimeo video links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
====Training 11/08====&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 1 - Nov 8th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
&amp;lt;!-- Training Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Training 11/09==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 2 - Nov 9th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''159B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
&amp;lt;!-- Training Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 1 - 11/10==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 1 - Nov 10th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''Defense (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Metrics (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Government (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:50-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Welcome and Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Neal Ziring|Keynote: Neal Ziring]]&amp;lt;br&amp;gt;National Security Agency&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820731 Video] | [[Media: OWASP-appsec2010-app_assurance-nziring-20101110.ppt | Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | OWASP Status Update&amp;lt;br&amp;gt;[[OWASP:About#Global_Board_Members| OWASP Board]]&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18821089 Video] | [http://www.owasp.org/images/0/0f/OWASPDC2010-v1.pdf Slides]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30-10:45 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Redspin30x120.png|link=http://www.redspin.com]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:45-11:30 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Python Basics for Web App Pentesters]]&amp;lt;br&amp;gt;Justin Searle &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Python_Basics_for_Web_App_Pentesters.zip|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Drive By Downloads: How To Avoid Getting A Cap Popped In Your App]]&amp;lt;br&amp;gt;Neil Daswani&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Dasient_11_10_10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Secure Code Review: Enterprise Metrics]]&amp;lt;br&amp;gt;Richard Tychansky&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:OWASP_-_Secure_Code_Review_Enterprise_Metrics.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise]]&amp;lt;br&amp;gt;Joe Jarzombek &amp;amp; Tom Millar&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18802696 Video] | [[Media:SwA_SCRM_10Nov2010_jj.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:30-11:35 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:35-12:20 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[White and Black box testing of Lotus Domino Applications]]&amp;lt;br&amp;gt;Ari Elias-bachrach and Casey Pike&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Domino_testing_presentation.ppt‎ | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Protecting Federal Government from Web 2.0 Application Security Risks]]&amp;lt;br&amp;gt;Sarbari Gupta&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Protecting_Federal_Government_from_Web_2.0_Application_Security_Risks_-_Sarbari_Gupta_FINAL.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Measuring Security: 5 KPIs for Successful Web App Security Programs]]&amp;lt;br&amp;gt;Rafal Los&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820054 Video] | [[Media:Magic_Numbers_-_5_KPIs_for_Measuring_WebAppSec_Program_Success_v3.2.pdf | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Security Risk and the Software Supply Chain]]&amp;lt;br&amp;gt;Karen Goertzel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:BoozAllen-AppSecDC2010-sw_scrm.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:20-1:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:20-2:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Pen Testing with Iron]]&amp;lt;br&amp;gt;Andrew Wilson &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:PenTestingWithIron.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Providing application-level assurance through DNSSEC]]&amp;lt;br&amp;gt;Suresh Krishnaswamy, Wes Hardaker and Russ Mundy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Providing-Application-level-Assurance-through-DNSSEC-final.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[H.....t.....t....p.......p....o....s....t]]&amp;lt;br&amp;gt;Onn Chee &amp;amp; Tom Brennan &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18818757 Video] | [http://www.owasp.org/images/4/43/Layer_7_DDOS.pdf Slides]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Understanding How They Attack Your Weaknesses: CAPEC]]&amp;lt;br&amp;gt;Sean Barnum&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Making Security Measurable&amp;lt;br&amp;gt;Video | [[Media:Making_Security_Measurable_-_CWE_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Understanding How They Attack Your Weaknesses&amp;lt;br&amp;gt;Video | [[Media:Understanding_How_They_Attack_Your_Weaknesses-CAPEC_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:05-2:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | Break&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:10-2:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking Oracle From Web Apps]]&amp;lt;br&amp;gt;Sumit Siddharth&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Hacking_Oracle_From_Web_Apps_2.0.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[GuardRails: A Nearly Painless Solution to Insecure Web Applications|GuardRails: A (Nearly) Painless Solution to Insecure Web Applications]]&amp;lt;br&amp;gt;Jonathan Burket, Patrick Mutchler, Michael Weaver and Muzzammil Zaveri&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Guardrails_owasp_final.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Framed! Security-patching Common Web Development Frameworks]] - Panel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18808494 Video]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:55-3:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:SecureIdeas_30X65.png|link=http://www.secureideas.net]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:10-3:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[wXf: Web Exploitation Framework]]&amp;lt;br&amp;gt;Ken Johnson and Chris Gates&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: WXf_ASDC_Presentation.odp.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[The Strengths of Combining Code Review with Application Penetration Testing]]&amp;lt;br&amp;gt;Dave Wichers&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: 2010-DC_The_Power_of_Code_Review.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Dealing with Web Application Security, Regulation Style]]&amp;lt;br&amp;gt;Andrew Weidenhamer&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Andrew_Weidenhamer_AppSecDC_Presentation.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Ensuring Software Assurance Process Maturity]]&amp;lt;br&amp;gt;Edmund Wotring&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:20101110_-_Ensuring_Software_Assurance_Process_Maturity_-_Final.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:55-4:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:00-4:45 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Pen-Test Panel]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Botnet Resistant Coding: Protecting Your Users from Script Kiddies]]&amp;lt;br&amp;gt;Fabian Rothschild and Peter Greko&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Bot_res_enc.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;1&amp;quot; | [[OWASP Broken Web Applications Project Update]]&amp;lt;br&amp;gt;Chuck Willis&amp;lt;br&amp;gt;Video | [[Media:Chuck_Willis_OWASPBWA_for_OWASP_AppSecDC_2010-11-10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group]]&amp;lt;br&amp;gt;Michele Moss&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_DC_2010_Moss_fin.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation]]&amp;lt;br&amp;gt;Joshua Windsor and Joshua Pauli&amp;lt;br&amp;gt;Video | [[Media: Smashing_WebGoat_-_AppSecDC_Presentation.odp.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:45-4:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:50-5:35 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners]]&amp;lt;br&amp;gt;David Shelly, Randy Marchany &amp;amp; Joseph Tront&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Closing_the_Gap_AppSecDC_Shelly.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Using Misuse Cases to Articulate Vulnerabilities to Stakeholders]]&amp;lt;br&amp;gt;Scott Mendenhall&amp;lt;br&amp;gt;Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Federal Perspectives on Application Security]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Web Hacking Incident Database (WHID) Report]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;Video | [[Media:AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:30-7:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Cocktails sponsored by [[Image:Trustwave50x250.png|link=https://www.trustwave.com/‎‎]]&lt;br /&gt;
&amp;lt;!-- Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 2 - 11/11==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 2 - Nov 11th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''New Frontiers (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Process (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:55-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Day 2 Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Ron Ross|Keynote: Ron Ross]]&amp;lt;br&amp;gt;National Institute of Standards and Technology&amp;lt;br&amp;gt;Video | [[Media: OWASP-11-11-2010-Ross.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:15 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Trustwave30x150.png|link=https://www.trustwave.com/‎‎]] &lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:15-11:00 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking SAP BusinessObjects]]&amp;lt;br&amp;gt;Joshua Abraham and Will Vandevanter&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Cloudy with a chance of hack!]]&amp;lt;br&amp;gt;Lars Ewe&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Cloudy_with_a_chance_of_hack_Nov_2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Don't Judge a Website by its Icon - Read the Label!|Don’t Judge a Website by its Icon – Read the Label!]]&amp;lt;br&amp;gt;Jeff Williams&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:2010-11_OWASP_Software_Labels.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: ApplicationPortfolioRiskRanking_BanishingFUDWithStructureAndNumbers_Content.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:00-11:05 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:05-11:50 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Deconstructing ColdFusion ]]&amp;lt;br&amp;gt;Chris Eng and Brandon Creighton&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_AppSec_DC_2010_-_Deconstructing_ColdFusion.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Declarative Web Security]]&amp;lt;br&amp;gt;Brandon Sterne&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/18984410 Video] | [[Media: Mozilla_OWASP_AppSec_2010_DC.pdf‎|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Secure Coding Practices Quick Reference Guide]]&amp;lt;br&amp;gt;Keith Turpin&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Secure_Coding_Practices_Quick_Ref_4.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Code Reviewing Strategies]]&amp;lt;br&amp;gt;Andrew Wilson and John Hoopes&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:CodeReviewStrategies.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:50-11:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:55-12:40 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Friendly Traitor 2 Features are hot but giving up our secrets is not!]]&amp;lt;br&amp;gt;Kevin Johnson and Mike Poor&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18810353 Video] | [[Media: Friendly_Traitor_2.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files]]&amp;lt;br&amp;gt;Aleksandr Yampolskiy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Exploiting_Media_For_Fun_and_Profit.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Open Source Web Entry Firewall]]&amp;lt;br&amp;gt;Ivan Buetler&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_Open_Source_Web_Entry_Server_V2.2.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Microsoft's Security Development Lifecycle for Agile Development]]&amp;lt;br&amp;gt;Nick Coblentz&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_AppSec_DC_2010_-_Microsoft_SDL-Agile_Presentation_-_Nick_Coblentz_2010-11-11.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:40-1:40 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:40-2:25 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking .NET Applications at Runtime: A Dynamic Attack]]&amp;lt;br&amp;gt;Jon McCoy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_-_Attacking_.NET_Applications_at_Runtime.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Life in the Clouds: a Service Provider's View]]&amp;lt;br&amp;gt;Michael Smith&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820461 Video] | [[Media: Life_In_the_Clouds.Smith.AppSecDC2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Solving Real World Problems with ESAPI]]&amp;lt;br&amp;gt;Chris Schmidt&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:ESAPI-2010-AppSecDC.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Financial Services Panel]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:25-2:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:30-3:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[JavaSnoop: How to hack anything written in Java]]&amp;lt;br&amp;gt;Arshan Dabirsiaghi&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:JavaSnoop_-_OWASP_AppSec_DC_2010.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Social Zombies Gone Wild: Totally Exposed and Uncensored]]&amp;lt;br&amp;gt;Kevin Johnson and Tom Eston&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Attack Detection and Prevention with OWASP AppSensor]]&amp;lt;br&amp;gt;Colin Watson&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC-colin-watson-appsensor.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:15-3:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:AppSecDC-2010-Syngress75x30.gif‎‎|link=http://www.syngress.com/]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30-4:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Unlocking the Toolkit: Attacking Google Web Toolkit]]&amp;lt;br&amp;gt;Ron Gutierrez&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Attacking_Google_Web_Toolkit.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: SmartPhonesDumbApps_OWASPDC_20101111_Content.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ModSecurity Core Rule Set]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Implementing a Secure Software Development Program]]&amp;lt;br&amp;gt;Darren Death&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:15-4:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:20-5:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Constricting the Web: Offensive Python for Web Hackers]]&amp;lt;br&amp;gt;Marcin Wielgoszewski and Nathan Hamiel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Threats from Economical Improvement]]&amp;lt;br&amp;gt;Eduardo Neves&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Threats_from_Economical_Improvement_OWASP_AppSec_2010_LR.key.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ESAPI SwingSet]]&amp;lt;br&amp;gt;Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Esapi_swingset_talk_dc.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform]]&amp;lt;br&amp;gt;Benjamin Tomhave&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Carrot-stick-consequences-AppSecDC-2010.key.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:05-5:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Closing Remarks/Prizes&amp;lt;br&amp;gt;The OWASP AppSec DC Team&amp;lt;!-- Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_2010]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103376</id>
		<title>OWASP AppSec DC 2010 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103376"/>
				<updated>2011-02-04T17:18:55Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: More video links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
====Training 11/08====&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 1 - Nov 8th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
&amp;lt;!-- Training Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Training 11/09==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 2 - Nov 9th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''159B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
