<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Timo.goosen</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Timo.goosen"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Timo.goosen"/>
		<updated>2026-04-05T20:06:56Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CSV_Injection&amp;diff=201000</id>
		<title>CSV Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CSV_Injection&amp;diff=201000"/>
				<updated>2015-09-23T08:04:55Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: Created page with &amp;quot;CSV Excel Macro Injection also known as CEMI.  Many web applications allow the user to download content such as templates for invoices or user settings to a CSV file. Many use...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CSV Excel Macro Injection also known as CEMI.&lt;br /&gt;
&lt;br /&gt;
Many web applications allow the user to download content such as templates for invoices or user settings to a CSV file. Many users choose to open the CSV file in either Excel,Libre Office or Open Office.&lt;br /&gt;
When a web application does not properly validate the contents of the CSV file, it could lead to contents of a cell or many cells being executed.&lt;br /&gt;
&lt;br /&gt;
More info, probably first report of its kind:&lt;br /&gt;
*[https://hackerone.com/reports/72785 CSV Injection Hackerone]&lt;br /&gt;
*[http://www.contextis.com/resources/blog/comma-separated-vulnerabilities/ CSV Vulnerabilities]&lt;br /&gt;
&lt;br /&gt;
This attack exploits the trust of the user in two ways:&lt;br /&gt;
1. The user trusts the site that the content is coming from.&lt;br /&gt;
2. The user assumes that it is only a csv file and that it won't contain functions or macro's and won't care about any warnings from Excel about potential malicious &lt;br /&gt;
functionality in the file.&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=200504</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=200504"/>
				<updated>2015-09-14T07:44:40Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owasp-cpt.jpg|800px|thumb|center| Logo]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen] [mailto:liam.smit@owasp.org Liam Smit]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group Join our meetup group]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
===Join Our Events===&lt;br /&gt;
&lt;br /&gt;
Please join our meetup group if you would like to attend future events:&lt;br /&gt;
It is important to RSVP if you would like to attend, our venue is not very big.&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group]&lt;br /&gt;
&lt;br /&gt;
====Upcoming events====&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup/events/224785079/ OWASP Cape Town Chapter Meetup 9 Sept 2015 - PCI DSS for Everyone]&lt;br /&gt;
&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup/events/223959271/ 12 Aug 2015 - Intro To Metasploit]&lt;br /&gt;
&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup/events/223412637/ 8 July 2015 - Enumeration for Pentesters &amp;amp; Fun CTF After]&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/First_Official_OWASP_Cape_Town_Meeting 7 June 2015 - First Official OWASP Cape Town Meeting]&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
&lt;br /&gt;
Slides from 1st Official OWASP Cape Town Meeting: [https://www.owasp.org/images/c/cd/Owasp-meeting1-17jun2015.pdf 1st Meeting Slides]&lt;br /&gt;
&lt;br /&gt;
Slides from 2nd Meeting [https://www.owasp.org/images/6/6e/Intro_To_Enumeration_FINAL_MAIL_OUT.odp Intro To Enumeration]&lt;br /&gt;
&lt;br /&gt;
Slides Intro To Metasploit [https://www.owasp.org/index.php/File:Intro_To_Metasploit_FINAL.odp Intro To Metasploit]&lt;br /&gt;
&lt;br /&gt;
Slides from PCI DSS Talk [https://docs.google.com/presentation/d/1spHkDjvLA4apqKmIGrKRfNB1cMHWB8nzwjW_A3QzVTs PCI DSS]&lt;br /&gt;
&lt;br /&gt;
== Local Infosec Community ==&lt;br /&gt;
&lt;br /&gt;
=== Conferences ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.bsidescapetown.co.za/ BSIDES Cape Town]&lt;br /&gt;
&lt;br /&gt;
*[https://zacon.org.za ZACON]&lt;br /&gt;
&lt;br /&gt;
=== Community Meetups ===&lt;br /&gt;
*[https://twitter.com/0xC0FFEE_CPT 0xC0FFEE Monthly Hacker Meetup]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=200255</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=200255"/>
				<updated>2015-09-09T11:38:42Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Join Our Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen] [mailto:liam.smit@owasp.org Liam Smit]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group Join our meetup group]&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
===Join Our Events===&lt;br /&gt;
&lt;br /&gt;
Please join our meetup group if you would like to attend future events:&lt;br /&gt;
It is important to RSVP if you would like to attend, our venue is not very big.&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup/events/224785079/ OWASP Cape Town Chapter Meetup 9 Sept 2015]&lt;br /&gt;
&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/First_Official_OWASP_Cape_Town_Meeting First Official OWASP Cape Town Meeting]&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
&lt;br /&gt;
Slides from 1st Official OWASP Cape Town Meeting: [https://www.owasp.org/images/c/cd/Owasp-meeting1-17jun2015.pdf 1st Meeting Slides]&lt;br /&gt;
&lt;br /&gt;
Slides from 2nd Meeting [https://www.owasp.org/images/6/6e/Intro_To_Enumeration_FINAL_MAIL_OUT.odp Intro To Enumeration]&lt;br /&gt;
&lt;br /&gt;
Slides Intro To Metasploit [https://www.owasp.org/index.php/File:Intro_To_Metasploit_FINAL.odp Intro To Metasploit]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Intro_To_Metasploit_FINAL.odp&amp;diff=199080</id>
		<title>File:Intro To Metasploit FINAL.odp</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Intro_To_Metasploit_FINAL.odp&amp;diff=199080"/>
				<updated>2015-08-14T10:22:05Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: 12 Aug 2015 OWASP Cape Town Chapter Meeting Presentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;12 Aug 2015 OWASP Cape Town Chapter Meeting Presentation&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197536</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197536"/>
				<updated>2015-07-17T08:29:49Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Python Security Related Research ==&lt;br /&gt;
This is a list of security related research on python core modules by other researchers.&lt;br /&gt;
&lt;br /&gt;
*[https://media.blackhat.com/bh-us-11/Slaviero/BH_US_11_Slaviero_Sour_Pickles_WP.pdf Sour Pickles Paper Blackhat 2011 Marco Slaviero]&lt;br /&gt;
*[https://media.blackhat.com/bh-us-11/Slaviero/BH_US_11_Slaviero_Sour_Pickles_Slides.pdf Sour Pickles Slides Blackhat 2011]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP Python Security Flyer&lt;br /&gt;
** [https://www.owasp.org/images/2/2b/OWASP_PYSEC_FLYER.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_python_security_project General project]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197496</id>
		<title>OWASP Education Presentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197496"/>
				<updated>2015-07-16T14:31:59Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Chapter Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page provide a commented overview of the OWASP presentations available.&amp;lt;br&amp;gt;&lt;br /&gt;
Please use the last line of the tables as template.&amp;lt;br&amp;gt;&lt;br /&gt;
Presentions can be tracked through:&lt;br /&gt;
* the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]&lt;br /&gt;
* From the chapter pages&lt;br /&gt;
Everybody is encouraged to link the presentations and add their findings on this page !&lt;br /&gt;
There are currently hundreds of presentations all over the OWASP web site. &lt;br /&gt;
If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.&lt;br /&gt;
Feel free to “mine” them and add them to the overview.&lt;br /&gt;
&lt;br /&gt;
== OWASP Education Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Education Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (2015-07-04)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/index.php/Education/Free_Training Free Developer Training]|| Developer AppSec Course by [[Eoin Keary]] and [https://www.owasp.org/index.php/User:Jmanico Jim Manico] || Intermediate || 2014-04-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Winter 2009v1.pptx|OWASP Overview Winter 2009]]|| Updated overview of OWASP || Novice || 2009-12-08&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Programa_de_Educacion_OWASP.ppt|Programa de Educacion OWASP]]|| Una introduccion a OWASP para Universidades y Centros Educativos por Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_Educational_Programme.ppt|OWASP Educational Programme]]|| An introduction to OWASP for Universities &amp;amp; Educational Institutions by Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Summer 2009.pptx|OWASP Overview Summer 2009]]|| Recent overview of OWASP by Jeff Williams || Novice || 2009-08-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Why WebAppSec Matters.ppt|Why WebAppSec Matters]]|| This module explains why security should be considered when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-Intro-2008-portuguese.ppt|OWASP Intro 2008 Portuguese]]|| Este módulo é uma intrudução sobre o projeto OWASP. || Novice || 2008-07-06&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module OWASP Top 10 Introduction and Remedies.ppt|OWASP Top 10 Introduction and Remedies]]|| This module explains the OWASP Top 10 web application vulnerabilities as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Embed within SDLC.ppt|Embed within SDLC]]|| This module explains the complete approach of Web Application Security when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good Secure Development Practices.ppt|Good Secure Development Practices]]|| This module explains some good secure development practices when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Testing for Vulnerabilities.ppt|Testing for Vulnerabilities]]|| This module explains application security testing when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good WebAppSec Resources.ppt|Good WebAppSec Resources]]|| This module points you to some good web application security resources when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