&amp;lt;!-- Training Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 1 - 11/10==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 1 - Nov 10th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''Defense (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Metrics (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Government (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:50-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Welcome and Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Neal Ziring|Keynote: Neal Ziring]]&amp;lt;br&amp;gt;National Security Agency&amp;lt;br&amp;gt;Video | [[Media: OWASP-appsec2010-app_assurance-nziring-20101110.ppt | Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | OWASP Status Update&amp;lt;br&amp;gt;[[OWASP:About#Global_Board_Members| OWASP Board]]&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18821089 Video] | [http://www.owasp.org/images/0/0f/OWASPDC2010-v1.pdf Slides]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30-10:45 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Redspin30x120.png|link=http://www.redspin.com]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:45-11:30 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Python Basics for Web App Pentesters]]&amp;lt;br&amp;gt;Justin Searle &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Python_Basics_for_Web_App_Pentesters.zip|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Drive By Downloads: How To Avoid Getting A Cap Popped In Your App]]&amp;lt;br&amp;gt;Neil Daswani&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Dasient_11_10_10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Secure Code Review: Enterprise Metrics]]&amp;lt;br&amp;gt;Richard Tychansky&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:OWASP_-_Secure_Code_Review_Enterprise_Metrics.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise]]&amp;lt;br&amp;gt;Joe Jarzombek &amp;amp; Tom Millar&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18802696 Video] | [[Media:SwA_SCRM_10Nov2010_jj.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:30-11:35 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:35-12:20 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[White and Black box testing of Lotus Domino Applications]]&amp;lt;br&amp;gt;Ari Elias-bachrach and Casey Pike&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Domino_testing_presentation.ppt‎ | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Protecting Federal Government from Web 2.0 Application Security Risks]]&amp;lt;br&amp;gt;Sarbari Gupta&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Protecting_Federal_Government_from_Web_2.0_Application_Security_Risks_-_Sarbari_Gupta_FINAL.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Measuring Security: 5 KPIs for Successful Web App Security Programs]]&amp;lt;br&amp;gt;Rafal Los&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Magic_Numbers_-_5_KPIs_for_Measuring_WebAppSec_Program_Success_v3.2.pdf | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Security Risk and the Software Supply Chain]]&amp;lt;br&amp;gt;Karen Goertzel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:BoozAllen-AppSecDC2010-sw_scrm.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:20-1:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:20-2:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Pen Testing with Iron]]&amp;lt;br&amp;gt;Andrew Wilson &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:PenTestingWithIron.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Providing application-level assurance through DNSSEC]]&amp;lt;br&amp;gt;Suresh Krishnaswamy, Wes Hardaker and Russ Mundy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Providing-Application-level-Assurance-through-DNSSEC-final.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[H.....t.....t....p.......p....o....s....t]]&amp;lt;br&amp;gt;Onn Chee &amp;amp; Tom Brennan &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18818757 Video] | [http://www.owasp.org/images/4/43/Layer_7_DDOS.pdf Slides]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Understanding How They Attack Your Weaknesses: CAPEC]]&amp;lt;br&amp;gt;Sean Barnum&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Making Security Measurable&amp;lt;br&amp;gt;Video | [[Media:Making_Security_Measurable_-_CWE_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Understanding How They Attack Your Weaknesses&amp;lt;br&amp;gt;Video | [[Media:Understanding_How_They_Attack_Your_Weaknesses-CAPEC_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:05-2:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | Break&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:10-2:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking Oracle From Web Apps]]&amp;lt;br&amp;gt;Sumit Siddharth&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Hacking_Oracle_From_Web_Apps_2.0.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[GuardRails: A Nearly Painless Solution to Insecure Web Applications|GuardRails: A (Nearly) Painless Solution to Insecure Web Applications]]&amp;lt;br&amp;gt;Jonathan Burket, Patrick Mutchler, Michael Weaver and Muzzammil Zaveri&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Guardrails_owasp_final.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Framed! Security-patching Common Web Development Frameworks]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:55-3:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:SecureIdeas_30X65.png|link=http://www.secureideas.net]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:10-3:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[wXf: Web Exploitation Framework]]&amp;lt;br&amp;gt;Ken Johnson and Chris Gates&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: WXf_ASDC_Presentation.odp.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[The Strengths of Combining Code Review with Application Penetration Testing]]&amp;lt;br&amp;gt;Dave Wichers&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: 2010-DC_The_Power_of_Code_Review.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Dealing with Web Application Security, Regulation Style]]&amp;lt;br&amp;gt;Andrew Weidenhamer&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Andrew_Weidenhamer_AppSecDC_Presentation.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Ensuring Software Assurance Process Maturity]]&amp;lt;br&amp;gt;Edmund Wotring&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:20101110_-_Ensuring_Software_Assurance_Process_Maturity_-_Final.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:55-4:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:00-4:45 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Pen-Test Panel]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Botnet Resistant Coding: Protecting Your Users from Script Kiddies]]&amp;lt;br&amp;gt;Fabian Rothschild and Peter Greko&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Bot_res_enc.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;1&amp;quot; | [[OWASP Broken Web Applications Project Update]]&amp;lt;br&amp;gt;Chuck Willis&amp;lt;br&amp;gt;Video | [[Media:Chuck_Willis_OWASPBWA_for_OWASP_AppSecDC_2010-11-10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group]]&amp;lt;br&amp;gt;Michele Moss&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_DC_2010_Moss_fin.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation]]&amp;lt;br&amp;gt;Joshua Windsor and Joshua Pauli&amp;lt;br&amp;gt;Video | [[Media: Smashing_WebGoat_-_AppSecDC_Presentation.odp.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:45-4:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:50-5:35 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners]]&amp;lt;br&amp;gt;David Shelly, Randy Marchany &amp;amp; Joseph Tront&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Closing_the_Gap_AppSecDC_Shelly.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Using Misuse Cases to Articulate Vulnerabilities to Stakeholders]]&amp;lt;br&amp;gt;Scott Mendenhall&amp;lt;br&amp;gt;Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Federal Perspectives on Application Security]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Web Hacking Incident Database (WHID) Report]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;Video | [[Media:AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:30-7:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Cocktails sponsored by [[Image:Trustwave50x250.png|link=https://www.trustwave.com/‎‎]]&lt;br /&gt;
&amp;lt;!-- Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 2 - 11/11==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 2 - Nov 11th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''New Frontiers (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Process (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:55-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Day 2 Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Ron Ross|Keynote: Ron Ross]]&amp;lt;br&amp;gt;National Institute of Standards and Technology&amp;lt;br&amp;gt;Video | [[Media: OWASP-11-11-2010-Ross.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:15 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Trustwave30x150.png|link=https://www.trustwave.com/‎‎]] &lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:15-11:00 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking SAP BusinessObjects]]&amp;lt;br&amp;gt;Joshua Abraham and Will Vandevanter&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Cloudy with a chance of hack!]]&amp;lt;br&amp;gt;Lars Ewe&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Cloudy_with_a_chance_of_hack_Nov_2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Don't Judge a Website by its Icon - Read the Label!|Don’t Judge a Website by its Icon – Read the Label!]]&amp;lt;br&amp;gt;Jeff Williams&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:2010-11_OWASP_Software_Labels.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: ApplicationPortfolioRiskRanking_BanishingFUDWithStructureAndNumbers_Content.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:00-11:05 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:05-11:50 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Deconstructing ColdFusion ]]&amp;lt;br&amp;gt;Chris Eng and Brandon Creighton&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_AppSec_DC_2010_-_Deconstructing_ColdFusion.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Declarative Web Security]]&amp;lt;br&amp;gt;Brandon Sterne&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/18984410 Video] | [[Media: Mozilla_OWASP_AppSec_2010_DC.pdf‎|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Secure Coding Practices Quick Reference Guide]]&amp;lt;br&amp;gt;Keith Turpin&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Secure_Coding_Practices_Quick_Ref_4.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Code Reviewing Strategies]]&amp;lt;br&amp;gt;Andrew Wilson and John Hoopes&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:CodeReviewStrategies.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:50-11:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:55-12:40 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Friendly Traitor 2 Features are hot but giving up our secrets is not!]]&amp;lt;br&amp;gt;Kevin Johnson and Mike Poor&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18810353 Video] | [[Media: Friendly_Traitor_2.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files]]&amp;lt;br&amp;gt;Aleksandr Yampolskiy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Exploiting_Media_For_Fun_and_Profit.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Open Source Web Entry Firewall]]&amp;lt;br&amp;gt;Ivan Buetler&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_Open_Source_Web_Entry_Server_V2.2.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Microsoft's Security Development Lifecycle for Agile Development]]&amp;lt;br&amp;gt;Nick Coblentz&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_AppSec_DC_2010_-_Microsoft_SDL-Agile_Presentation_-_Nick_Coblentz_2010-11-11.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:40-1:40 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:40-2:25 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking .NET Applications at Runtime: A Dynamic Attack]]&amp;lt;br&amp;gt;Jon McCoy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_-_Attacking_.NET_Applications_at_Runtime.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Life in the Clouds: a Service Provider's View]]&amp;lt;br&amp;gt;Michael Smith&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Life_In_the_Clouds.Smith.AppSecDC2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Solving Real World Problems with ESAPI]]&amp;lt;br&amp;gt;Chris Schmidt&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:ESAPI-2010-AppSecDC.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Financial Services Panel]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:25-2:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:30-3:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[JavaSnoop: How to hack anything written in Java]]&amp;lt;br&amp;gt;Arshan Dabirsiaghi&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:JavaSnoop_-_OWASP_AppSec_DC_2010.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Social Zombies Gone Wild: Totally Exposed and Uncensored]]&amp;lt;br&amp;gt;Kevin Johnson and Tom Eston&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Attack Detection and Prevention with OWASP AppSensor]]&amp;lt;br&amp;gt;Colin Watson&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC-colin-watson-appsensor.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:15-3:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:AppSecDC-2010-Syngress75x30.gif‎‎|link=http://www.syngress.com/]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30-4:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Unlocking the Toolkit: Attacking Google Web Toolkit]]&amp;lt;br&amp;gt;Ron Gutierrez&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Attacking_Google_Web_Toolkit.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: SmartPhonesDumbApps_OWASPDC_20101111_Content.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ModSecurity Core Rule Set]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Implementing a Secure Software Development Program]]&amp;lt;br&amp;gt;Darren Death&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:15-4:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:20-5:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Constricting the Web: Offensive Python for Web Hackers]]&amp;lt;br&amp;gt;Marcin Wielgoszewski and Nathan Hamiel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Threats from Economical Improvement]]&amp;lt;br&amp;gt;Eduardo Neves&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Threats_from_Economical_Improvement_OWASP_AppSec_2010_LR.key.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ESAPI SwingSet]]&amp;lt;br&amp;gt;Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Esapi_swingset_talk_dc.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform]]&amp;lt;br&amp;gt;Benjamin Tomhave&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Carrot-stick-consequences-AppSecDC-2010.key.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:05-5:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Closing Remarks/Prizes&amp;lt;br&amp;gt;The OWASP AppSec DC Team&amp;lt;!-- Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_2010]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103375</id>
		<title>OWASP AppSec DC 2010 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=103375"/>
				<updated>2011-02-04T17:15:13Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Added Declarative Web Security video link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
====Training 11/08====&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 1 - Nov 8th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
&amp;lt;!-- Training Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Training 11/09==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 2 - Nov 9th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''159B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
&amp;lt;!-- Training Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 1 - 11/10==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 1 - Nov 10th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''Defense (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Metrics (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Government (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:50-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Welcome and Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Neal Ziring|Keynote: Neal Ziring]]&amp;lt;br&amp;gt;National Security Agency&amp;lt;br&amp;gt;Video | [[Media: OWASP-appsec2010-app_assurance-nziring-20101110.ppt | Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | OWASP Status Update&amp;lt;br&amp;gt;[[OWASP:About#Global_Board_Members| OWASP Board]]&amp;lt;br&amp;gt;Video | [http://www.owasp.org/images/0/0f/OWASPDC2010-v1.pdf Slides]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30-10:45 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Redspin30x120.png|link=http://www.redspin.com]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:45-11:30 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Python Basics for Web App Pentesters]]&amp;lt;br&amp;gt;Justin Searle &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Python_Basics_for_Web_App_Pentesters.zip|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Drive By Downloads: How To Avoid Getting A Cap Popped In Your App]]&amp;lt;br&amp;gt;Neil Daswani&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Dasient_11_10_10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Secure Code Review: Enterprise Metrics]]&amp;lt;br&amp;gt;Richard Tychansky&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:OWASP_-_Secure_Code_Review_Enterprise_Metrics.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise]]&amp;lt;br&amp;gt;Joe Jarzombek &amp;amp; Tom Millar&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:SwA_SCRM_10Nov2010_jj.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:30-11:35 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:35-12:20 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[White and Black box testing of Lotus Domino Applications]]&amp;lt;br&amp;gt;Ari Elias-bachrach and Casey Pike&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Domino_testing_presentation.ppt‎ | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Protecting Federal Government from Web 2.0 Application Security Risks]]&amp;lt;br&amp;gt;Sarbari Gupta&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Protecting_Federal_Government_from_Web_2.0_Application_Security_Risks_-_Sarbari_Gupta_FINAL.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Measuring Security: 5 KPIs for Successful Web App Security Programs]]&amp;lt;br&amp;gt;Rafal Los&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Magic_Numbers_-_5_KPIs_for_Measuring_WebAppSec_Program_Success_v3.2.pdf | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Security Risk and the Software Supply Chain]]&amp;lt;br&amp;gt;Karen Goertzel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:BoozAllen-AppSecDC2010-sw_scrm.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:20-1:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:20-2:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Pen Testing with Iron]]&amp;lt;br&amp;gt;Andrew Wilson &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:PenTestingWithIron.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Providing application-level assurance through DNSSEC]]&amp;lt;br&amp;gt;Suresh Krishnaswamy, Wes Hardaker and Russ Mundy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Providing-Application-level-Assurance-through-DNSSEC-final.