,&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Project Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Germany 2008 Conference OWASP Introduction v1.pptx|OWASP Introduction]] || OWASP Overview presentation covering OWASP, project parade and OWASP near you. Given by Seba during the Germany 2008 Conference || Novice || 2008-11-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 1.ppt|India08 Keynote - Part 1]] || OWASP Overview presentation. Part 1 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 2.ppt|India08 Keynote - Part 2]] || OWASP Overview presentation. Part 2 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP India - Tour of OWASP projects.ppt|Tour of OWASP’s projects]] || Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/images/5/59/RISK_2008_OWASP_Introduction_v1.pptx OWASP @ RISK08 (Norway)] || OWASP introduction at Norway RISK2008 conference by Seba || Novice || 2008-04-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP NY Keynote.ppt|OWASP NY Keynote by Jeff]] also available in [[:Image:20070620-FR-OWASP NY Keynote.ppt|French]]|| OWASP Overview presentation with slide &amp;quot;OWASP by the numbers&amp;quot; and slide with the sorry state of Tools (at best 45%) which caused some controverse || Novice || 2007-06-12&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 2007-01-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/e/e9/OWASP_Testing_Guide_Presentation_EUSecWest07.zip The OWASP Testing Guide v2 EUSecWest07 (Matteo Meucci, Alberto Revelli)] || Presentation at EUSecWest07 || Intermediate || 2007-03-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3c/OWASP_Flyer_Sep06.ppt OWASP Project Overview] || High level overview of projects and how OWASP works || Novice || 2006-09-19 &lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/4/49/OWASPAppSec2006Seattle_Security_Metrics.ppt The OWASP Application Security Metrics Project (Bob Austin)] || Presentation on the Application Security Metrics project || Novice || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/53/OWASPAppSecEU2006_CLASP_Project.ppt OWASP CLASP Project (Pravir Chandra)] || OWASP CLASP project presentation given at the 2006 European AppSec conference || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/30/OWASPAppSec2006Seattle_UsingSprajaxToTestAJAXSecurity.ppt Sprajax (Dan Cornell)] || OWASP Sprajax presentation given at the 2006 Seattle AppSec conference || Intermediate || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Conference Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Conference Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; | Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; | Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; | Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ModSecurityCoreRuleSet.ppt | Mod Security Core Rule Set (Ofer Shezaf)]] ||Ofer Shezaf's presentation on the Core Ruleset for the latest version of ModSecurity presented at 6th OWASP AppSec conference in Milan, Italy, in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPTestingGuide2v1.ppt | OWASP Testing Guide v2.1 (Matteo Meucci)]] ||Matteo Meucci's presentation on the OWASP Testing Guide v2 at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan CLASP.ppt | CLASP (Pravir Chandra)]] ||Pravir Chandra's presentation on the upcoming 2007 update to CLASP presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan AdvancedWebHacking.ppt | Advanced Web Hacking (PDP)]] ||PDPs presentation at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan XMLSecurityGatewayEvalCriteria.ppt | XML Security Gateway Evaluation Criteria (Gunnar Peterson)]] ||Gunnar Peterson's presentation about the new XML Security Gateway Evaluation Criteria project at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan TestingFlashApplications.ppt | Testing Flash Applications (Stephano Di Paolo)]] ||Stephano Di Paolo's presentation on how to test Flash applications presented at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert|| 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OvertakingGoogleDesktop.ppt | Overtaking Google Desktop (Yair Amit)]] ||Yair Amit's presentation on XSS Flaws in Google Desktop that can be exploited through google.com presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan MS ACETeamAppSecfromTheCore.ppt | ACE Team Application Security from the Core (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the Microsoft ACE team's application security process at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan Pantera.ppt | Pantera (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the new OWASP tool Pantera at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ProtectingWebAppsfromUniversalPDFXSS.ppt | Protecting Web applications from universal PDF XSS (Ivan Ristic)]] ||Ivan Ristic's Universal XSS PDF presentation at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SoftwareSecurity.ppt | Software Security (Rudolph Araujo)]] ||Rudolph Araujo's presentation on Application Security best practices at the 6th OWASP AppSec conference in Milan Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebGoatv5.ppt | WebGoat v5 (Dave Wichers)]] ||WebGoat v5 presentation by Dave Wichers at the 6th OWASP AppSec Conference in Milan, Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebScarabNG.ppt | WebScarab NG (Dave Wichers)]] ||Description of the new WebScarab-NG efforts presented by Dave Wichers at the 6th OWASP AppSec conference in Milan, Italy in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SANS SPSA Initiative.ppt | SANS SPSA Initiative (Dave Wichers)]] ||Description of the SANS Secure Coding Exam Initiative presented by Dave Wichers at the 6th OWASP AppSec conference in Milan Italy, May 2007.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPItalyActivities.ppt | OWASP Italy Activities (Raoul Chiesa)]] ||Raoul Chiesa's keynote for day 2 of the 6th OWASP AppSec conference on the state of application security in Italy including OWASP's activities in that country.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SecurityEngineeringInVista.ppt | Security engineering in Vista (Alex Lucas)]] ||Alex Lucas' from Microsoft's keynote presentation for Day 1 of the 6th OWASP AppSec conference in Milan on the benefits of Microsoft's SDL to the security of Vista. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/5f/OWASPAppSec2006Seattle_SecurityEngineeringInVista.ppt How the Security Development Lifecycle(SDL) Improved Windows Vista (Michael Howard)] || Michael Howard's talk on SDL from the OWASP Seattle AppSec Conference in 2006 || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/34/OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping the Application Assurance Process (Sebastien Deleersnyder)] || Presentation given during the European 2006 AppSec conference on the application assurance process || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8b/OWASPAppSecEU2006_InlineApproachforSecureSOAPRequests.ppt Inline Approach for Secure SOAP Requests and Early Validation (Mohammad Ashiqur Rahaman, Maartin Rits and Andreas Schaad SAP Research, Sophia Antipolis, France)] || Presentation given at the European 2006 AppSec conference about security and soap message structure issues || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/9c/OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls:When Are They Useful? (Ivan Ristic)] || Presentation about Web Application Firewalls || Novice || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/1a/OWASPAppSecEU2006_HTTPMessageSplittingSmugglingEtc.ppt HTTP Message Splitting, Smuggling and Other Animals (Amit Klein)] || A presentation about Message splitting other attacks around the HTTP protocol || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/OWASPAppSec2006Seattle_WebAppForensics.ppt Web Application Incident Response &amp;amp; Forensics: A Whole New Ball Game! (Rohyt Belani &amp;amp; Chuck Willis)] || Talk about Web Application Security incident handling and forensics given at the OWASP 2006 Seattle AppSec conference || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/d/d2/OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10.ppt Can (Automated) Testing Tools Really Find the OWASP Top 10? (Erwin Geirnaert) ] || A talk about how automated testing tools stack up against the OWASP top 10 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/28/OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding (Martin Johns / Justus Winter)] || Presentation given about how Sessions can be hi-jacked, etc... || Novice  || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/62/OWASPAppSecEU2006_SecurityTestingthruAutomatedSWTests.ppt Security Testing through Automated Software Tests (Stephen de Vries)] || Presentation given at the 2006 EuSec conference || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/0e/AppSec2005DC-Jeremy_Poteet-In_the_Line_of_Fire.ppt In the Line of Fire: Defending Highly Visible Targets (Jeremy Poteet)] || Conference given at the 2005 DC AppSec conference || Novice || 2005-10-1&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/93/AppSec2005DC-Matt_Fisher-Google_Hacking_and_Worms.ppt Google Hacking and Web Application Worms (Matt Fisher)] || Talk given at the 2005 DC AppSec conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/05/AppSec2005DC-Anthony_Canike-Enterprise_AppSec_Program.ppt Establishing an Enterprise Application Security Program (Tony Canike)] || Talk given at the 2005 DC AppSec Conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://owasp.org/images/0/0d/OWASPAppSec2006Seattle_Why_AJAX_Applications_More_Likely_Insecure.ppt Why AJAX Applications Are Far More Likely To Be Insecure (And What To Do About It) (Dave Wichers)] || Dave's talk on AJAX given at the Seattle 2006 AppSec conference || Intermediate || 2006-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Web Application Security Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Web Application