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[H.....t.....t....p.......p....o....s....t]]&amp;lt;br&amp;gt;Onn Chee &amp;amp; Tom Brennan &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [http://www.owasp.org/images/4/43/Layer_7_DDOS.pdf Slides]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Understanding How They Attack Your Weaknesses: CAPEC]]&amp;lt;br&amp;gt;Sean Barnum&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Making Security Measurable&amp;lt;br&amp;gt;Video | [[Media:Making_Security_Measurable_-_CWE_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Understanding How They Attack Your Weaknesses&amp;lt;br&amp;gt;Video | [[Media:Understanding_How_They_Attack_Your_Weaknesses-CAPEC_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:05-2:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | Break&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:10-2:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking Oracle From Web Apps]]&amp;lt;br&amp;gt;Sumit Siddharth&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Hacking_Oracle_From_Web_Apps_2.0.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[GuardRails: A Nearly Painless Solution to Insecure Web Applications|GuardRails: A (Nearly) Painless Solution to Insecure Web Applications]]&amp;lt;br&amp;gt;Jonathan Burket, Patrick Mutchler, Michael Weaver and Muzzammil Zaveri&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Guardrails_owasp_final.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Framed! Security-patching Common Web Development Frameworks]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:55-3:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:SecureIdeas_30X65.png|link=http://www.secureideas.net]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:10-3:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[wXf: Web Exploitation Framework]]&amp;lt;br&amp;gt;Ken Johnson and Chris Gates&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: WXf_ASDC_Presentation.odp.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[The Strengths of Combining Code Review with Application Penetration Testing]]&amp;lt;br&amp;gt;Dave Wichers&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: 2010-DC_The_Power_of_Code_Review.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Dealing with Web Application Security, Regulation Style]]&amp;lt;br&amp;gt;Andrew Weidenhamer&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Andrew_Weidenhamer_AppSecDC_Presentation.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Ensuring Software Assurance Process Maturity]]&amp;lt;br&amp;gt;Edmund Wotring&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:20101110_-_Ensuring_Software_Assurance_Process_Maturity_-_Final.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:55-4:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:00-4:45 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Pen-Test Panel]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Botnet Resistant Coding: Protecting Your Users from Script Kiddies]]&amp;lt;br&amp;gt;Fabian Rothschild and Peter Greko&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Bot_res_enc.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;1&amp;quot; | [[OWASP Broken Web Applications Project Update]]&amp;lt;br&amp;gt;Chuck Willis&amp;lt;br&amp;gt;Video | [[Media:Chuck_Willis_OWASPBWA_for_OWASP_AppSecDC_2010-11-10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group]]&amp;lt;br&amp;gt;Michele Moss&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_DC_2010_Moss_fin.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation]]&amp;lt;br&amp;gt;Joshua Windsor and Joshua Pauli&amp;lt;br&amp;gt;Video | [[Media: Smashing_WebGoat_-_AppSecDC_Presentation.odp.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:45-4:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:50-5:35 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners]]&amp;lt;br&amp;gt;David Shelly, Randy Marchany &amp;amp; Joseph Tront&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Closing_the_Gap_AppSecDC_Shelly.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Using Misuse Cases to Articulate Vulnerabilities to Stakeholders]]&amp;lt;br&amp;gt;Scott Mendenhall&amp;lt;br&amp;gt;Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Federal Perspectives on Application Security]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Web Hacking Incident Database (WHID) Report]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;Video | [[Media:AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:30-7:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Cocktails sponsored by [[Image:Trustwave50x250.png|link=https://www.trustwave.com/‎‎]]&lt;br /&gt;
&amp;lt;!-- Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 2 - 11/11==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 2 - Nov 11th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''New Frontiers (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Process (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:55-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Day 2 Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Ron Ross|Keynote: Ron Ross]]&amp;lt;br&amp;gt;National Institute of Standards and Technology&amp;lt;br&amp;gt;Video | [[Media: OWASP-11-11-2010-Ross.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:15 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Trustwave30x150.png|link=https://www.trustwave.com/‎‎]] &lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:15-11:00 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking SAP BusinessObjects]]&amp;lt;br&amp;gt;Joshua Abraham and Will Vandevanter&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Cloudy with a chance of hack!]]&amp;lt;br&amp;gt;Lars Ewe&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Cloudy_with_a_chance_of_hack_Nov_2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Don't Judge a Website by its Icon - Read the Label!|Don’t Judge a Website by its Icon – Read the Label!]]&amp;lt;br&amp;gt;Jeff Williams&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:2010-11_OWASP_Software_Labels.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: ApplicationPortfolioRiskRanking_BanishingFUDWithStructureAndNumbers_Content.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:00-11:05 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:05-11:50 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Deconstructing ColdFusion ]]&amp;lt;br&amp;gt;Chris Eng and Brandon Creighton&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_AppSec_DC_2010_-_Deconstructing_ColdFusion.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Declarative Web Security]]&amp;lt;br&amp;gt;Brandon Sterne&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/18984410 Video] | [[Media: Mozilla_OWASP_AppSec_2010_DC.pdf‎|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Secure Coding Practices Quick Reference Guide]]&amp;lt;br&amp;gt;Keith Turpin&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Secure_Coding_Practices_Quick_Ref_4.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Code Reviewing Strategies]]&amp;lt;br&amp;gt;Andrew Wilson and John Hoopes&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:CodeReviewStrategies.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:50-11:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:55-12:40 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Friendly Traitor 2 Features are hot but giving up our secrets is not!]]&amp;lt;br&amp;gt;Kevin Johnson and Mike Poor&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Friendly_Traitor_2.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files]]&amp;lt;br&amp;gt;Aleksandr Yampolskiy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Exploiting_Media_For_Fun_and_Profit.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Open Source Web Entry Firewall]]&amp;lt;br&amp;gt;Ivan Buetler&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_Open_Source_Web_Entry_Server_V2.2.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Microsoft's Security Development Lifecycle for Agile Development]]&amp;lt;br&amp;gt;Nick Coblentz&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_AppSec_DC_2010_-_Microsoft_SDL-Agile_Presentation_-_Nick_Coblentz_2010-11-11.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:40-1:40 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:40-2:25 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking .NET Applications at Runtime: A Dynamic Attack]]&amp;lt;br&amp;gt;Jon McCoy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_-_Attacking_.NET_Applications_at_Runtime.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Life in the Clouds: a Service Provider's View]]&amp;lt;br&amp;gt;Michael Smith&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Life_In_the_Clouds.Smith.AppSecDC2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Solving Real World Problems with ESAPI]]&amp;lt;br&amp;gt;Chris Schmidt&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:ESAPI-2010-AppSecDC.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Financial Services Panel]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:25-2:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:30-3:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[JavaSnoop: How to hack anything written in Java]]&amp;lt;br&amp;gt;Arshan Dabirsiaghi&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:JavaSnoop_-_OWASP_AppSec_DC_2010.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Social Zombies Gone Wild: Totally Exposed and Uncensored]]&amp;lt;br&amp;gt;Kevin Johnson and Tom Eston&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Attack Detection and Prevention with OWASP AppSensor]]&amp;lt;br&amp;gt;Colin Watson&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC-colin-watson-appsensor.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:15-3:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:AppSecDC-2010-Syngress75x30.gif‎‎|link=http://www.syngress.com/]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30-4:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Unlocking the Toolkit: Attacking Google Web Toolkit]]&amp;lt;br&amp;gt;Ron Gutierrez&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Attacking_Google_Web_Toolkit.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: SmartPhonesDumbApps_OWASPDC_20101111_Content.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ModSecurity Core Rule Set]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Implementing a Secure Software Development Program]]&amp;lt;br&amp;gt;Darren Death&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:15-4:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:20-5:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Constricting the Web: Offensive Python for Web Hackers]]&amp;lt;br&amp;gt;Marcin Wielgoszewski and Nathan Hamiel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Threats from Economical Improvement]]&amp;lt;br&amp;gt;Eduardo Neves&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Threats_from_Economical_Improvement_OWASP_AppSec_2010_LR.key.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ESAPI SwingSet]]&amp;lt;br&amp;gt;Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Esapi_swingset_talk_dc.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform]]&amp;lt;br&amp;gt;Benjamin Tomhave&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Carrot-stick-consequences-AppSecDC-2010.key.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:05-5:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Closing Remarks/Prizes&amp;lt;br&amp;gt;The OWASP AppSec DC Team&amp;lt;!-- Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_2010]]&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95182</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95182"/>
				<updated>2010-12-04T00:34:58Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Add Pixy/* PHP static analysis and file inclusion scanning */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP LiveCD]&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Security Dojo - http://dojo.mavensecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samurai WTF - http://samurai.inguardians.com&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
moth - http://www.bonsai-sec.com/en/research/moth.php&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP Broken Web Applications - http://code.google.com/p/owaspbwa/&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/us/resources-free-tools.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Updated HackmeBank - http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google’s web application training - http://jarlsberg.appspot.com/part1/ &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros fork #1: Zed Attack Proxy (ZAP) - http://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros fork #2: Andiparos - http://code.google.com/p/andiparos/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Ratproxy - http://code.google.com/p/ratproxy/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
EnDe - http://www.owasp.org/index.php/Category:OWASP_EnDe&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://www.owasp.org/index.php/JBroFuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
J-Baah - http://www.sensepost.com/labs/tools/pentest/j-baah&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
Websecurify - http://www.websecurify.com&amp;lt;br/&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox and Hacking Addons Bundled: Portable Firefox with web hacking addons bundled&lt;br /&gt;
- http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
WebPageFingerprint - Light-weight Greasemonkey Fuzzer - http://userscripts.org/scripts/show/30285&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
Pixy: Open source flow based discovery of XSS and SQLi - http://pixybox.seclab.tuwien.ac.at/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP Defensive Tools==&lt;br /&gt;
&lt;br /&gt;
PHPInfoSec - Check phpinfo configuration for security - http://phpsec.org/projects/phpsecinfo/&lt;br /&gt;
&lt;br /&gt;
A Greasemonkey Replacement can be found at http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Php-Brute-Force-Attack Detector - Detect your web servers being scanned by brute force tools such as WFuzz, OWASP DirBuster and vulnerability scanners such as Nessus, Nikto, Acunetix ..etc. &lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/php_brute_force_detect.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHP-Login-Info-Checker - Strictly enforce admins/users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page via url loginfo_checker.php?testlic&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/loginfo_checkerv0.1.zip&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phploginfo_checker_demo.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
php-DDOS-Shield - A tricky script to prevent idiot distributed bots which discontinue their flooding attacks by identifying HTTP 503 header code. http://code.google.com/p/ddos-shield/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHPMySpamFIGHTER - http://yehg.net/lab/pr0js/files.php/phpmyspamfighter.zip&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phpMySpamFighter_demo.rar&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.codeplex.com/WebserviceStudio&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
Yasca: A highly extensible source code analysis framework; incorporates several analysis tools into one package. http://www.yasca.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
LAPSE - http://suif.stanford.edu/~livshits/work/lapse/ &amp;lt;br/&amp;gt;&lt;br /&gt;
CodePro Analytix - http://code.google.com/webtoolkit/tools/codepro/doc/index.html&amp;lt;br/&amp;gt;&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
* Visual Studio 2008 Code Analysis, available in:&lt;br /&gt;
** VSTS 2008 Development Edition (http://msdn.microsoft.com/vsts2008/products/bb933752.aspx) and &lt;br /&gt;
** VSTS 2008 Team Suite (http://msdn.microsoft.com/vsts2008/products/bb933735.aspx)&lt;br /&gt;
* Visual Studio 2005 Code Analyzer, available in:&lt;br /&gt;
** Visual Studio 2005 Team Edition for Software Developers  (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
** Visual Studio 2005 Team Suite (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
* Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&lt;br /&gt;
* FxCop:&lt;br /&gt;
** (blog) http://blogs.msdn.com/fxcop/&lt;br /&gt;
** (download) http://code.msdn.microsoft.com/codeanalysis&lt;br /&gt;
* Microsoft internal tools you can't have yet:&lt;br /&gt;
** http://www.microsoft.com/windows/cse/pa_projects.mspx &lt;br /&gt;
** http://research.microsoft.com/Pex/ &lt;br /&gt;
** http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
SSL Labs - https://www.ssllabs.com/ssldb/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Analytics seo - http://www.analyticsseo.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector - http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95180</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95180"/>
				<updated>2010-12-04T00:30:49Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Add j-baah, change Jbrofuzz link to OWASP page /* RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP LiveCD]&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Security Dojo - http://dojo.mavensecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samurai WTF - http://samurai.inguardians.com&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
moth - http://www.bonsai-sec.com/en/research/moth.php&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP Broken Web Applications - http://code.google.com/p/owaspbwa/&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/us/resources-free-tools.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Updated HackmeBank - http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google’s web application training - http://jarlsberg.appspot.com/part1/ &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros fork #1: Zed Attack Proxy (ZAP) - http://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros fork #2: Andiparos - http://code.google.com/p/andiparos/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Ratproxy - http://code.google.com/p/ratproxy/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
EnDe - http://www.owasp.org/index.php/Category:OWASP_EnDe&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://www.owasp.org/index.php/JBroFuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
J-Baah - http://www.sensepost.com/labs/tools/pentest/j-baah&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
Websecurify - http://www.websecurify.com&amp;lt;br/&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox and Hacking Addons Bundled: Portable Firefox with web hacking addons bundled&lt;br /&gt;
- http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