Security Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Protecting Web Applications from Universal PDF XSS.ppt| Universal PDF XSS by Ivan Ristic]] || Protecting Web Applications from Universal PDF XSS || Intermediate || 2007-06-28&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:IdM-OWASP.v.0.2.14.pdf|Identity Management Basics (Derek Brown)]] ||Identity Management Basics|| Novice || 2007-05-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert || 2005-11-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate || 2006-02-27&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate || 2005-10-11&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/72/MMS_Spoofing.ppt MMS Spoofing (Matteo Meucci)] || A Case-study of a vulnerable web application || Intermediate&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f9/OWASPAppSecEU2006_AJAX_Security.ppt Ajax Security (Andrew van der Stock)] || Presentation on Ajax security for OWASP AppSec Europe 2006 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3a/OWASPAppSec2006Seattle_Web_Services_Security.ppt Advanced Web Services Security &amp;amp; Hacking (Justin Derry)] || Presentation given on Webservice security at the Seattle 2006 AppSec conference || Intermediate  || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/Integration_into_the_SDLC.ppt Integration into the SDLC (Eoin Keary)] || A presentation about why and how to integrate the SDLC. || Novice || 2005-04-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Chapter Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Month (Mon-yyyy)&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Chapter&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Common_Application_Flaws.ppt| Common Application Flaws (Brett Moore) ]] ||OWASP New Zealand chapter presentation on Common Application Flaws|| Novice/Intermediate ||November 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Time_Based_SQL_Injections.ppt| Time Based SQL Injections (Muhaimin Dzulfakar) ]] ||OWASP New Zealand chapter presentation on Time Based SQL Injections|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Browser_security.ppt| Browser Security (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Browser Security|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_CMH_SQLInjection__20080707.zip| 7/7/2008 SQL Injection (Columbus, OH)]] || SQL Injection Presentation given at the Columbus, OH OWASP Chapter Meeting. Powerpoint, derby DB, and applicable java code. || Novice / Intermediate || July 2008 || [[Columbus]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_ellak-Greece.ppt| Detecting Web Application Vulnerabilities Using Open Source Means (Konstantinos Papapanagiotou) ]] ||OWASP Greek Chapter presentation given at the Open Source Software (FLOSS) Conference in Athens|| Novice ||May 2008 || [[Greece]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Hacking_The_World_With_Flash.ppt| Hacking The World With Flash (Paul Craig) ]] ||OWASP New Zealand chapter presentation on Flash security|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web_spam_techniques.ppt| Web Spam Techniques (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Web Spam Techniques|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Xpath_Injection.ppt| Xpath Injection Overview (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Xpath Injection|| Intermediate ||February 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp security4mobileJava.pdf| Dependability for Java Mobile Code (Pierre Parrend) ]] ||OWASP Swiss chapter presentation on Mobile Java Security || Expert ||July 2007 || [[Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Trust Security Usability - v1.0.pdf|Trust, Security and Usability (Roger Carhuatocto) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-tratamiento_de_datos.pdf|Tratamiento seguro de datos en aplicaciones in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Conferencia_OWASP.pdf|Ataques DoS en aplicaciones Web (Jaime Blasco Bermejo) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Seguridad en entornos financieros.pdf|Seguridad en entornos financierosPedro (Pedro Sánchez) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Java_Open_Review.ppt|Brian Chess from Fortify shared what's going on with the Java Open Source review project at the June NoVA OWASP meeting]] || Java Open Review || Intermediate ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Bytecode_injection.ppt|Brian Chess from Fortify, presentation to NoVA OWASP chapter in June 2007.]] || Bytecode injection || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security at the VMM Layer - OWASP.ppt|Security at the VMM Layer by Ted Winograd]] || Security at the VMM Layer || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:KC June 2007 Evaluating and Tuning WAFs.pdf|Evaluating and Tuning Web Application Firewalls (Barry Archer)]] ||Presentation given at Kansas City June 2007 chapter meeting|| Intermediate ||June 2007 || [[Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_SDL-IT.pdf|Microsoft Security Development Lifecycle for IT (Rob Labbé)]] ||Presentation by Rob Labbe at Ottawa OWASP Chapter|| Novice ||May 2007|| [[Ottawa]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_Application_DOS.pdf|Application Denial of Service (Shaayy Cheen)]] ||Is it Really That Easy? Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_FuzzGuru.pdf|Fuzzing in Microsoft and FuzzGuru framework (John Neystadt)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_AppSec_and_Beyond.pdf|Application Security, not just development (David Lewis)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 Overtaking Google Desktop.pdf|Overtaking Google Desktop, Leveraging XSS to Raise Havoc (Yair Amit)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 UnregisterAttackInSip.pdf|Unregister Attack in SIP (Anat Bremler-Barr, Ronit Halachmi-Bekel and Jussi Kangasharju)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 WAF Positive Security.pdf|Positive Security Model for Web Applications, Challenges and Promise (Ofer Shezaf)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 DOT NET Reverse Engineering.pdf|.NET Reverse Engineering (Erez Metula)]] ||Presentation given at the Israel Mini Conference in May 2007|| Expert ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 OWASP Introduction.pdf|OWASP introduction (Ofer Shezaf)]] ||2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP BeLux 2007-06-22 Update on Internet Attack Statistics for Belgium in 2006.ppt|Update on Internet Attack Statistics for Belgium in 2006 by Hilar Leoste (Zone-H)]] || Update on Internet Attack Statistics for Belgium in 2006  || Novice ||May 2007 || [[Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:InfoSec_World_2007_-_Web_services_gateways.ppt Securing Web Services using XML Security Gateways by Tim Bond] || Securing Web Services using XML Security Gateways || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:SwA_Acquisition_WG_-_Overview.ppt Software Assurance in the Acquisition Process by Stan Wisseman] || Software Assurance in the Acquisition Process || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_Legal_Aspects_Jos_Dumortier.zip Legal Aspects of (Web) Application Security by Jos Dumortier] || Legal Aspects of (Web) Application Security  || Intermediate ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_AppSec_Research_Lieven_Desmet.zip AppSec Research (University Leuven Belgium)] ||  Formal absence of implementation bugs in web applications: a case study on indirect data sharing by Lieven Desmet || Expert ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Scanner-Sparkly.ppt|A Scanner Sparkly]] || A Scanner Sparkly, taken from the Phoenix OWASP presentations on Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp-lessonslearned.ppt|Grey Box Assessment Lessons Learned]] || &amp;quot;Grey Box Assessment Lessons Learned&amp;quot;, taken from the Phoenix OWASP presentations, Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_OWASP_Update.zip OWASP Update and OWASP BeLux Board Presentation (Seba)] || OWASP Update and OWASP BeLux Board Presentation || Novice||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security Metics- What can we measure- Zed Abbadi.pdf|Metics- What can we measure (Zed Abbadi)]] ||19 April NoVa chapter meeting presentation on Security Metrics || Novice ||April 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web Services Hacking and Hardening.pdf| Web Services Hacking and Hardening (Adam Vincent) ]] ||3/8/07 NoVA chapter meeting, Adam Vincent from Layer7  || Expert ||March 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/fe/Pres_20070206_04_svetsch_xss_worms_owasp.zip XSS Worms (Sven Vetsch)] || XSS Worms || Intermediate  ||Feb 2007 || [[Switzerland|Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_WebGoat-Pantera.zip WebGoat and Pantera presentation (Philippe Bogaerts)] || WebGoat and Pantera presentation   || Novice || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_AOP_security.zip Security implications of AOP for secure software (Bart De Win)] || Security implications of AOP for secure software || Expert || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/12/OWASP_Denver_Nov-06_presentation.ppt testing for common security flaws (David Byrne)] || testing for common security flaws || Intermediate || Nov 2006 || [[Denver|Denver]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/7c/Owasp-olli.pdf 40-ish slides on analyzing threats (Olli)] || Analyzing Threats || Novice || Dec 2006 || [[Helsinki|Helsinki]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/2c/KC_Dec2006_Attacking_The_App.pdf Attacking the Application (Dave Ferguson)] || Vulnerabilities, attacks and coding suggestions || Intermediate || Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/6a/KC_Dec2006_Ajax_Security_Concerns.pdf Ajax Security Concerns (Rohini Sulatycki)] || Ajax Security Concerns || Intermediate ||Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 Web Application Testing (Matteo Meucci)] || Anatomy of 2 Web Application Testing || Intermediate || Mar 2006 || [[Italy|Italy]]&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|[https://www.owasp.org/images/9/99/WTE-Cloud-Austin-2012-02.pdf Testing From the Cloud: Is the Sky Falling? ] || WTE Cloud-based Testing || Intermediate || Feb 2012 || [[Austin|Austin]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Specification languages]]&lt;br /&gt;