WebPageFingerprint - Light-weight Greasemonkey Fuzzer - http://userscripts.org/scripts/show/30285&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP Defensive Tools==&lt;br /&gt;
&lt;br /&gt;
PHPInfoSec - Check phpinfo configuration for security - http://phpsec.org/projects/phpsecinfo/&lt;br /&gt;
&lt;br /&gt;
A Greasemonkey Replacement can be found at http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Php-Brute-Force-Attack Detector - Detect your web servers being scanned by brute force tools such as WFuzz, OWASP DirBuster and vulnerability scanners such as Nessus, Nikto, Acunetix ..etc. &lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/php_brute_force_detect.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHP-Login-Info-Checker - Strictly enforce admins/users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page via url loginfo_checker.php?testlic&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/loginfo_checkerv0.1.zip&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phploginfo_checker_demo.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
php-DDOS-Shield - A tricky script to prevent idiot distributed bots which discontinue their flooding attacks by identifying HTTP 503 header code. http://code.google.com/p/ddos-shield/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHPMySpamFIGHTER - http://yehg.net/lab/pr0js/files.php/phpmyspamfighter.zip&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phpMySpamFighter_demo.rar&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.codeplex.com/WebserviceStudio&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
Yasca: A highly extensible source code analysis framework; incorporates several analysis tools into one package. http://www.yasca.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
LAPSE - http://suif.stanford.edu/~livshits/work/lapse/ &amp;lt;br/&amp;gt;&lt;br /&gt;
CodePro Analytix - http://code.google.com/webtoolkit/tools/codepro/doc/index.html&amp;lt;br/&amp;gt;&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
* Visual Studio 2008 Code Analysis, available in:&lt;br /&gt;
** VSTS 2008 Development Edition (http://msdn.microsoft.com/vsts2008/products/bb933752.aspx) and &lt;br /&gt;
** VSTS 2008 Team Suite (http://msdn.microsoft.com/vsts2008/products/bb933735.aspx)&lt;br /&gt;
* Visual Studio 2005 Code Analyzer, available in:&lt;br /&gt;
** Visual Studio 2005 Team Edition for Software Developers  (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
** Visual Studio 2005 Team Suite (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
* Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&lt;br /&gt;
* FxCop:&lt;br /&gt;
** (blog) http://blogs.msdn.com/fxcop/&lt;br /&gt;
** (download) http://code.msdn.microsoft.com/codeanalysis&lt;br /&gt;
* Microsoft internal tools you can't have yet:&lt;br /&gt;
** http://www.microsoft.com/windows/cse/pa_projects.mspx &lt;br /&gt;
** http://research.microsoft.com/Pex/ &lt;br /&gt;
** http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
SSL Labs - https://www.ssllabs.com/ssldb/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Analytics seo - http://www.analyticsseo.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector - http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95178</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95178"/>
				<updated>2010-12-04T00:29:36Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Move J-Baah and jbrofuzz to fuzzers section /* HTTP proxying / editing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP LiveCD]&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Security Dojo - http://dojo.mavensecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samurai WTF - http://samurai.inguardians.com&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
moth - http://www.bonsai-sec.com/en/research/moth.php&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP Broken Web Applications - http://code.google.com/p/owaspbwa/&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/us/resources-free-tools.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Updated HackmeBank - http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google’s web application training - http://jarlsberg.appspot.com/part1/ &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros fork #1: Zed Attack Proxy (ZAP) - http://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros fork #2: Andiparos - http://code.google.com/p/andiparos/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Ratproxy - http://code.google.com/p/ratproxy/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
EnDe - http://www.owasp.org/index.php/Category:OWASP_EnDe&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
Websecurify - http://www.websecurify.com&amp;lt;br/&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox and Hacking Addons Bundled: Portable Firefox with web hacking addons bundled&lt;br /&gt;
- http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
WebPageFingerprint - Light-weight Greasemonkey Fuzzer - http://userscripts.org/scripts/show/30285&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP Defensive Tools==&lt;br /&gt;
&lt;br /&gt;
PHPInfoSec - Check phpinfo configuration for security - http://phpsec.org/projects/phpsecinfo/&lt;br /&gt;
&lt;br /&gt;
A Greasemonkey Replacement can be found at http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Php-Brute-Force-Attack Detector - Detect your web servers being scanned by brute force tools such as WFuzz, OWASP DirBuster and vulnerability scanners such as Nessus, Nikto, Acunetix ..etc. &lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/php_brute_force_detect.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHP-Login-Info-Checker - Strictly enforce admins/users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page via url loginfo_checker.php?testlic&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/loginfo_checkerv0.1.zip&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phploginfo_checker_demo.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
php-DDOS-Shield - A tricky script to prevent idiot distributed bots which discontinue their flooding attacks by identifying HTTP 503 header code. http://code.google.com/p/ddos-shield/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHPMySpamFIGHTER - http://yehg.net/lab/pr0js/files.php/phpmyspamfighter.zip&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phpMySpamFighter_demo.rar&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.codeplex.com/WebserviceStudio&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
Yasca: A highly extensible source code analysis framework; incorporates several analysis tools into one package. http://www.yasca.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
LAPSE - http://suif.stanford.edu/~livshits/work/lapse/ &amp;lt;br/&amp;gt;&lt;br /&gt;
CodePro Analytix - http://code.google.com/webtoolkit/tools/codepro/doc/index.html&amp;lt;br/&amp;gt;&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
* Visual Studio 2008 Code Analysis, available in:&lt;br /&gt;
** VSTS 2008 Development Edition (http://msdn.microsoft.com/vsts2008/products/bb933752.aspx) and &lt;br /&gt;
** VSTS 2008 Team Suite (http://msdn.microsoft.com/vsts2008/products/bb933735.aspx)&lt;br /&gt;
* Visual Studio 2005 Code Analyzer, available in:&lt;br /&gt;
** Visual Studio 2005 Team Edition for Software Developers  (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
** Visual Studio 2005 Team Suite (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
* Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&lt;br /&gt;
* FxCop:&lt;br /&gt;
** (blog) http://blogs.msdn.com/fxcop/&lt;br /&gt;
** (download) http://code.msdn.microsoft.com/codeanalysis&lt;br /&gt;
* Microsoft internal tools you can't have yet:&lt;br /&gt;
** http://www.microsoft.com/windows/cse/pa_projects.mspx &lt;br /&gt;
** http://research.microsoft.com/Pex/ &lt;br /&gt;
** http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
SSL Labs - https://www.ssllabs.com/ssldb/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Analytics seo - http://www.analyticsseo.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector - http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95175</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95175"/>
				<updated>2010-12-04T00:22:47Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Added JbroFuzz, J-Baah, ZAP, and Andiparos /* HTTP proxying / editing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP LiveCD]&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Security Dojo - http://dojo.mavensecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samurai WTF - http://samurai.inguardians.com&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
moth - http://www.bonsai-sec.com/en/research/moth.php&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP Broken Web Applications - http://code.google.com/p/owaspbwa/&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/us/resources-free-tools.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Updated HackmeBank - http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google’s web application training - http://jarlsberg.appspot.com/part1/ &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros fork #1: Zed Attack Proxy (ZAP) - http://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros fork #2: Andiparos - http://code.google.com/p/andiparos/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://www.owasp.org/index.php/JBroFuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
J-Baah - http://www.sensepost.com/labs/tools/pentest/j-baah&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Ratproxy - http://code.google.com/p/ratproxy/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
EnDe - http://www.owasp.org/index.php/Category:OWASP_EnDe&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
Websecurify - http://www.websecurify.com&amp;lt;br/&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox and Hacking Addons Bundled: Portable Firefox with web hacking addons bundled&lt;br /&gt;
- http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
WebPageFingerprint - Light-weight Greasemonkey Fuzzer - http://userscripts.org/scripts/show/30285&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP Defensive Tools==&lt;br /&gt;
&lt;br /&gt;
PHPInfoSec - Check phpinfo configuration for security - http://phpsec.org/projects/phpsecinfo/&lt;br /&gt;
&lt;br /&gt;
A Greasemonkey Replacement can be found at http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Php-Brute-Force-Attack Detector - Detect your web servers being scanned by brute force tools such as WFuzz, OWASP DirBuster and vulnerability scanners such as Nessus, Nikto, Acunetix ..etc. &lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/php_brute_force_detect.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHP-Login-Info-Checker - Strictly enforce admins/users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page via url loginfo_checker.php?testlic&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/loginfo_checkerv0.1.zip&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phploginfo_checker_demo.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
php-DDOS-Shield - A tricky script to prevent idiot distributed bots which discontinue their flooding attacks by identifying HTTP 503 header code. http://code.google.com/p/ddos-shield/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHPMySpamFIGHTER - http://yehg.net/lab/pr0js/files.php/phpmyspamfighter.zip&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phpMySpamFighter_demo.rar&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.codeplex.com/WebserviceStudio&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
Yasca: A highly extensible source code analysis framework; incorporates several analysis tools into one package. http://www.yasca.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
LAPSE - http://suif.stanford.edu/~livshits/work/lapse/ &amp;lt;br/&amp;gt;&lt;br /&gt;
CodePro Analytix - http://code.google.com/webtoolkit/tools/codepro/doc/index.html&amp;lt;br/&amp;gt;&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
* Visual Studio 2008 Code Analysis, available in:&lt;br /&gt;
** VSTS 2008 Development Edition (http://msdn.microsoft.com/vsts2008/products/bb933752.aspx) and &lt;br /&gt;
** VSTS 2008 Team Suite (http://msdn.microsoft.com/vsts2008/products/bb933735.aspx)&lt;br /&gt;
* Visual Studio 2005 Code Analyzer, available in:&lt;br /&gt;
** Visual Studio 2005 Team Edition for Software Developers  (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
** Visual Studio 2005 Team Suite (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
* Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&lt;br /&gt;
* FxCop:&lt;br /&gt;
** (blog) http://blogs.msdn.com/fxcop/&lt;br /&gt;
** (download) http://code.msdn.microsoft.com/codeanalysis&lt;br /&gt;
* Microsoft internal tools you can't have yet:&lt;br /&gt;
** http://www.microsoft.com/windows/cse/pa_projects.mspx &lt;br /&gt;
** http://research.microsoft.com/Pex/ &lt;br /&gt;
** http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
SSL Labs - https://www.ssllabs.com/ssldb/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Analytics seo - http://www.analyticsseo.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector - http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95170</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95170"/>
				<updated>2010-12-04T00:10:32Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Change moth to more descriptive link/* LiveCDs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP LiveCD]&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Security Dojo - http://dojo.mavensecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samurai WTF - http://samurai.inguardians.com&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
moth - http://www.bonsai-sec.com/en/research/moth.php&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP Broken Web Applications - http://code.google.com/p/owaspbwa/&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/us/resources-free-tools.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Updated HackmeBank - http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google’s web application training - http://jarlsberg.appspot.com/part1/ &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Ratproxy - http://code.google.com/p/ratproxy/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
EnDe - http://www.owasp.org/index.php/Category:OWASP_EnDe&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
Websecurify - http://www.websecurify.com&amp;lt;br/&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox and Hacking Addons Bundled: Portable Firefox with web hacking addons bundled&lt;br /&gt;
- http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
WebPageFingerprint - Light-weight Greasemonkey Fuzzer - http://userscripts.org/scripts/show/30285&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP Defensive Tools==&lt;br /&gt;
&lt;br /&gt;
PHPInfoSec - Check phpinfo configuration for security - http://phpsec.org/projects/phpsecinfo/&lt;br /&gt;
&lt;br /&gt;
A Greasemonkey Replacement can be found at http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Php-Brute-Force-Attack Detector - Detect your web servers being scanned by brute force tools such as WFuzz, OWASP DirBuster and vulnerability scanners such as Nessus, Nikto, Acunetix ..etc. &lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/php_brute_force_detect.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHP-Login-Info-Checker - Strictly enforce admins/users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page via url loginfo_checker.php?testlic&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/loginfo_checkerv0.1.zip&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phploginfo_checker_demo.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
php-DDOS-Shield - A tricky script to prevent idiot distributed bots which discontinue their flooding attacks by identifying HTTP 503 header code. http://code.google.com/p/ddos-shield/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHPMySpamFIGHTER - http://yehg.net/lab/pr0js/files.php/phpmyspamfighter.zip&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phpMySpamFighter_demo.rar&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.codeplex.com/WebserviceStudio&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
Yasca: A highly extensible source code analysis framework; incorporates several analysis tools into one package. http://www.yasca.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
LAPSE - http://suif.stanford.edu/~livshits/work/lapse/ &amp;lt;br/&amp;gt;&lt;br /&gt;
CodePro Analytix - http://code.google.com/webtoolkit/tools/codepro/doc/index.html&amp;lt;br/&amp;gt;&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
* Visual Studio 2008 Code Analysis, available in:&lt;br /&gt;
** VSTS 2008 Development Edition (http://msdn.microsoft.com/vsts2008/products/bb933752.aspx) and &lt;br /&gt;
** VSTS 2008 Team Suite (http://msdn.microsoft.com/vsts2008/products/bb933735.aspx)&lt;br /&gt;
* Visual Studio 2005 Code Analyzer, available in:&lt;br /&gt;
** Visual Studio 2005 Team Edition for Software Developers  (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
** Visual Studio 2005 Team Suite (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
* Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&lt;br /&gt;
* FxCop:&lt;br /&gt;
** (blog) http://blogs.msdn.com/fxcop/&lt;br /&gt;
** (download) http://code.msdn.microsoft.com/codeanalysis&lt;br /&gt;
* Microsoft internal tools you can't have yet:&lt;br /&gt;
** http://www.microsoft.com/windows/cse/pa_projects.mspx &lt;br /&gt;
** http://research.microsoft.com/Pex/ &lt;br /&gt;
** http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
SSL Labs - https://www.ssllabs.com/ssldb/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Analytics seo - http://www.analyticsseo.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector - http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95168</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=95168"/>
				<updated>2010-12-04T00:08:55Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: Add and clean up livecds /* LiveCDs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP LiveCD]&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Security Dojo - http://dojo.mavensecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samurai WTF - http://samurai.inguardians.com&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