[[Category:OWASP Education Project]]&lt;br /&gt;
[[Category:OWASP Presentations]]&lt;br /&gt;
[[Category:Chapter Resources]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197495</id>
		<title>OWASP Education Presentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197495"/>
				<updated>2015-07-16T14:25:13Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Web Application Security Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page provide a commented overview of the OWASP presentations available.&amp;lt;br&amp;gt;&lt;br /&gt;
Please use the last line of the tables as template.&amp;lt;br&amp;gt;&lt;br /&gt;
Presentions can be tracked through:&lt;br /&gt;
* the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]&lt;br /&gt;
* From the chapter pages&lt;br /&gt;
Everybody is encouraged to link the presentations and add their findings on this page !&lt;br /&gt;
There are currently hundreds of presentations all over the OWASP web site. &lt;br /&gt;
If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.&lt;br /&gt;
Feel free to “mine” them and add them to the overview.&lt;br /&gt;
&lt;br /&gt;
== OWASP Education Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Education Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (2015-07-04)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/index.php/Education/Free_Training Free Developer Training]|| Developer AppSec Course by [[Eoin Keary]] and [https://www.owasp.org/index.php/User:Jmanico Jim Manico] || Intermediate || 2014-04-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Winter 2009v1.pptx|OWASP Overview Winter 2009]]|| Updated overview of OWASP || Novice || 2009-12-08&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Programa_de_Educacion_OWASP.ppt|Programa de Educacion OWASP]]|| Una introduccion a OWASP para Universidades y Centros Educativos por Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_Educational_Programme.ppt|OWASP Educational Programme]]|| An introduction to OWASP for Universities &amp;amp; Educational Institutions by Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Summer 2009.pptx|OWASP Overview Summer 2009]]|| Recent overview of OWASP by Jeff Williams || Novice || 2009-08-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Why WebAppSec Matters.ppt|Why WebAppSec Matters]]|| This module explains why security should be considered when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-Intro-2008-portuguese.ppt|OWASP Intro 2008 Portuguese]]|| Este módulo é uma intrudução sobre o projeto OWASP. || Novice || 2008-07-06&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module OWASP Top 10 Introduction and Remedies.ppt|OWASP Top 10 Introduction and Remedies]]|| This module explains the OWASP Top 10 web application vulnerabilities as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Embed within SDLC.ppt|Embed within SDLC]]|| This module explains the complete approach of Web Application Security when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good Secure Development Practices.ppt|Good Secure Development Practices]]|| This module explains some good secure development practices when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Testing for Vulnerabilities.ppt|Testing for Vulnerabilities]]|| This module explains application security testing when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good WebAppSec Resources.ppt|Good WebAppSec Resources]]|| This module points you to some good web application security resources when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
,&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Project Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Germany 2008 Conference OWASP Introduction v1.pptx|OWASP Introduction]] || OWASP Overview presentation covering OWASP, project parade and OWASP near you. Given by Seba during the Germany 2008 Conference || Novice || 2008-11-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 1.ppt|India08 Keynote - Part 1]] || OWASP Overview presentation. Part 1 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 2.ppt|India08 Keynote - Part 2]] || OWASP Overview presentation. Part 2 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP India - Tour of OWASP projects.ppt|Tour of OWASP’s projects]] || Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/images/5/59/RISK_2008_OWASP_Introduction_v1.pptx OWASP @ RISK08 (Norway)] || OWASP introduction at Norway RISK2008 conference by Seba || Novice || 2008-04-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP NY Keynote.ppt|OWASP NY Keynote by Jeff]] also available in [[:Image:20070620-FR-OWASP NY Keynote.ppt|French]]|| OWASP Overview presentation with slide &amp;quot;OWASP by the numbers&amp;quot; and slide with the sorry state of Tools (at best 45%) which caused some controverse || Novice || 2007-06-12&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 2007-01-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/e/e9/OWASP_Testing_Guide_Presentation_EUSecWest07.zip The OWASP Testing Guide v2 EUSecWest07 (Matteo Meucci, Alberto Revelli)] || Presentation at EUSecWest07 || Intermediate || 2007-03-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3c/OWASP_Flyer_Sep06.ppt OWASP Project Overview] || High level overview of projects and how OWASP works || Novice || 2006-09-19 &lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/4/49/OWASPAppSec2006Seattle_Security_Metrics.ppt The OWASP Application Security Metrics Project (Bob Austin)] || Presentation on the Application Security Metrics project || Novice || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/53/OWASPAppSecEU2006_CLASP_Project.ppt OWASP CLASP Project (Pravir Chandra)] || OWASP CLASP project presentation given at the 2006 European AppSec conference || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/30/OWASPAppSec2006Seattle_UsingSprajaxToTestAJAXSecurity.ppt Sprajax (Dan Cornell)] || OWASP Sprajax presentation given at the 2006 Seattle AppSec conference || Intermediate || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Conference Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Conference Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; | Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; | Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; | Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ModSecurityCoreRuleSet.ppt | Mod Security Core Rule Set (Ofer Shezaf)]] ||Ofer Shezaf's presentation on the Core Ruleset for the latest version of ModSecurity presented at 6th OWASP AppSec conference in Milan, Italy, in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPTestingGuide2v1.ppt | OWASP Testing Guide v2.1 (Matteo Meucci)]] ||Matteo Meucci's presentation on the OWASP Testing Guide v2 at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan CLASP.ppt | CLASP (Pravir Chandra)]] ||Pravir Chandra's presentation on the upcoming 2007 update to CLASP presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan AdvancedWebHacking.ppt | Advanced Web Hacking (PDP)]] ||PDPs presentation at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan XMLSecurityGatewayEvalCriteria.ppt | XML Security Gateway Evaluation Criteria (Gunnar Peterson)]] ||Gunnar Peterson's presentation about the new XML Security Gateway Evaluation Criteria project at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan TestingFlashApplications.ppt | Testing Flash Applications (Stephano Di Paolo)]] ||Stephano Di Paolo's presentation on how to test Flash applications presented at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert|| 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OvertakingGoogleDesktop.ppt | Overtaking Google Desktop (Yair Amit)]] ||Yair Amit's presentation on XSS Flaws in Google Desktop that can be exploited through google.com presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan MS ACETeamAppSecfromTheCore.ppt | ACE Team Application Security from the Core (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the Microsoft ACE team's application security process at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan Pantera.ppt | Pantera (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the new OWASP tool Pantera at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ProtectingWebAppsfromUniversalPDFXSS.ppt | Protecting Web applications from universal PDF XSS (Ivan Ristic)]] ||Ivan Ristic's Universal XSS PDF presentation at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SoftwareSecurity.ppt | Software Security (Rudolph Araujo)]] ||Rudolph Araujo's presentation on Application Security best practices at the 6th OWASP AppSec conference in Milan Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebGoatv5.ppt | WebGoat v5 (Dave Wichers)]] ||WebGoat v5 presentation by Dave Wichers at the 6th OWASP AppSec Conference in Milan, Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebScarabNG.ppt | WebScarab NG (Dave Wichers)]] ||Description of the new WebScarab-NG efforts presented by Dave Wichers at the 6th OWASP AppSec conference in Milan, Italy in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SANS SPSA Initiative.ppt | SANS SPSA Initiative (Dave Wichers)]] ||Description of the SANS Secure Coding Exam Initiative presented by Dave Wichers at the 6th OWASP AppSec conference in Milan Italy, May 2007.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPItalyActivities.ppt | OWASP Italy Activities (Raoul Chiesa)]] ||Raoul Chiesa's keynote for day 2 of the 6th OWASP AppSec conference on the state of application security in Italy including OWASP's activities in that country.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SecurityEngineeringInVista.ppt | Security engineering in Vista (Alex Lucas)]] ||Alex Lucas' from Microsoft's keynote presentation for Day 1 of the 6th OWASP AppSec conference in Milan on the benefits of Microsoft's SDL to the security of Vista. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/5f/OWASPAppSec2006Seattle_SecurityEngineeringInVista.ppt How the Security Development Lifecycle(SDL) Improved Windows Vista (Michael Howard)] || Michael Howard's talk on SDL from the OWASP Seattle AppSec Conference in 2006 || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/34/OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping the Application Assurance Process (Sebastien Deleersnyder)] || Presentation given during the European 2006 AppSec conference on the application assurance process || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8b/OWASPAppSecEU2006_InlineApproachforSecureSOAPRequests.ppt Inline Approach for Secure SOAP Requests and Early Validation (Mohammad Ashiqur Rahaman, Maartin Rits and Andreas Schaad SAP Research, Sophia Antipolis, France)] || Presentation given at the European 2006 AppSec conference about security and soap message structure issues || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/9c/OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls:When Are They Useful? (Ivan Ristic)] || Presentation about Web Application Firewalls || Novice || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/1a/OWASPAppSecEU2006_HTTPMessageSplittingSmugglingEtc.ppt HTTP Message Splitting, Smuggling and Other Animals (Amit Klein)] || A presentation about Message splitting other attacks around the HTTP protocol || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/OWASPAppSec2006Seattle_WebAppForensics.ppt Web Application Incident Response &amp;amp; Forensics: A Whole New Ball Game! (Rohyt Belani &amp;amp; Chuck Willis)] || Talk about Web Application Security incident handling and forensics given at the OWASP 2006 Seattle AppSec conference || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/d/d2/OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10.ppt Can (Automated) Testing Tools Really Find the OWASP Top 10? (Erwin Geirnaert) ] || A talk about how automated testing tools stack up against the OWASP top 10 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/28/OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding (Martin Johns / Justus Winter)] || Presentation given about how Sessions can be hi-jacked, etc... || Novice  || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/62/OWASPAppSecEU2006_SecurityTestingthruAutomatedSWTests.ppt Security Testing through Automated Software Tests (Stephen de Vries)] || Presentation given at the 2006 EuSec conference || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/0e/AppSec2005DC-Jeremy_Poteet-In_the_Line_of_Fire.ppt In the Line of Fire: Defending Highly Visible Targets (Jeremy Poteet)] || Conference given at the 2005 DC AppSec conference || Novice || 2005-10-1&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/93/AppSec2005DC-Matt_Fisher-Google_Hacking_and_Worms.ppt Google Hacking and Web Application Worms (Matt Fisher)] || Talk given at the 2005 DC AppSec conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/05/AppSec2005DC-Anthony_Canike-Enterprise_AppSec_Program.ppt Establishing an Enterprise Application Security Program (Tony Canike)] || Talk given at the 2005 DC AppSec Conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://owasp.org/images/0/0d/OWASPAppSec2006Seattle_Why_AJAX_Applications_More_Likely_Insecure.ppt Why AJAX Applications Are Far More Likely To Be Insecure (And What To Do About It) (Dave Wichers)] || Dave's talk on AJAX given at the Seattle 2006 AppSec conference || Intermediate || 2006-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Web Application Security Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Web Application Security Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Protecting Web Applications from Universal PDF XSS.ppt| Universal PDF XSS by Ivan Ristic]] || Protecting Web Applications from Universal PDF XSS || Intermediate || 2007-06-28&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:IdM-OWASP.v.0.2.14.pdf|Identity Management Basics (Derek Brown)]] ||Identity Management Basics|| Novice || 2007-05-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert || 2005-11-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate || 2006-02-27&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate || 2005-10-11&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/72/MMS_Spoofing.ppt MMS Spoofing (Matteo Meucci)] || A Case-study of a vulnerable web application || Intermediate&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f9/OWASPAppSecEU2006_AJAX_Security.ppt Ajax Security (Andrew van der Stock)] || Presentation on Ajax security for OWASP AppSec Europe 2006 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3a/OWASPAppSec2006Seattle_Web_Services_Security.ppt Advanced Web Services Security &amp;amp; Hacking (Justin Derry)] || Presentation given on Webservice security at the Seattle 2006 AppSec conference || Intermediate  || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/Integration_into_the_SDLC.ppt Integration into the SDLC (Eoin Keary)] || A presentation about why and how to integrate the SDLC. || Novice || 2005-04-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Chapter Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Month (Mon-yyyy)&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Chapter&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Common_Application_Flaws.ppt| Common Application Flaws (Brett Moore) ]] ||OWASP New Zealand chapter presentation on Common Application Flaws|| Novice/Intermediate ||November 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Time_Based_SQL_Injections.ppt| Time Based SQL Injections (Muhaimin Dzulfakar) ]] ||OWASP New Zealand chapter presentation on Time Based SQL Injections|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Browser_security.ppt| Browser Security (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Browser Security|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_CMH_SQLInjection__20080707.zip| 7/7/2008 SQL Injection (Columbus, OH)]] || SQL Injection Presentation given at the Columbus, OH OWASP Chapter Meeting. Powerpoint, derby DB, and applicable java code. || Novice / Intermediate || July 2008 || [[Columbus]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_ellak-Greece.ppt| Detecting Web Application Vulnerabilities Using Open Source Means (Konstantinos Papapanagiotou) ]] ||OWASP Greek Chapter presentation given at the Open Source Software (FLOSS) Conference in Athens|| Novice ||May 2008 || [[Greece]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Hacking_The_World_With_Flash.ppt| Hacking The World With Flash (Paul Craig) ]] ||OWASP New Zealand chapter presentation on Flash security|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web_spam_techniques.ppt| Web Spam Techniques (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Web Spam Techniques|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Xpath_Injection.ppt| Xpath Injection Overview (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Xpath Injection|| Intermediate ||February 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp security4mobileJava.pdf| Dependability for Java Mobile Code (Pierre Parrend) ]] ||OWASP Swiss chapter presentation on Mobile Java Security || Expert ||July 2007 || [[Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Trust Security Usability - v1.0.pdf|Trust, Security and Usability (Roger Carhuatocto) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-tratamiento_de_datos.pdf|Tratamiento seguro de datos en aplicaciones in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Conferencia_OWASP.pdf|Ataques DoS en aplicaciones Web (Jaime Blasco Bermejo) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Seguridad en entornos financieros.pdf|Seguridad en entornos financierosPedro (Pedro Sánchez) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Java_Open_Review.ppt|Brian Chess from Fortify shared what's going on with the Java Open Source review project at the June NoVA OWASP meeting]] || Java Open Review || Intermediate ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Bytecode_injection.ppt|Brian Chess from Fortify, presentation to NoVA OWASP chapter in June 2007.]] || Bytecode injection || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security at the VMM Layer - OWASP.ppt|Security at the VMM Layer by Ted Winograd]] || Security at the VMM Layer || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:KC June 2007 Evaluating and Tuning WAFs.pdf|Evaluating and Tuning Web Application Firewalls (Barry Archer)]] ||Presentation given at Kansas City June 2007 chapter meeting|| Intermediate ||June 2007 || [[Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_SDL-IT.pdf|Microsoft Security Development Lifecycle for IT (Rob Labbé)]] ||Presentation by Rob Labbe at Ottawa OWASP Chapter|| Novice ||May 2007|| [[Ottawa]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_Application_DOS.pdf|Application Denial of Service (Shaayy Cheen)]] ||Is it Really That Easy? Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_FuzzGuru.pdf|Fuzzing in Microsoft and FuzzGuru framework (John Neystadt)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_AppSec_and_Beyond.pdf|Application Security, not just development (David Lewis)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 Overtaking Google Desktop.pdf|Overtaking Google Desktop, Leveraging XSS to Raise Havoc (Yair Amit)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 UnregisterAttackInSip.pdf|Unregister Attack in SIP (Anat Bremler-Barr, Ronit Halachmi-Bekel and Jussi Kangasharju)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 WAF Positive Security.pdf|Positive Security Model for Web Applications, Challenges and Promise (Ofer Shezaf)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 DOT NET Reverse Engineering.pdf|.NET Reverse Engineering (Erez Metula)]] ||Presentation given at the Israel Mini Conference in May 2007|| Expert ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 OWASP Introduction.pdf|OWASP introduction (Ofer Shezaf)]] ||2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP BeLux 2007-06-22 Update on Internet Attack Statistics for Belgium in 2006.ppt|Update on Internet Attack Statistics for Belgium in 2006 by Hilar Leoste (Zone-H)]] || Update on Internet Attack Statistics for Belgium in 2006  || Novice ||May 2007 || [[Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:InfoSec_World_2007_-_Web_services_gateways.ppt Securing Web Services using XML Security Gateways by Tim Bond] || Securing Web Services using XML Security Gateways || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:SwA_Acquisition_WG_-_Overview.ppt Software Assurance in the Acquisition Process by Stan Wisseman] || Software Assurance in the Acquisition Process || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_Legal_Aspects_Jos_Dumortier.zip Legal Aspects of (Web) Application Security by Jos Dumortier] || Legal Aspects of (Web) Application Security  || Intermediate ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_AppSec_Research_Lieven_Desmet.zip AppSec Research (University Leuven Belgium)] ||  Formal absence of implementation bugs in web applications: a case study on indirect data sharing by Lieven Desmet || Expert ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Scanner-Sparkly.ppt|A Scanner Sparkly]] || A Scanner Sparkly, taken from the Phoenix OWASP presentations on Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp-lessonslearned.ppt|Grey Box Assessment Lessons Learned]] || &amp;quot;Grey Box Assessment Lessons Learned&amp;quot;, taken from the Phoenix OWASP presentations, Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_OWASP_Update.zip OWASP Update and OWASP BeLux Board Presentation (Seba)] || OWASP Update and OWASP BeLux Board Presentation || Novice||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security Metics- What can we measure- Zed Abbadi.pdf|Metics- What can we measure (Zed Abbadi)]] ||19 April NoVa chapter meeting presentation on Security Metrics || Novice ||April 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web Services Hacking and Hardening.pdf| Web Services Hacking and Hardening (Adam Vincent) ]] ||3/8/07 NoVA chapter meeting, Adam Vincent from Layer7  || Expert ||March 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/fe/Pres_20070206_04_svetsch_xss_worms_owasp.zip XSS Worms (Sven Vetsch)] || XSS Worms || Intermediate  ||Feb 2007 || [[Switzerland|Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_WebGoat-Pantera.zip WebGoat and Pantera presentation (Philippe Bogaerts)] || WebGoat and Pantera presentation   || Novice || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_AOP_security.zip Security implications of AOP for secure software (Bart De Win)] || Security implications of AOP for secure software || Expert || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/12/OWASP_Denver_Nov-06_presentation.ppt testing for common security flaws (David Byrne)] || testing for common security flaws || Intermediate || Nov 2006 || [[Denver|Denver]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/7c/Owasp-olli.pdf 40-ish slides on analyzing threats (Olli)] || Analyzing Threats || Novice || Dec 2006 || [[Helsinki|Helsinki]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/2c/KC_Dec2006_Attacking_The_App.pdf Attacking the Application (Dave Ferguson)] || Vulnerabilities, attacks and coding suggestions || Intermediate || Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/6a/KC_Dec2006_Ajax_Security_Concerns.pdf Ajax Security Concerns (Rohini Sulatycki)] || Ajax Security Concerns || Intermediate ||Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 Web Application Testing (Matteo Meucci)] || Anatomy of 2 Web Application Testing || Intermediate || Mar 2006 || [[Italy|Italy]]&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|[https://www.owasp.org/images/9/99/WTE-Cloud-Austin-2012-02.pdf Testing From the Cloud: Is the Sky Falling? ] || WTE Cloud-based Testing || Intermediate || Feb 2012 || [[Austin|Austin]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|(https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio) || Open Web application Security Project|| Intermediate|| 2015-07-04 || &lt;br /&gt;
&lt;br /&gt;
Chapter 4&lt;br /&gt;
&lt;br /&gt;
Specification Language&lt;br /&gt;
&lt;br /&gt;
This formal specification by language example presents cybersecurity studies (of over 10 projects) of how successful OWASP educational presentations test develop design and deliver cybersecurity software efficiently supporting formal methods as mathematically based techniquesthat are needed to assist  in the design and implementation of reliable cybersecurity software.&lt;br /&gt;
&lt;br /&gt;
Specification by language example is a must read for anyone serious about delivering translated cybersecurity language software that matters It is the result of a research on how teams internationally specify test develop design and deliver the right cybersecurity software without defects in very short computational delivery cycles  With cybersecurity case studies and real examples this presentation helps you understand how successful teams implement mathematical cybersecurity by example denoting &lt;br /&gt;
acceptable testing and behavior driven  development to bridge the communication gap between committees stakeholders and contributing teams build quality into cybersecurity from the start by testing developing designing and delivering supported languagfor syntax highlighting purposes It presents the collective knowledge of about 50 cybersecurity projects ranging from high traffic websites to virtual back office cybersecurity systems implemented by teams as diverse as small startups to groups spread across different continents working in a range of processes including Extreme programming Kanban Scrum and similar processes often bundled together under the names Lean and Agile This protocol is for testers software developers business analysts and project managers working on Syntax and Agile projects or teams moving to an Agile development method that want to improve quality  reduce correction of defective cybersecurity software and collaborate better with the OWASP committee.&lt;br /&gt;
Smith&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Retrieved notes from Categories Specification languages and Formal specification &lt;br /&gt;
For the last past decade computer systems have become increasingly more powerful as a result becoming more impactful to society  Established engineering disciplines use mathematical analysis as the foundation of creating and validating product design Formal language specifications are one im such a way for achievement in software engineering as reliability  once predicted Other methods such as testing are more commonly used to enhance code quality&lt;br /&gt;
&lt;br /&gt;
Usability given as such a specification it is possible to use formal verification techniques to demonstrate that a system design is correct with respect to its specification This allows incorrect system designs to be revised before any major investments have been made into an actual implementation Another approach is to use provably correct refinement steps to transform a specification into a design which is ultimately transformed into an implementation that is correct by construction.&lt;br /&gt;
&lt;br /&gt;
*It is important to note that a formal specification is not an implementation but rather it may be used to develop an implementation Formal specifications describe what a system should do not how the system should do it A good specification must have some of the following attributes: adequate internally consistent unambiguous complete satisfied constructability manageability and evolvability Usability Communicability Powerful and efficient analysis which is one of the main reasons there is interest in formal specifications that will provide an ability to perform proofs on cybersecurity software implementations These proofs may be used to validate a specification verify correctness of design, or to prove that a program satisfies a specification.&lt;br /&gt;
&lt;br /&gt;
Limitations&lt;br /&gt;
A design (or implementation) cannot ever be declared “correct” on its own. It can only ever be “corrected with respect to a given specification Whether the formal specification correctly describes the problem to be solved is a separate issue It is also a difficult issue to address since it ultimately concerns the problem constructing abstracted formal representations of an informal concrete problem domain and such an abstraction step is not amenable to formal proof. However, it is possible to validate a specification by proving “challenge” theorems concerning properties that the specification is expected to exhibit.o_O If correct Olloclip In these theorems reinforce the specifier's understanding of the specification and its relationship with the underlying problem domain If not the specification probably needs to be changed to better reflect the domain understanding of those involved with producing (and implementing) the specification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Flexibility&lt;br /&gt;
As far as flexibility goes a lot of software companies use agile methodologies that focus on flexibility Doing a formal specification of the whole system up front is often perceived as being the opposite of flexible However there is some research into the benefits of using formal specifications with &amp;quot;agile&amp;quot; development&lt;br /&gt;
Complexity is a requirement that is a high level of mathematical expertise and the analytical skills to understand and apply them effectively&lt;br /&gt;
I have a solution to develop resources and models that allow for these techniques to be implemented but hide underlying mathematics&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I hope to accomplish a good job of specifying user interfaces and user interaction that is Not cost-effective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Formal specification techniques have existed in various domains and on various scales for quite some time Implementations of formal specifications will differ depending on what kind of system they are attempting to model how they are applied and at what point in the software life cycle they have been introduced These types of models can be categorized into the following specification paradigms:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