moth - http://sourceforge.net/projects/w3af/files/moth/moth/&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP Broken Web Applications - http://code.google.com/p/owaspbwa/&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/us/resources-free-tools.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Updated HackmeBank - http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google’s web application training - http://jarlsberg.appspot.com/part1/ &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Ratproxy - http://code.google.com/p/ratproxy/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
EnDe - http://www.owasp.org/index.php/Category:OWASP_EnDe&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
Websecurify - http://www.websecurify.com&amp;lt;br/&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox and Hacking Addons Bundled: Portable Firefox with web hacking addons bundled&lt;br /&gt;
- http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
WebPageFingerprint - Light-weight Greasemonkey Fuzzer - http://userscripts.org/scripts/show/30285&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP Defensive Tools==&lt;br /&gt;
&lt;br /&gt;
PHPInfoSec - Check phpinfo configuration for security - http://phpsec.org/projects/phpsecinfo/&lt;br /&gt;
&lt;br /&gt;
A Greasemonkey Replacement can be found at http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Php-Brute-Force-Attack Detector - Detect your web servers being scanned by brute force tools such as WFuzz, OWASP DirBuster and vulnerability scanners such as Nessus, Nikto, Acunetix ..etc. &lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/php_brute_force_detect.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHP-Login-Info-Checker - Strictly enforce admins/users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page via url loginfo_checker.php?testlic&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/loginfo_checkerv0.1.zip&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phploginfo_checker_demo.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
php-DDOS-Shield - A tricky script to prevent idiot distributed bots which discontinue their flooding attacks by identifying HTTP 503 header code. http://code.google.com/p/ddos-shield/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHPMySpamFIGHTER - http://yehg.net/lab/pr0js/files.php/phpmyspamfighter.zip&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phpMySpamFighter_demo.rar&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.codeplex.com/WebserviceStudio&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
Yasca: A highly extensible source code analysis framework; incorporates several analysis tools into one package. http://www.yasca.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
LAPSE - http://suif.stanford.edu/~livshits/work/lapse/ &amp;lt;br/&amp;gt;&lt;br /&gt;
CodePro Analytix - http://code.google.com/webtoolkit/tools/codepro/doc/index.html&amp;lt;br/&amp;gt;&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
* Visual Studio 2008 Code Analysis, available in:&lt;br /&gt;
** VSTS 2008 Development Edition (http://msdn.microsoft.com/vsts2008/products/bb933752.aspx) and &lt;br /&gt;
** VSTS 2008 Team Suite (http://msdn.microsoft.com/vsts2008/products/bb933735.aspx)&lt;br /&gt;
* Visual Studio 2005 Code Analyzer, available in:&lt;br /&gt;
** Visual Studio 2005 Team Edition for Software Developers  (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
** Visual Studio 2005 Team Suite (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
* Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&lt;br /&gt;
* FxCop:&lt;br /&gt;
** (blog) http://blogs.msdn.com/fxcop/&lt;br /&gt;
** (download) http://code.msdn.microsoft.com/codeanalysis&lt;br /&gt;
* Microsoft internal tools you can't have yet:&lt;br /&gt;
** http://www.microsoft.com/windows/cse/pa_projects.mspx &lt;br /&gt;
** http://research.microsoft.com/Pex/ &lt;br /&gt;
** http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
SSL Labs - https://www.ssllabs.com/ssldb/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Analytics seo - http://www.analyticsseo.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector - http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Secure_Web_Application_Framework_Manifesto/Releases/Current/Manifesto&amp;diff=92687</id>
		<title>Projects/OWASP Secure Web Application Framework Manifesto/Releases/Current/Manifesto</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Secure_Web_Application_Framework_Manifesto/Releases/Current/Manifesto&amp;diff=92687"/>
				<updated>2010-11-10T23:18:17Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: /* Requirement Description */  Add benifits of CSP reporting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''Secure Web Application Framework Manifesto''&lt;br /&gt;
&lt;br /&gt;
Authors: Tom Aratyn, Sahba Kazerooni, Patrick Szeto, &amp;amp; Rohit Sethi&lt;br /&gt;
&lt;br /&gt;
Version 0.08&lt;br /&gt;
&lt;br /&gt;
http://www.securitycompass.com&lt;br /&gt;
&lt;br /&gt;
labs@securitycompass.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Mission Statement =&lt;br /&gt;
The Secure Web Application Framework Manifesto is a document detailing a specific set of security requirements for developers of web application frameworks to adhere to. The manifesto centers around the following beliefs:&lt;br /&gt;
&lt;br /&gt;
* Frameworks that are ‘secure by default’ will yield a dramatic reduction in the number of common web application security vulnerabilities.&lt;br /&gt;
* Application security experts should provide, on a regularly basis, updated guidance to framework developers on how to incorporate mechanisms to avoid newly discovered vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
Developers are increasingly relying on scaffolding-based systems like Rails and Django to build applications. The number of web application frameworks, scaffolding or otherwise, is constantly growing and it's becoming increasingly clear that securing these frameworks will be a major boon for the future of secure web applications.&lt;br /&gt;
&lt;br /&gt;
In the words of Jeff Williams, we have plenty of &amp;quot;painkillers&amp;quot; for web application framework developers to follow such as lists of vulnerabilities to avoid. The Security Analysis of Core J2EE Patterns was our first attempt at providing &amp;quot;vitamins&amp;quot; or positive advice to framework developers on what they should do to incorporate security into their design. Recognizing that many developers are gravitating to leveraging web application frameworks, we decided it was time to provide a list of positive features that these frameworks should include.&lt;br /&gt;
&lt;br /&gt;
This &amp;quot;Secure Web Application Framework Manifesto&amp;quot; must, of course, be a living document. At any given point, it should provide a minimum baseline of what a web application framework should include to appeal to security-conscious developers. We contend that if such a web application framework is broadly adopted, it will have far reaching effects into web application security.&lt;br /&gt;
&lt;br /&gt;
Adhering to the manifesto is only a starting point. Developers still can, and surely will, introduce vulnerabilities not covered by the manifesto; especially those pertaining to their core domain such as fine-grained authorization. Secure-by-default frameworks are compliments but not substitutes for developer security awareness. &lt;br /&gt;
&lt;br /&gt;
The Manifesto is not an exhaustive specification. It is designed to provide a minimum standard for frameworks to adhere to in order to facilitate development of secure web applications. Some of these features will come with tradeoffs in performance or usability. Security features should be turned on by default with the option to turn them off explicitly. In some cases, the usability or performance trade-offs may be so great that framework developers will turn the features off by default. Such decisions should be the exception and not the norm.&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
We owe a debt of gratitude to Arshan Dabirsiaghi and the entire OWASP [http://www.owasp.org/index.php/Category:Intrinsic_Security_Working_Group Intrinsic Security Working Group]. The ISWG aims to measure the security of various frameworks – the inverse of the Secure Web Application Framework Manifesto, which aims to provide the measuring stick itself. Although we initially started this manifesto independent of their work, cross referencing their requirements helped us identify gaps in the Manifesto.&lt;br /&gt;
&lt;br /&gt;
Similarly, James Landis was kind enough to provide us with a similar body of work he put together in defining requirements for a secure web application framework. His ideas also helped shape the manifesto.&lt;br /&gt;
&lt;br /&gt;
We also would like to thank the following individuals for their insight and support in creating the manifesto:&lt;br /&gt;
&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Dinis Cruz&lt;br /&gt;
* James McGovern&lt;br /&gt;
* Paco Hope&lt;br /&gt;
* Paul Johnston&lt;br /&gt;
&lt;br /&gt;
= Requirements =&lt;br /&gt;
== Injection Prevention ==&lt;br /&gt;
Confounding data with executable code is the cause of the most pervasive application security problems: Cross Site Scripting (XSS), SQL injection, buffer overflow and several others. The fundamental problem arises when developers can mix user-supplied or user-influenced data, such as HTTP parameters, with static or system-generated code. The resultant data is then executed or otherwise interpreted by a process which can no longer differentiate the code from the data. An obvious example of this principle at work is [http://www.owasp.org/index.php/SQL_Injection SQL injection]. Pseudo code:&lt;br /&gt;
&lt;br /&gt;
 bad_query = &amp;quot;select * from accounts where accountid = '&amp;quot; + user_supplied_value + &amp;quot;'&amp;quot;;&lt;br /&gt;
 DatabaseTool.executeQuery(bad_query);&lt;br /&gt;
&lt;br /&gt;
In this example, the database tool has no way to differentiate which parts of the query variable came from the string literal and which parts came from the user supplied value. Most modern programming languages and development frameworks offer a way around this by offering parameterized queries or prepared statements.&lt;br /&gt;
&lt;br /&gt;
Pseudo code:&lt;br /&gt;
&lt;br /&gt;
 PreparedStatement good_query = &amp;quot;select * from accounts where accountid = ?&amp;quot;;&lt;br /&gt;
 good_query.setParameter(1, user_supplied_value)&lt;br /&gt;
 DatabaseTool.executeParameterizedQuery(good_query);&lt;br /&gt;
&lt;br /&gt;
DatabaseTool has a few ways to protect against the vulnerability in the second example. For example, the tool could pre-compile the string literal and pass the parameters to the database separately. The database is then responsible for not misinterpreting any portion of the user supplied data as SQL code. Such an approach renders SQL injection impossible. &lt;br /&gt;
&lt;br /&gt;
Another approach is to encode unsafe data in a context relevant format. For example: to mitigate against Cross Site Scripting, a secure web application framework could automatically HTML, HTML attribute, cascading style sheet, or JavaScript encode nearly all non alpha-numeric characters depending on the context. The encoding functions in the [http://code.google.com/p/owasp-esapi-java/ OWASP ESAPI project for Java] serve as an excellent reference for this approach. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Tools that Output Data Which is Safe from Interpretation by Browsers ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide tools that take potentially dangerous data, such as user-supplied input, and outputs the data to Hyper Text Markup Language (HTML), Cascading Style Sheet (CSS), or client-side script. The data should be outputted in such a way that all supported web browsers will not interpret the result as including meta-characters for code. In particular, the output should not contain valid HTML markup, CSS code, or client-side script code such as JavaScript. Tag libraries must, by default, employ these tools when outputting user-supplied data.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/XSS Cross Site Scripting (XSS)]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
The most common implementation of this feature is to escape potentially dangerous characters such that they will not be interpreted by the browser as HTML markup, CSS code, or JavaScript. Most implementations use HTML entities, CSS escaping, and JavaScript escaping respectively. &lt;br /&gt;
&lt;br /&gt;
Knowing which form of escaping to use means understanding where the data will be output. The Open Web Application Security Project (OWASP) Enterprise Security Application Programming Interface (ESAPI) for Java project provides multiple [http://owasp-esapi-java.googlecode.com/svn/trunk_doc/2.0-rc5/org/owasp/esapi/Encoder.html encoding functions] and requires the developer to select the correct function depending on context.&lt;br /&gt;
&lt;br /&gt;
If a framework is context aware (i.e. understands whether data will be output to HTML, CSS, or JavaScript) then it can automatically select the correct encoding format. Although not always possible, such functionality is ideally suited for template-based server pages such as ASP, JSP, or PHP. See [http://googleonlinesecurity.blogspot.com/2009/03/reducing-xss-by-way-of-automatic.html Google’s template system]. &lt;br /&gt;
&lt;br /&gt;
An important consideration is which characters to encode versus which characters to leave unencoded. Excessive encoding may mean extra performance and transmission costs, whereas under encoding may mean missing dangerous characters and leaving applications susceptible to attack. Where possible, decide upon a whitelist of valid characters, such as characters within the Unicode Alpha or Numeric classes, and encode all other characters.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In all user manuals, tutorials, demonstration/sample code, and all other documentation, always use these tools to output data to HTML, JavaScript, or CSS. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;The only exception should be for functions that must, by design, output valid HTML markup, JavaScript, CSS – for example, a tag that generates “&amp;lt;b&amp;gt;” and “&amp;lt;/b&amp;gt;” markers to denote bold text.&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Parameterized Query Functionality for SQL Statements ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide tools that allow developers to create static SQL String literals with the ability to bind parameters at runtime. This functionality is commonly referred to as Parameterized Queries or Prepared Statements. Databases must not interpret bound parameters as valid SQL escape sequences, such as an apostrophe to delimit a string. Note that that term “parameterized ''query''” does not just refer to Select statements, it also refers to other common SQL statements, such as Insert, Update, and Delete&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/SQL_Injection SQL injection] &lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Two common implementations include:&lt;br /&gt;
* Pre-compiling the string literal and transmitting the parameters to the database separately. The database is then responsible for maintaining a distinction between the SQL statement and the parameters&lt;br /&gt;
&lt;br /&gt;
* Contextual escaping, similar to the defense described in “3.1.1Data Which is Safe from Interpretation by Browsers”. Note that any such escaping should account for different possible encoding formats of the underlying database&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In all user manuals, tutorials, demonstration '''always '''use parameterized queries; '''never '''use dynamic statements consisting of dynamically concatenated string literals and parameters.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Tools that Output Data Which is Safe from Interpretation by XML Processors ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide tools that take potentially dangerous data, such as user-supplied input, and outputs the data to XML. The data should be outputted in such a way that an XML validator, parser, or other processor will not interpret the result as including meta-characters for XML code. In particular, the output should not contain XML element, XML attribute, XML comment, CData, Document Type Definition (DTD), XML Stylesheet, preprocessing, or any other XML tags. &lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Testing_for_XML_Injection_%28OWASP-DV-008%29 XML injection]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
The most common implementation of this feature is to escape potentially dangerous characters using [http://www.xml.com/pub/a/2001/01/31/qanda.html XML entities] and / or [http://www.w3.org/TR/2004/REC-xml-20040204/ numeric character reference]. Unlike “3.1.1Data Which is Safe from Interpretation by Browsers”, this requirement applies to a single output type, and does not encompass the same complexities associated with Cross Site Scripting mitigation. See the Open Web Application Security Project (OWASP) Enterprise Security Application Programming Interface (ESAPI) for Java project provides an example of [http://owasp-esapi-java.googlecode.com/svn/trunk_doc/2.0-rc5/org/owasp/esapi/Encoder.html XML encoding].&lt;br /&gt;
&lt;br /&gt;
An important consideration is which characters to encode versus which characters to leave unencoded. Excessive encoding may mean extra performance and transmission costs, whereas under encoding may mean missing dangerous characters and leaving applications susceptible to attack. Where possible, decide upon a whitelist of valid characters, such as characters within the Unicode Alpha or Numeric classes, and encode all other characters.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In all user manuals, tutorials, demonstration/sample code, and all other documentation, always use these tools to output data to XML. &lt;br /&gt;
&lt;br /&gt;
Pseudo code:&lt;br /&gt;
&lt;br /&gt;
 xmlText = &amp;lt;nowiki&amp;gt;“&amp;lt;element&amp;gt;” + SafeXMLFunction(userParameter) + “&amp;lt;/element&amp;gt;”&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The only exception should be for functions that must, by design, output valid XML tags – for example, a function that generates standard Simple Object Access Protocol (SOAP) element tags.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Parameterized Query Functionality for XPath Statements ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide tools that allow developers to create static XPath String literals with the ability to bind parameters at runtime, similar to Parameterized Queries for SQL. XPath engines must not interpret bound parameters as valid XML escape sequences, such as an apostrophe to delimit a string. &lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/XPATH_Injection XPath injection]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