History-based specification&lt;br /&gt;
&lt;br /&gt;
behavior based system histories&lt;br /&gt;
assertions are interpreted over time&lt;br /&gt;
State-based Specification&lt;br /&gt;
behavior based on system states&lt;br /&gt;
series of sequential steps (e.g. a financial transaction)&lt;br /&gt;
languages such as Z, VDM or B rely on this paradigm+&lt;br /&gt;
Transition-based specification&lt;br /&gt;
behavior based on transitions from state-to-state of the system&lt;br /&gt;
best used with a reactive system&lt;br /&gt;
languages such as Statecharts PROMELA STeP-SPL RSML or SCR rely on this paradigm&lt;br /&gt;
Functional specification&lt;br /&gt;
specify a system as a structure of mathematical functions&lt;br /&gt;
OBJ, ASL, PLUSS, LARCH, HOL or PVS rely on this paradigm&lt;br /&gt;
Operational Specification&lt;br /&gt;
early languages such as Paisley GIST Petri nets or process algebras rely on this paradigm&lt;br /&gt;
In addition to the above paradigms there are ways to apply certain heuristics to help improve the creation of these specifications The protocol referenced here best discusses heuristics to use when designing a specification.Heuristics= a rule or method that helps you solve problems faster than you would if you did all the computing&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
Algebraic specification= Providing a mathematical software engineering technique &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
^ a b c d e f g h i j k l m n o Lamsweerde, A. V. (2000). &amp;quot;Formal specification&amp;quot;. Proceedings of the conference on the future of Software engineering - ICSE '00. p. 147. doi:10.1145/336512.336546. ISBN &lt;br /&gt;
^ a b c d Sommerville, Ian (2009). &amp;quot;Formal Specification&amp;quot; (PDF). Software Engineering. Retrieved&lt;br /&gt;
^ a b c Nummenmaa, Timo; Tiensuu, Aleksi; Berki, Eleni; Mikkonen, Tommi; Kuittinen, Jussi; Kultima, Annakaisa (4 August 2011). &amp;quot;Supporting agile development by facilitating natural user interaction with executable formal specifications&amp;quot;. ACM SIGSOFT Software Engineering Notes 36 (4): 1–10. doi:10.1145/1988997.2003643. edit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Best Wishes,&lt;br /&gt;
Brenda Smith&lt;br /&gt;
a55dayidream@gmail.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Specification languages]]&lt;br /&gt;
[[Category:OWASP Education Project]]&lt;br /&gt;
[[Category:OWASP Presentations]]&lt;br /&gt;
[[Category:Chapter Resources]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197494</id>
		<title>OWASP Education Presentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197494"/>
				<updated>2015-07-16T14:24:21Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* OWASP Conference Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page provide a commented overview of the OWASP presentations available.&amp;lt;br&amp;gt;&lt;br /&gt;
Please use the last line of the tables as template.&amp;lt;br&amp;gt;&lt;br /&gt;
Presentions can be tracked through:&lt;br /&gt;
* the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]&lt;br /&gt;
* From the chapter pages&lt;br /&gt;
Everybody is encouraged to link the presentations and add their findings on this page !&lt;br /&gt;
There are currently hundreds of presentations all over the OWASP web site. &lt;br /&gt;
If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.&lt;br /&gt;
Feel free to “mine” them and add them to the overview.&lt;br /&gt;
&lt;br /&gt;
== OWASP Education Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Education Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (2015-07-04)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/index.php/Education/Free_Training Free Developer Training]|| Developer AppSec Course by [[Eoin Keary]] and [https://www.owasp.org/index.php/User:Jmanico Jim Manico] || Intermediate || 2014-04-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Winter 2009v1.pptx|OWASP Overview Winter 2009]]|| Updated overview of OWASP || Novice || 2009-12-08&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Programa_de_Educacion_OWASP.ppt|Programa de Educacion OWASP]]|| Una introduccion a OWASP para Universidades y Centros Educativos por Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_Educational_Programme.ppt|OWASP Educational Programme]]|| An introduction to OWASP for Universities &amp;amp; Educational Institutions by Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Summer 2009.pptx|OWASP Overview Summer 2009]]|| Recent overview of OWASP by Jeff Williams || Novice || 2009-08-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Why WebAppSec Matters.ppt|Why WebAppSec Matters]]|| This module explains why security should be considered when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-Intro-2008-portuguese.ppt|OWASP Intro 2008 Portuguese]]|| Este módulo é uma intrudução sobre o projeto OWASP. || Novice || 2008-07-06&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module OWASP Top 10 Introduction and Remedies.ppt|OWASP Top 10 Introduction and Remedies]]|| This module explains the OWASP Top 10 web application vulnerabilities as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Embed within SDLC.ppt|Embed within SDLC]]|| This module explains the complete approach of Web Application Security when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good Secure Development Practices.ppt|Good Secure Development Practices]]|| This module explains some good secure development practices when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Testing for Vulnerabilities.ppt|Testing for Vulnerabilities]]|| This module explains application security testing when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good WebAppSec Resources.ppt|Good WebAppSec Resources]]|| This module points you to some good web application security resources when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
,&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Project Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Germany 2008 Conference OWASP Introduction v1.pptx|OWASP Introduction]] || OWASP Overview presentation covering OWASP, project parade and OWASP near you. Given by Seba during the Germany 2008 Conference || Novice || 2008-11-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 1.ppt|India08 Keynote - Part 1]] || OWASP Overview presentation. Part 1 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 2.ppt|India08 Keynote - Part 2]] || OWASP Overview presentation. Part 2 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP India - Tour of OWASP projects.ppt|Tour of OWASP’s projects]] || Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/images/5/59/RISK_2008_OWASP_Introduction_v1.pptx OWASP @ RISK08 (Norway)] || OWASP introduction at Norway RISK2008 conference by Seba || Novice || 2008-04-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP NY Keynote.ppt|OWASP NY Keynote by Jeff]] also available in [[:Image:20070620-FR-OWASP NY Keynote.ppt|French]]|| OWASP Overview presentation with slide &amp;quot;OWASP by the numbers&amp;quot; and slide with the sorry state of Tools (at best 45%) which caused some controverse || Novice || 2007-06-12&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 2007-01-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/e/e9/OWASP_Testing_Guide_Presentation_EUSecWest07.zip The OWASP Testing Guide v2 EUSecWest07 (Matteo Meucci, Alberto Revelli)] || Presentation at EUSecWest07 || Intermediate || 2007-03-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3c/OWASP_Flyer_Sep06.ppt OWASP Project Overview] || High level overview of projects and how OWASP works || Novice || 2006-09-19 &lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/4/49/OWASPAppSec2006Seattle_Security_Metrics.ppt The OWASP Application Security Metrics Project (Bob Austin)] || Presentation on the Application Security Metrics project || Novice || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/53/OWASPAppSecEU2006_CLASP_Project.ppt OWASP CLASP Project (Pravir Chandra)] || OWASP CLASP project presentation given at the 2006 European AppSec conference || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/30/OWASPAppSec2006Seattle_UsingSprajaxToTestAJAXSecurity.ppt Sprajax (Dan Cornell)] || OWASP Sprajax presentation given at the 2006 Seattle AppSec conference || Intermediate || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Conference Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Conference Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; | Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; | Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; | Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ModSecurityCoreRuleSet.ppt | Mod Security Core Rule Set (Ofer Shezaf)]] ||Ofer Shezaf's presentation on the Core Ruleset for the latest version of ModSecurity presented at 6th OWASP AppSec conference in Milan, Italy, in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPTestingGuide2v1.ppt | OWASP Testing Guide v2.1 (Matteo Meucci)]] ||Matteo Meucci's presentation on the OWASP Testing Guide v2 at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan CLASP.ppt | CLASP (Pravir Chandra)]] ||Pravir Chandra's presentation on the upcoming 2007 update to CLASP presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan AdvancedWebHacking.ppt | Advanced Web Hacking (PDP)]] ||PDPs presentation at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan XMLSecurityGatewayEvalCriteria.ppt | XML Security Gateway Evaluation Criteria (Gunnar Peterson)]] ||Gunnar Peterson's presentation about the new XML Security Gateway Evaluation Criteria project at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan TestingFlashApplications.ppt | Testing Flash Applications (Stephano Di Paolo)]] ||Stephano Di Paolo's presentation on how to test Flash applications presented at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert|| 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OvertakingGoogleDesktop.ppt | Overtaking Google Desktop (Yair Amit)]] ||Yair Amit's presentation on XSS Flaws in Google Desktop that can be exploited through google.com presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan MS ACETeamAppSecfromTheCore.ppt | ACE Team Application Security from the Core (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the Microsoft ACE team's application security process at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan Pantera.ppt | Pantera (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the new OWASP tool Pantera at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ProtectingWebAppsfromUniversalPDFXSS.ppt | Protecting Web applications from universal PDF XSS (Ivan Ristic)]] ||Ivan Ristic's Universal XSS PDF presentation at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SoftwareSecurity.ppt | Software Security (Rudolph Araujo)]] ||Rudolph Araujo's presentation on Application Security best practices at the 6th OWASP AppSec conference in Milan Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebGoatv5.ppt | WebGoat v5 (Dave Wichers)]] ||WebGoat v5 presentation by Dave Wichers at the 6th OWASP AppSec Conference in Milan, Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebScarabNG.ppt | WebScarab NG (Dave Wichers)]] ||Description of the new WebScarab-NG efforts presented by Dave Wichers at the 6th OWASP AppSec conference in Milan, Italy in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SANS SPSA Initiative.ppt | SANS SPSA Initiative (Dave Wichers)]] ||Description of the SANS Secure Coding Exam Initiative presented by Dave Wichers at the 6th OWASP AppSec conference in Milan Italy, May 2007.