As with SQL Parameterized Queries, two possible implementations include:&lt;br /&gt;
&lt;br /&gt;
•Pre-compiling the string literal and transmitting the parameters to the XPath engine separately. The XPath engine is then responsible for maintaining a distinction between the XPath statement and the parameters (see [http://blogs.msdn.com/shjin/archive/2005/07/25/443077.aspx this article]&amp;lt;nowiki&amp;gt; from the Microsoft Developer Network [MSDN])&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
•Contextual escaping, similar to the defense described in “3.1.1Provide Tools that Output Data Which is Safe from Interpretation by Browsers”. Note that any such escaping should account for different possible encoding formats of the underlying database&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In all user manuals, tutorials, demonstration/sample code, and all other documentation, always use these tools to perform XPath queries. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Parameterized Query Functionality for LDAP Statements ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide tools that allow developers to create static Lightweight Directory Access Protocol (LDAP) String literals with the ability to bind parameters at runtime, similar to Parameterized Queries for SQL. LDAP directories must not interpret bound parameters as valid LDAP escape sequences, such as an asterisk to denote a wildcard character . &lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/LDAP_injection LDAP injection]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
As with SQL Parameterized Queries, two possible implementations include:&lt;br /&gt;
&lt;br /&gt;
•Pre-compiling the string literal and transmitting the parameters to the LDAP directory separately. The LDAP engine is then responsible for maintaining a distinction between the LDAP Path statement and the parameters&lt;br /&gt;
&lt;br /&gt;
•Contextual escaping, similar to the defense described in “3.1.1Provide Tools that Output Data Which is Safe from Interpretation by Browsers”. Note that any such escaping should account for different possible encoding formats of the underlying database&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In all user manuals, tutorials, demonstration/sample code, and all other documentation, always use these tools to perform LDAP queries. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Disallow Newline Characters from Untrusted Data in HTTP Response Headers  ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
For all functions that can modify HTTP response headers, such as a redirect function or the “Set-Cookie” header, disallow newline characters in potentially un-trusted parameters. For example, disallow newline characters inside of a cookie value or URL for a redirect. &lt;br /&gt;
&lt;br /&gt;
Note that the term disallow is purposefully undefined; framework developers should use the best approach to match their needs, such as:&lt;br /&gt;
&lt;br /&gt;
* Strip newline characters out&lt;br /&gt;
** Note that whenever stripping a potentially malicious character, ensure the resuling string is also free from dangerous characters. For example “%%0A0A” would still result in a URL encoded newline character if the “%0A” was stripped out once.&lt;br /&gt;
* Cause an error condition&lt;br /&gt;
* Replace newline characters with a safe equivalent, such as the literal string “\n” or ”\r”&lt;br /&gt;
&lt;br /&gt;
Common functions that can modify HTTP response headers include:&lt;br /&gt;
&lt;br /&gt;
* Setting HTTP status code&lt;br /&gt;
* Setting URL for a redirect&lt;br /&gt;
* Setting cookie name, value, path, secure flag, HttpOnly flag, or expiry&lt;br /&gt;
&lt;br /&gt;
Framework developers may wish to provide an option to turn this functionality off for compatibility, performance, or other reasons; however, it must be turned on by default for new applications. Store this configuration setting in a centralized, auditable security settings file.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/HTTP_Response_Splitting HTTP response splitting]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Use a regular expression to replace carriage returns and line feeds with safe equivalents; namely, the string literals “\n” and “\r”.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
State that affected methods may not work as intended if users intentionally supply newline characters into HTTP response splitting. Indicate that solution addresses Http Response Splitting and, if appropriate, describe how to turn the feature off along with an appropriate warning of the resultant risk.&lt;br /&gt;
&lt;br /&gt;
=== Provide Option to Disallow Newline Characters in Text File Logging  ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide an option in logging functionality to automatically disallow writing newline characters in text file-based logs. Modifying all log statements may incur significant overhead, thus this requirement is an option rather than a default setting. Store this configuration setting in a centralized, auditable security settings file.&lt;br /&gt;
&lt;br /&gt;
For HTML-based logging use the tools described in “3.1.1Provide Tools that Output Data Which is Safe from Interpretation by Browsers”. For XML-based logging use the tools described in “3.1.3 Data Which is Safe from Interpretation by XML Processors”.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Log_injection Log injection]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Use a regular expression to replace carriage returns and line feeds with safe equivalents; namely, the string literals “\n” and “\r”.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Provide clear instructions on how to modify this setting, as well as the security implications of keeping the default value as turned off.&lt;br /&gt;
&lt;br /&gt;
== Input Validation ==&lt;br /&gt;
=== Provide Configurable Validation for All Forms of User-Supplied Input ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide a mechanism to validate the content of all user-supplied input without directly modifying other application code. For example, provide a configuration file that allows users to supply regular expressions to validate HTTP parameters for any page. &lt;br /&gt;
&lt;br /&gt;
The types of input to validate must include, at a minimum:&lt;br /&gt;
&lt;br /&gt;
* HTTP request parameter names&lt;br /&gt;
* HTTP request parameter values&lt;br /&gt;
* HTTP request header names&lt;br /&gt;
* HTTP request header values&lt;br /&gt;
* URLs&lt;br /&gt;
* Cookie names&lt;br /&gt;
* Cookie values&lt;br /&gt;
* SQL statement results&lt;br /&gt;
* Input from a proprietary format, such as Flash Action Message Format &lt;br /&gt;
* Remotely accessible Application Program Interfaces (APIs), such as Simple Object Access Protocol (SOAP) or Representational State Transfer (REST) endpoints&lt;br /&gt;
&lt;br /&gt;
Where possible, store the validation configurations setting in a centralized, standard location. Ideally, developers / administrators should be able to make changes to validation logic during application deployment rather than requiring a rebuild. &lt;br /&gt;
&lt;br /&gt;
Optionally, provide a tool that allows security auditors to easily determine which forms of input the application is currently validating through the validation engine. &lt;br /&gt;
&lt;br /&gt;
Optionally, provide sample regular expressions useful for whitelist validation of common data types such as phone numbers, zip codes, etc.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement is part of a defense in depth strategy. Although providing configurable validation does not, in itself, mitigate specific vulnerabilities it does help provide defense in depth. Input validation is particularly useful as additional defense for injection attacks, such as:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/XSS Cross site scripting (XSS)]&lt;br /&gt;
* [http://www.owasp.org/index.php/SQL_Injection SQL injection] &lt;br /&gt;
* [http://www.owasp.org/index.php/Testing_for_XML_Injection_%28OWASP-DV-008%29 XML injection]&lt;br /&gt;
* [http://www.owasp.org/index.php/XPATH_Injection XPath injection]&lt;br /&gt;
* [http://www.owasp.org/index.php/LDAP_injection LDAP injection]&lt;br /&gt;
* [http://www.owasp.org/index.php/HTTP_Response_Splitting HTTP response splitting]&lt;br /&gt;
* [http://www.owasp.org/index.php/Log_injection Log injection]&lt;br /&gt;
&lt;br /&gt;
In addition, input validation can help against undiscovered input / injection attacks as well as attacks on downstream systems.&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Use a configuration file similar to the [http://struts.apache.org/1.2.4/userGuide/dev_validator.html Apache Struts Validator] plug-in. Note that the Validator plugin only provides input validation for form fields; a secure framework should provide a similar mechanism for ''all'' forms of user-supplied input.&lt;br /&gt;
&lt;br /&gt;
The architecture of the validation configuration should follow the default application architecture. For example, if the default application uses a single HTML page with many different command parameters to represent different transactions, then the validation framework should allow developers to specify different validation for different commands – distinguishing the “command=” parameter from other parameters.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Demonstrate examples of the validation logic as part of normal application development. Include validation examples in user manuals, tutorials, demonstration/sample code, and all other documentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Use Whitelist Validation for File Paths and Names in File Handling Functionality ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
For each supported operating system, only allow legal characters in the file paths and file names in the file handling functionality such as open and save. Disallow, for example, null characters. This functionality is particularly important since file handling often relies on lower-level operating system commands. Strings in operating system functions may be null-terminated even if framework strings are not null-terminated.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Top_10_2007-Insecure_Direct_Object_Reference Insecure direct object reference]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document how this feature works, what impact it may have on file handling, and how to turn it off along with an appropriate warning of the resultant risk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Specify an Encoding Format for Every HTTP Response Page ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Assign a consistent encoding format such as UTF-8 to all HTTP response pages unless there is a specific reason to use a different format. Allow developers to define the default encoding format.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/XSS Cross site scripting (XSS)]&lt;br /&gt;
** [http://www.juniper.net/security/auto/vulnerabilities/vuln34917.html Obscure cross-site scripting vectors]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Django provides a [http://code.djangoproject.com/wiki/StringEncoding configuration option] for default character set.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document how this feature works, what impact it may have on internationalization, and how to turn it off along with an appropriate warning of the resultant risk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Do Not Accept Characters with Illegal Byte Sequences or Overly Long Forms for a Given Encoding ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Overly long and malformed characters in variable length encoding formats such as UTF-8 can be used to bypass filters and may sometimes be translated to the proper format after sanitization by a different component or application. Only accept legal character sequences.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://capec.mitre.org/data/definitions/80.html Filter bypass]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
The W3C provides a [http://www.w3.org/International/questions/qa-forms-utf-8.en.php regular expression] to validate UTF-8 characters.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In reference documentation describe that this feature exists.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Function to Detect HTTP Parameter Tampering ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
In some cases end users should not be able to modify certain parameters, such as some hidden form fields. Provide a server-side mechanism that detects tampering of “read-only” parameters without the overhead of storing these parameters on the server.&lt;br /&gt;
&lt;br /&gt;
The framework will not necessarily know about ''all ''read-only parameters; however, the framework should be able to automatically identify ''some ''read-only parameters (e.g. hidden form fields with static values), and allow individual developers to identify other read-only parameters. If applied transparently, this feature may break functionality, so provide options to turn the feature on for specific forms or across the application.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Web_Parameter_Tampering Parameter Manipulation]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
The .Net framework provides a defense in the form of an [http://en.wikipedia.org/wiki/HMAC HMAC] for [http://msdn.microsoft.com/en-us/library/bb386448.aspx ViewState]. The HMAC solution:&lt;br /&gt;
&lt;br /&gt;
* Takes a hash of read-only fields in a form prior to sending them to the client&lt;br /&gt;
* Encrypts that hash with a secret key stored on the server&lt;br /&gt;
* Adds the hashed and encrypted value as an additional hidden field in the form&lt;br /&gt;
* Upon form submission, rehashes and re-encrypts the read only client-supplied parameters and compares the hash with the client-supplied HMAC parameter. Any difference indicates that one or more of the read only parameters were tampered with&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Provide detailed documentation on how to enable this feature and how it works. Include (if applicable) how the framework creates and stores cryptographic keys, how developers can change cryptographic algorithms, and how to configure the feature to work in load balanced environments. Always enable the feature for read-only form fields in samples and tutorials.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automatically Generate Content Security Policy (CSP) Headers ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Mozilla proposed [http://people.mozilla.org/~bsterne/content-security-policy/ CSP] to help protect against Cross Site Scripting. Although CSP, at the time of this writing, is not fully implemented in most browsers, a secure web application framework should proactively provide this control for when CSP becomes standard.&lt;br /&gt;
&lt;br /&gt;
CSP allows developers to specify which domains a web application allows to host its scripts. A browser that complies with CSP will, when instructed to, only run scripts from the whitelisted domains and avoid executing inline or event handling HTML attribute scripts. CSP also helps protect against [http://ha.ckers.org/blog/20080915/clickjacking/ Clickjacking] by specifying “which sites may embed contents from my site”. Finally, CSP provides for an optional report-url to which all policy violations will be reported, allowing detection of attacks and proactive response to protect non-CSP enabled browsers.&lt;br /&gt;
&lt;br /&gt;
Automatically generate CSP headers that restrict script access to the application’s domain and prevent inline / event handling HTML attribute scripts unless necessary. Provide tools to easily extend the list of white-listed domains when required. By default, disallow all other sites from being embedded within the application’s contents unless necessary.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/XSS Cross Site Scripting (XSS)]&lt;br /&gt;
* [http://www.owasp.org/index.php/Clickjacking Clickjacking]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document how this feature works, what impact it may have on embedded scripts, and how to turn it off along with an appropriate warning of the resultant risk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automatically Generate Origin Headers ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Mozilla proposed the [http://people.mozilla.org/~bsterne/content-security-policy/origin-header-proposal.html Origin Header] to protect against Cross Site Request Forgery (CSRF). Supporting clients send information about the originating domain of each request to the server. &lt;br /&gt;
&lt;br /&gt;
Where possible, verify that the origin of a request is from the expected domain. In particular, verify that application form fields originate from the application’s domain. Generate errors for requests with invalid origins.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/CSRF Cross Site Request Forgery]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document how this feature works, what impact it may have on application integration, and how to turn it off along with an appropriate warning of the resultant risk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Specify a Default Maximum Payload Size for All Inbound Interfaces ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Check the size of payloads from all inbound interfaces prior to processing. If the payload size exceeds a default maximum generate an error. Allow developers to change the default size and turn off the feature. &lt;br /&gt;
&lt;br /&gt;
At a minimum, provide payload size checks for:&lt;br /&gt;
&lt;br /&gt;
* HTTP Requests&lt;br /&gt;
** Optionally, provide different configuration for file upload functions to allow for larger payloads&lt;br /&gt;
* &amp;lt;nowiki&amp;gt;XML requests (e.g. Simple Object Access Protocol [SOAP])&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
* &amp;lt;nowiki&amp;gt;Any other programmatic interface (e.g. Remote Method Invocation over Internet Inter-Orb Protocol [RMI IIOP])&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Application_Denial_of_Service Denial of Service]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Web servers often provide a maximum configurable HTTP request body size. See the Apache web server [http://httpd.apache.org/docs/2.0/mod/core.html LimitRequestBody directive].&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document how this feature works, what impact it may have on large payloads, and how to turn it off along with an appropriate warning of the resultant risk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Authentication and Authorization ==&lt;br /&gt;
=== Enforce Default Deny Policy for Framework Managed Authorization ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Some frameworks elect to provide managed authorization services, such as determining whether a user has sufficient privileges to view a specific page. Ensure that managed authorization services always deny access by default unless explicitly instructed otherwise.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.aspectsecurity.com/documents/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf HTTP Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
The [http://static.springsource.org/spring-security/site/docs/3.0.x/reference/authz-arch.html Spring Security authorization] module employs default deny using the [http://static.springsource.org/spring-security/site/docs/3.0.x/reference/authz-arch.html RoleVoter] for role-based access control.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document the default deny behavior when describing the authorization functionality. Provide instructions on how developers can grant access to more users when necessary. If the framework provides a default-accept option, strongly discourage developers from using it and explain the associated risks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Indirect Object Reference Functionality ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide functionality that creates and translates indirect references for a specific file, a set of files, or all files in a particular directory or directories.&lt;br /&gt;
&lt;br /&gt;
Applications often allow users to access sensitive resources such as user-specific files from the application server. Direct object references use the actual file name (e.g. “file=statement1.pdf”) whereas indirect object references provide an independent identifier that the application later translates into an actual filename (e.g. “file=a”, where ‘a’ later translates to statement1.pdf).The problem with the former method is that attackers can sometimes access files that they shouldn’t (e.g. “file=../config.xml”). An indirect object reference renders such an attack impossible because the application only provides access to a specified set of files (e.g. all files in a particular directory, or a predefind list of individual files). Unfortunately, the complexity of creating an indirect object reference for each file that is to be accessed by the end user means that many developers end up favoring direct object references. Providing functionality to automate this task incentivizes developers to rely on indirect object references.&lt;br /&gt;
&lt;br /&gt;
Note that this control applies specifically to resources that require access control. Publicly-accessible static content such as JavaScript or Cascading Style Sheet files that are normally stored on web servers do not necessarily need this protection. On web servers, use operating system or server controls to prevent forcible [http://www.owasp.org/index.php/Path_Traversal Path Traversal] attacks.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Top_10_2007-Insecure_Direct_Object_Reference Insecure Direct Object Reference]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
See the [http://owasp-esapi-java.googlecode.com/svn/trunk_doc/org/owasp/esapi/reference/IntegerAccessReferenceMap.html ESAPI Java AccessReferenceMap] and [http://support.microsoft.com/kb/910442 .Net’s Web Resource mechanism] for examples of this functionality.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In all user manuals, tutorials, demonstration/sample code, and all other documentation, always use these tools for accessing server-side files except for publicly-accessible static content (e.g. common JavaScript libraries). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide a Function That Hashes and Salts Input with Random Bytes ===&lt;br /&gt;
Provide all the functionality necessary for a developer to implement secure authentication. In particular, authentication should use a secure hashing algorithm salted with a fixed length random byte sequence (see). Both the hashing algorithm and salt length should be configurable in case a particular hashing function is defeated in the future. Secure web application frameworks should default to stronger, slower hashing algorithms (e.g. SHA-2) instead of fast algorithms (e.g. MD5 and SHA-1) to mitigate the risk of off-line brute forcing.&lt;br /&gt;
&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide the following two functions:&lt;br /&gt;
&lt;br /&gt;
# A function that hashes user input using a configurable, strong hashing algorithm (e.g. SHA-2) and adds a configurable-length random salt value&lt;br /&gt;
# A function that checks equality of a plaintext value with a hashed, salted value derived from function 1)&lt;br /&gt;
&lt;br /&gt;
Developers can use these two functions respectively to facilitate securely storing a new password (e.g. new user registration or password reset) and to authenticate a user against a securely stored password.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Rainbow_tables Rainbow tables]&lt;br /&gt;
* [http://www.owasp.org/index.php/Top_10_2007-A8 Insecure cryptographic storage]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
[http://www.jasypt.org/encrypting-passwords.html Jasypt] exposes passwordEncryptor.encryptPassword() for function 1) and passwordEncryptor.checkPassword for function 2). See [http://www.jasypt.org/howtoencryptuserpasswords.html this explanation] for details on how Jasypt stores the salt value and uses it for password comparisons.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In all user manuals, tutorials, demonstration/sample code, and all other documentation, always use these functions for new user registration, password change, and password-based authentication.&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
=== Use Cryptographically Secure Random Numbers for Session IDs ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Create session IDs from Cryptogaphically Strong Random Number Generators such as Java’s [http://java.sun.com/j2se/1.4.2/docs/api/java/security/SecureRandom.html SecureRandom] rather than a pseudo random number generator like the [http://www.aquaphoenix.com/ref/gnu_c_library/libc_255.html rand()] function in C.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Insufficient_entropy_in_pseudo-random_number_generator Insufficient entropy in pseudo random number generators]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Tomcat uses [http://tomcat.apache.org/tomcat-6.0-doc/config/manager.html SecureRandom numbers] for Session IDs by default.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Describe how the framework generates session IDs in documentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Automatic Anti-CSRF Tokens ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Many web application frameworks create or render links and pages derived from form submission pages. Provide an option to transparently add and validate [http://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29_Prevention_Cheat_Sheet anti-CSRF tokens] to form submissions where possible. &lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/CSRF Cross Site Request Forgery]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
[http://docs.djangoproject.com/en/dev/ref/contrib/csrf/ Django] provides this functionality optionally.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Where possible, turn this feature on in all user manuals, tutorials, demonstration/sample code, and all other documentation. Explain how the feature works and the risk associated with not using it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automatically Reset Session IDs After Authentication ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Change the Session ID of a user after successful authentication. Note that this feature requires knowledge of when authentication occurs. Such knowledge is trivial in framework-managed authentication but more difficult if developers elect to use custom or third party authentication. Provide a hook for the developer to tell the framework when authentication occurs in cases where the framework can’t make that determination automatically (e.g. user.hasAuthenticated() ). &lt;br /&gt;
&lt;br /&gt;
If developers can associate server-side state with a session then retain that state when the session ID changes.&lt;br /&gt;
&lt;br /&gt;
In some cases, particularly when working with legacy components, changing session IDs after authentication may break functionality. Provide an option to disable this functionality.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Session_Fixation Session fixation] &lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Spring Security has built-in [http://static.springsource.org/spring-security/site/docs/3.0.x/reference/ns-config.html session fixation defense].&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Always keep this functionality enabled on in all user manuals, tutorials, demonstration/sample code, and all other documentation. Explain how the feature works and the risk associated with not using it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Apply HttpOnly Flag to Session ID Cookie by Default ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Append the “[http://www.owasp.org/index.php/Testing_for_cookies_attributes_%28OWASP-SM-002%29 HttpOnly]” flag to session cookies by default, with an option to turn that feature off. &lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/XSS Cross Site Scripting (XSS)]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
The .Net framework provide the ability to add the [http://msdn.microsoft.com/en-us/library/system.web.httpcookie.httponly.aspx HttpOnly] flag to cookie flags, although the feature isn’t enabled by default.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Always keep this functionality enabled on in all user manuals, tutorials, demonstration/sample code, and all other documentation. Explain how the feature works and the risk associated with not using it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Configuration Option to Apply Secure Flag to Session ID Cookie ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Most development frameworks make the default assumption that the application works over plaintext HTTP. In cases where the framework can be sure that the application uses SSL for the entire session (e.g. if the application container has SSL enabled), append the “[http://www.owasp.org/index.php/Testing_for_cookies_attributes_%28OWASP-SM-002%29 secure]” flag to session cookies by default, with an option to turn that feature off. &lt;br /&gt;
&lt;br /&gt;
For cases where the framework cannot be sure that the application uses SSL for the entire session (e.g. a separate hardware device provides SSL and proxies plaintext HTTP to the application server), provide a simple configuration option for developers to add the “[http://www.owasp.org/index.php/Testing_for_cookies_attributes_%28OWASP-SM-002%29 secure]” flag to session cookies.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Session_hijacking_attack Session hijacking]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
The .Net framework provide the ability to add the [http://msdn.microsoft.com/en-us/library/system.web.httpcookie.secure%28v=VS.100%29.aspx secure] flag to cookies, although the feature isn’t enabled by default.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Always keep this functionality enabled on in all user manuals, tutorials, demonstration/sample code, and all other documentation. Explain how the feature works and the risk associated with not using it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Configurable Inactive and Absolute Session Timeouts ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide an option to define both inactive (i.e. after a period of inactivity) and hard/absolute session timeout (i.e. period of time, regardless of amount of activity). Provide default values for both values. Provide an option to turn either or both timeouts.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Session_hijacking_attack Session hijacking]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Java Servlet containers provide [http://tomcat.apache.org/tomcat-5.5-doc/appdev/web.xml.txt configurable inactive timeout] values.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Explain how both features work and the risk associated with not using them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide a Configuration Option to Tie Session IDs to an IP Address, Subnet, or a List of IP Ranges ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Some application developers opt to correlate a session ID to the client’s IP address. After session generation, the application verifies that each request comes from the expected IP address thereby mitigating the risk of session hijacking. Provide an option to seamlessly deliver this functionality.&lt;br /&gt;
&lt;br /&gt;
In practice, session IP correlation on large networks is difficult if not impossible due to a variety of networking features – in particular, proxy servers such as [http://webmaster.info.aol.com/proxyinfo.html AOL proxy]. Provide options to help address this by, for example, allowing developers to specify a subnet length and verifying that each request comes from the same subnet. For example, if a developer configures session subnet correlation with a 24 bit subnet, then the application should permit requests from ''10.1.1''.3 and ''10.1.1''.5 to access the same session but it should not allow requests from ''10.1.2''.3 to access the same session.&lt;br /&gt;
&lt;br /&gt;
To deal with known proxy servers, such as AOL proxy, the framework should also allow developer to specify one or more lists of IP ranges. If a clients IP falls into one of ranges then ensure that all future requests for that same session come from the same list. For example, if one request comes from the set of AOL proxy IPs then all future requests for that session should come the AOL proxy IPs.&lt;br /&gt;
&lt;br /&gt;
Turn this feature off by default. Each application may require considerable time to configure for this feature to work properly.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Session_hijacking_attack Session hijacking]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document how the feature works and how to turn it on. Provide a tutorial or other guidance on how to setup this feature for an application such that it doesn’t break availability. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== XML Specific ==&lt;br /&gt;
=== Disable the Following Unsafe Features by Default ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Over the years, security researchers have discovered several vulnerabilities in XML libraries – particularly [http://projects.webappsec.org/XML-Attribute-Blowup parsers] and [http://msdn.microsoft.com/en-us/magazine/ee335713.aspx validators]. Disallow dangerous functionality be default, namely:&lt;br /&gt;
&lt;br /&gt;
* [http://www.securiteam.com/securitynews/6D0100A5PU.html External entity] resolution&lt;br /&gt;
* DTDs defined [http://www.javacommerce.com/displaypage.jsp?name=dtd.sql&amp;amp;id=18238 internally within XML] files&lt;br /&gt;
* [http://www.w3.org/TR/xml-stylesheet/ XML Stylesheet Language Transforms (XSLTs) processing instructions] within an XML document’s prolog&lt;br /&gt;
* [http://xml.apache.org/xalan-j/extensions.html XSLT extensions] that provide direct access to the operating system, such as Java [http://java.sun.com/j2se/1.4.2/docs/api/java/lang/Runtime.html runtime objects] or .Net [http://msdn.microsoft.com/en-us/library/system.diagnostics.process.aspx System.Diagnostics.Process]&lt;br /&gt;
** Ideally, take a default deny approach to XSLT extensions and only allow known safe extensions with the option to turn on other extensions&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.securiteam.com/securitynews/6D0100A5PU.html External entity attacks]&lt;br /&gt;
* [https://www.isecpartners.com/files/XMLDSIG_Command_Injection.pdf XSLT command injection]&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/magazine/ee335713.aspx XML bombs]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Always have the unsafe features turned off in sample code, unless explicitly necessary. Explain the potential risk of turning any of these features on.&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
=== Provide Tools for Transparent Database Encryption ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide configuration options to seamlessly encrypt columns within a database when the framework handles database interaction. Object Relational Mapping (ORM) libraries in particular should allow developers to configure column-level encryption.&lt;br /&gt;
&lt;br /&gt;
See “Encrypt Passwords and Keys Stored in Configuration Files” for more information on how to protect the encryption key.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Insecure_Storage Insecure cryptographic storage]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
[https://www.hibernate.org/415.html Hibernate in Java] provides seamless, configurable database encryption.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document how the feature works and how to turn it on. Provide a tutorial or other guidance on how to use this feature.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Configurable Cryptographic Algorithms ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Hard-coding specific encryption algorithms and parameters such as key size may leave applications vulnerable to common attacks if a particular algorithm is ever compromised. Allow developers to configure the algorithm and parameters such as key strengths. &lt;br /&gt;
&lt;br /&gt;
Favor modes with secure random Initialization Vectors (IVs) rather than modes without IVs such [http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation as Electronic Code Book (ECB)].&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Insecure_Storage Insecure cryptographic storage]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
See Java’s [http://java.sun.com/j2se/1.5.0/docs/api/java/security/Provider.html security provider architecture].&lt;br /&gt;
&lt;br /&gt;
Developers in non-compiled languages such as PHP, Ruby, and Python often favor scripts written in that programming language rather than static configuration files. Frameworks written in such languages should decouple application code from specific encryption algorithms, either by introducing a static configuration file or calling a utility class (e.g. HashingUtility.hash() rather than SHA2.hash()).&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Clearly explain how to configure cryptographic algorithms. Provide strong default options (such as [http://csrc.nist.gov/groups/ST/toolkit/index.html NIST approved] algorithms and parameters).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow the TLS Protection Cheatsheet for TLS/SSL Implementations ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Attackers have discovered several attacks on TLS/SSL implementations and X509 certificates: [http://www.scanit.be/uploads/ssl%20security%20in%20be%20-%2003-2008.pdf downgrade attacks], [http://extendedsubset.com/?p=8 plaintext injection during renegotiation] [http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf null prefix attacks], [http://www.thoughtcrime.org/papers/ocsp-attack.pdf circumventing Online Certificate Status Protocol (OCSP) controls], and several [http://www.blackhat.com/presentations/bh-usa-09/MARLINSPIKE/BHUSA09-Marlinspike-DefeatSSL-SLIDES.pdf others]. &lt;br /&gt;
&lt;br /&gt;
Reuse libraries that already account for these attacks rather than writing new libraries. Note that some of the attacks, such as [http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf null prefix attacks], are actually attacks against the client; however, these attacks also apply to the server during [http://en.wikipedia.org/wiki/Mutual_authentication mutual authentication].&lt;br /&gt;
&lt;br /&gt;
Providing an exhaustive set of requirements for TLS/SSL is beyond the scope of this manifesto. Consult the [http://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet Transport Layer Protection Cheatsheet] for comprehensive guidance. SSL Labs maintains an [https://www.ssllabs.com/downloads/SSL_Server_Rating_Guide_2009.pdf SSL Server Rating] guide that provides guidelines around certificate type, key size, cipher strength, key exchange algorithm, and protocol. &lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Top_10_2007-Insecure_Communications Insecure communications]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Clearly explain how to configure TLS. Provide specific guidance on how to deploy a server for optimum TLS/SSL security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Configuration Security ==&lt;br /&gt;
=== Encrypt Passwords and Keys Stored in Configuration Files ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Web application frameworks often store plaintext system passwords and keys in configuration files. For example, several frameworks use plaintext configuration files for [http://www.dotnetjohn.com/articles.aspx?articleid=3 database connection strings], [https://www.hibernate.org/415.html database encryption keys], [http://forums.asp.net/p/1086890/1651644.aspx Lightweight Directory Access Protocol (LDAP) connection strings], [http://www.digicert.com/ssl-certificate-installation-tomcat.htm keystore passwords], and other values. Attackers who are able to exploit other vulnerabilities are sometimes able to view the contents of files. &lt;br /&gt;
&lt;br /&gt;
Provide native support for encrypted properties in configuration files. &lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Broken_Authentication_and_Session_Management Broken authentication (plaintext credential storage)]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Developers will always run into the problem of providing some sort of password or key to decrypt encrypted credentials. While no solution is perfect, frameworks can employ one of several password / key storage options:&lt;br /&gt;
&lt;br /&gt;
* Store a private key, unique for each machine, as a binary file that can only be accessed by the application server. While this control succeeds in preventing attackers from viewing plaintext passwords in configuration files, it does not prevent attackers from first accessing the binary key and then the configuration file using the same exploit. This should be the minimum security option. See [http://download.oracle.com/docs/cd/E12840_01/wls/docs103/admin_ref/utils.html Weblogic].&lt;br /&gt;
* Store the decryption key / password in a file, similar to the preceding option. Use operating system controls to ensure that file is only accessible by a separate launching process – not the application server. The launching process can then pass in the key / password as a command line argument when launching the application server. This way, a user who exploits the application server may not necessarily have access to the decryption key itself.&lt;br /&gt;
* Support passphrases from an environment variable and/or web-form. This solution takes more work and possibly manual intervention but greatly decreases the risk of an attacker being able to find plaintext passwords in configuration files. See [http://www.jasypt.org/encrypting-configuration.html Jasypt]&lt;br /&gt;
* Leverage a distributed service, such as the .Net Data Protection API (DPAPI) [http://msdn.microsoft.com/en-us/library/ms998280.aspx User Store] key storage. This restricts key access to a particular user, so other users on the same machine (including local administrators) cannot access that key.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Always use the most secure possible credential storage in all user manuals, tutorials, demonstration/sample code, and all other documentation. Explain how the features work and the risk associated with not using them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== File Upload ==&lt;br /&gt;
=== File Upload Tools Should Supports Pluggable Anti Malware Scanning Solutions ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Framework-managed file upload tools should facilitate safe file uploads by providing configuration options to support for library-based third party anti-virus scanning solutions, such as [http://www.clamav.net/ Clam AV].&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Top_10_2007-Malicious_File_Execution Malicious file execution]&lt;br /&gt;
* [http://www.owasp.org/index.php/Unrestricted_File_Upload Unrestricted file upload]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document how to use the pluggable anti-malware feature. Provide Application Programming Interface (API) details on how third parties can hook into the framework.&lt;br /&gt;
&lt;br /&gt;
=== File Upload Tool Should Provide Options to Disallow Saving Outside of a Specified Directory ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Framework-managed file upload tools should disallow saving a file outside of a configurable specified directory and, optionally, any subdirectories (see the Unix [http://unixwiz.net/techtips/chroot-practices.html chroot] command).&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Unrestricted_File_Upload Unrestricted file upload]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
You may wish to allow developers to specify absolute paths or relative paths to the application’s root. Restrict file upload to a relative path by default (e.g. /app/uploads directory).&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In all user manuals, tutorials, demonstration/sample code, and all other documentation, always use this feature with file upload. Document the risks associated with turning this feature off.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide a File Upload Tool that Supports Pluggable Content Validation  ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Framework-managed file upload tools should facilitate safe file uploads by providing configuration options to support for library-based third party solutions that validate the contents of a particular file type. For example, a PDF validator might ensure that a given file is indeed a PDF and does not contain any executable code or dangerous PDF extensions.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Top_10_2007-Malicious_File_Execution Malicious file execution]&lt;br /&gt;
* [http://www.owasp.org/index.php/Unrestricted_File_Upload Unrestricted file upload]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Document how to use the pluggable validation feature. Provide options to associate different validation libraries for different extensions. Provide Application Programming Interface (API) details on how third parties can hook into the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Miscellaneous ==&lt;br /&gt;
=== Provide Security Specific Logs and Log All Attack Points Specified in AppSensor ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide a security-specific log and turn it on by default. Automatically log potential attacks using all of the attack points documented in the [http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor Project]. &lt;br /&gt;
&lt;br /&gt;
Ensure consistent use of event IDs (e.g. SE5 for source change of IP during session). Developers should be able to log to the security-specific log as well.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/ApplicationLayerIntrustionDetection Insufficient application intrusion detection]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
See the [http://code.google.com/p/appsensor/source/browse/ AppSensor code].&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Explain what the security log is, how it works, how and what to add to it, and the format for log entries. Expose details of the log format so that log analysis / Security Event Manager (SEM) tools can detect potential attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automatically Generate X-Frame-Options Header ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Browsers such as Internet Explorer 8+ support the [http://blogs.msdn.com/ie/archive/2009/01/27/ie8-security-part-vii-clickjacking-defenses.aspx X-FRAME-OPTIONS] header. Automatically set the X-FRAME-OPTIONS value to DENY by default or SAMEORIGIN if the application requires nested frames from within the same application.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sectheory.com/clickjacking.htm Clickjacking]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
In all user manuals, tutorials, demonstration/sample code, and all other documentation, always use this feature. Document the risks associated with turning this feature off or providing an overly broad policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Arithmetic Utilities that Protect Against Integer and Floating Point Overflow and Underflow ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Many programming languages such as Java are vulnerable to Integer and floating point [http://www.javacoffeebreak.com/books/extracts/javanotesv3/c9/s1.html overflow] and underflow. Provide libraries that encapsulate basic arithmetic operations (e..g addition, subtraction, multiplication, division) and throw errors / exceptions upon overflow or underflow conditions. &lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Integer_overflow Numeric overflow]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Always use these encapsulation functions when performing normal arithmetic in all user manuals, tutorials, demonstration/sample code, and all other documentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Provide Support for Pluggable Anti-Automation ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Provide a mechanism for application administrators to make use of third-party anti-automation techniques such as [http://recaptcha.net/captcha.html CAPTCHA] on certain pages. Which type of anti-automation mechanism and the implementation of that technique should be configurable. Provide an Application Programming Interface (API) to allow third party providers to plug-in anti automation into the framework. Using a pluggable architecture will promote loose coupling and allow developers to change anti-automation techniques with minor impact to the rest of the application. Developers should be able to change anti-automation techniques because attackers often find ways to [http://caca.zoy.org/wiki/PWNtcha break anti-automation].&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Brute_force_attack Brute force attacks]&lt;br /&gt;
* [http://www.owasp.org/index.php/Testing_for_user_enumeration_%28OWASP-AT-002%29 User enumeration]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Always use anti-automation for user registration and forgot password in all user manuals, tutorials, demonstration/sample code, and all other documentation. Document how to change the automation provider. Provide Application Programming Interface (API) details on how third parties can hook into the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Return Generic Error Pages by Default ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Generate error pages devoid of application details such as stack traces by default. In order to facilitate troubleshooting, add detailed error messages to an error log and optionally include a reference number to the log in the error page.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
This requirement mitigates the following weaknesses:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Missing_Error_Handling Missing error handling]&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
Developers can implement [http://msdn.microsoft.com/en-us/library/aa479319.aspx generic error pages] in ASP.Net through configuration.&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Always keep this feature turned on in all user manuals, tutorials, demonstration/sample code, and all other documentation. &lt;br /&gt;
&lt;br /&gt;
=== Centralized Security Configuration Options ===&lt;br /&gt;
==== Requirement Description ====&lt;br /&gt;
Many of the requirements in this document require configuration options (e.g. “3.2.1Provide Configurable Validation for All Forms of User-Supplied Input”). Consolidate as many security-relevant configuration options into a single security configuration file. Consolidated security configuration helps facilitate auditing.&lt;br /&gt;
&lt;br /&gt;
==== Relevant Weaknesses ====&lt;br /&gt;
* N/.A&lt;br /&gt;
&lt;br /&gt;
==== Implementation Suggestions ====&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
==== Documentation Suggestion ====&lt;br /&gt;
Describe all security configuration options in documentation.&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=52103</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=52103"/>
				<updated>2009-01-26T16:00:10Z</updated>
		
		<summary type="html">&lt;p&gt;Spinkham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
Monday, January 29, 2007  4:02 PM    828569600 AOC_Labrat-ALPHA-0010.iso - http://www.packetfocus.com/hackos/&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/us/resources-free-tools.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Updated HackmeBank - http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Ratproxy - http://code.google.com/p/ratproxy/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox and Hacking Addons Bundled: Portable Firefox with web hacking addons bundled&lt;br /&gt;
- http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
WebPageFingerprint - Light-weight Greasemonkey Fuzzer - http://userscripts.org/scripts/show/30285&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP Defensive Tools==&lt;br /&gt;
&lt;br /&gt;
PHPInfoSec - Check phpinfo configuration for security - http://phpsec.org/projects/phpsecinfo/&lt;br /&gt;
&lt;br /&gt;
A Greasemonkey Replacement can be found at http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Php-Brute-Force-Attack Detector - Detect your web servers being scanned by brute force tools such as WFuzz, OWASP DirBuster and vulnerability scanners such as Nessus, Nikto, Acunetix ..etc. &lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/php_brute_force_detect.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHP-Login-Info-Checker - Strictly enforce admins/users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page via url loginfo_checker.php?testlic&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/loginfo_checkerv0.1.zip&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phploginfo_checker_demo.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
php-DDOS-Shield - A tricky script to prevent idiot distributed bots which discontinue their flooding attacks by identifying HTTP 503 header code. http://code.google.com/p/ddos-shield/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHPMySpamFIGHTER - http://yehg.net/lab/pr0js/files.php/phpmyspamfighter.zip&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phpMySpamFighter_demo.rar&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.codeplex.com/WebserviceStudio&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
LAPSE - http://suif.stanford.edu/~livshits/work/lapse/ &amp;lt;br/&amp;gt;&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
* Visual Studio 2008 Code Analysis, available in:&lt;br /&gt;
** VSTS 2008 Development Edition (http://msdn.microsoft.com/vsts2008/products/bb933752.aspx) and &lt;br /&gt;
** VSTS 2008 Team Suite (http://msdn.microsoft.com/vsts2008/products/bb933735.aspx)&lt;br /&gt;
* Visual Studio 2005 Code Analyzer, available in:&lt;br /&gt;
** Visual Studio 2005 Team Edition for Software Developers  (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
** Visual Studio 2005 Team Suite (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
* Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&lt;br /&gt;
* FxCop:&lt;br /&gt;
** (blog) http://blogs.msdn.com/fxcop/&lt;br /&gt;
** (download) http://code.msdn.microsoft.com/codeanalysis&lt;br /&gt;
* Microsoft internal tools you can't have yet:&lt;br /&gt;
** http://www.microsoft.com/windows/cse/pa_projects.mspx &lt;br /&gt;
** http://research.microsoft.com/Pex/ &lt;br /&gt;
** http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector - http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Spinkham</name></author>	</entry>

	</feed>