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPItalyActivities.ppt | OWASP Italy Activities (Raoul Chiesa)]] ||Raoul Chiesa's keynote for day 2 of the 6th OWASP AppSec conference on the state of application security in Italy including OWASP's activities in that country.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SecurityEngineeringInVista.ppt | Security engineering in Vista (Alex Lucas)]] ||Alex Lucas' from Microsoft's keynote presentation for Day 1 of the 6th OWASP AppSec conference in Milan on the benefits of Microsoft's SDL to the security of Vista. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/5f/OWASPAppSec2006Seattle_SecurityEngineeringInVista.ppt How the Security Development Lifecycle(SDL) Improved Windows Vista (Michael Howard)] || Michael Howard's talk on SDL from the OWASP Seattle AppSec Conference in 2006 || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/34/OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping the Application Assurance Process (Sebastien Deleersnyder)] || Presentation given during the European 2006 AppSec conference on the application assurance process || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8b/OWASPAppSecEU2006_InlineApproachforSecureSOAPRequests.ppt Inline Approach for Secure SOAP Requests and Early Validation (Mohammad Ashiqur Rahaman, Maartin Rits and Andreas Schaad SAP Research, Sophia Antipolis, France)] || Presentation given at the European 2006 AppSec conference about security and soap message structure issues || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/9c/OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls:When Are They Useful? (Ivan Ristic)] || Presentation about Web Application Firewalls || Novice || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/1a/OWASPAppSecEU2006_HTTPMessageSplittingSmugglingEtc.ppt HTTP Message Splitting, Smuggling and Other Animals (Amit Klein)] || A presentation about Message splitting other attacks around the HTTP protocol || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/OWASPAppSec2006Seattle_WebAppForensics.ppt Web Application Incident Response &amp;amp; Forensics: A Whole New Ball Game! (Rohyt Belani &amp;amp; Chuck Willis)] || Talk about Web Application Security incident handling and forensics given at the OWASP 2006 Seattle AppSec conference || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/d/d2/OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10.ppt Can (Automated) Testing Tools Really Find the OWASP Top 10? (Erwin Geirnaert) ] || A talk about how automated testing tools stack up against the OWASP top 10 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/28/OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding (Martin Johns / Justus Winter)] || Presentation given about how Sessions can be hi-jacked, etc... || Novice  || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/62/OWASPAppSecEU2006_SecurityTestingthruAutomatedSWTests.ppt Security Testing through Automated Software Tests (Stephen de Vries)] || Presentation given at the 2006 EuSec conference || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/0e/AppSec2005DC-Jeremy_Poteet-In_the_Line_of_Fire.ppt In the Line of Fire: Defending Highly Visible Targets (Jeremy Poteet)] || Conference given at the 2005 DC AppSec conference || Novice || 2005-10-1&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/93/AppSec2005DC-Matt_Fisher-Google_Hacking_and_Worms.ppt Google Hacking and Web Application Worms (Matt Fisher)] || Talk given at the 2005 DC AppSec conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/05/AppSec2005DC-Anthony_Canike-Enterprise_AppSec_Program.ppt Establishing an Enterprise Application Security Program (Tony Canike)] || Talk given at the 2005 DC AppSec Conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://owasp.org/images/0/0d/OWASPAppSec2006Seattle_Why_AJAX_Applications_More_Likely_Insecure.ppt Why AJAX Applications Are Far More Likely To Be Insecure (And What To Do About It) (Dave Wichers)] || Dave's talk on AJAX given at the Seattle 2006 AppSec conference || Intermediate || 2006-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Web Application Security Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Web Application Security Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Protecting Web Applications from Universal PDF XSS.ppt| Universal PDF XSS by Ivan Ristic]] || Protecting Web Applications from Universal PDF XSS || Intermediate || 2007-06-28&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:IdM-OWASP.v.0.2.14.pdf|Identity Management Basics (Derek Brown)]] ||Identity Management Basics|| Novice || 2007-05-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert || 2005-11-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate || 2006-02-27&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate || 2005-10-11&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/72/MMS_Spoofing.ppt MMS Spoofing (Matteo Meucci)] || A Case-study of a vulnerable web application || Intermediate&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f9/OWASPAppSecEU2006_AJAX_Security.ppt Ajax Security (Andrew van der Stock)] || Presentation on Ajax security for OWASP AppSec Europe 2006 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3a/OWASPAppSec2006Seattle_Web_Services_Security.ppt Advanced Web Services Security &amp;amp; Hacking (Justin Derry)] || Presentation given on Webservice security at the Seattle 2006 AppSec conference || Intermediate  || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/Integration_into_the_SDLC.ppt Integration into the SDLC (Eoin Keary)] || A presentation about why and how to integrate the SDLC. || Novice || 2005-04-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[ (https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio || Intermediate || 2015-07-04&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Chapter Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Month (Mon-yyyy)&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Chapter&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Common_Application_Flaws.ppt| Common Application Flaws (Brett Moore) ]] ||OWASP New Zealand chapter presentation on Common Application Flaws|| Novice/Intermediate ||November 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Time_Based_SQL_Injections.ppt| Time Based SQL Injections (Muhaimin Dzulfakar) ]] ||OWASP New Zealand chapter presentation on Time Based SQL Injections|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Browser_security.ppt| Browser Security (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Browser Security|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_CMH_SQLInjection__20080707.zip| 7/7/2008 SQL Injection (Columbus, OH)]] || SQL Injection Presentation given at the Columbus, OH OWASP Chapter Meeting. Powerpoint, derby DB, and applicable java code. || Novice / Intermediate || July 2008 || [[Columbus]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_ellak-Greece.ppt| Detecting Web Application Vulnerabilities Using Open Source Means (Konstantinos Papapanagiotou) ]] ||OWASP Greek Chapter presentation given at the Open Source Software (FLOSS) Conference in Athens|| Novice ||May 2008 || [[Greece]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Hacking_The_World_With_Flash.ppt| Hacking The World With Flash (Paul Craig) ]] ||OWASP New Zealand chapter presentation on Flash security|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web_spam_techniques.ppt| Web Spam Techniques (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Web Spam Techniques|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Xpath_Injection.ppt| Xpath Injection Overview (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Xpath Injection|| Intermediate ||February 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp security4mobileJava.pdf| Dependability for Java Mobile Code (Pierre Parrend) ]] ||OWASP Swiss chapter presentation on Mobile Java Security || Expert ||July 2007 || [[Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Trust Security Usability - v1.0.pdf|Trust, Security and Usability (Roger Carhuatocto) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-tratamiento_de_datos.pdf|Tratamiento seguro de datos en aplicaciones in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Conferencia_OWASP.pdf|Ataques DoS en aplicaciones Web (Jaime Blasco Bermejo) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Seguridad en entornos financieros.pdf|Seguridad en entornos financierosPedro (Pedro Sánchez) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Java_Open_Review.ppt|Brian Chess from Fortify shared what's going on with the Java Open Source review project at the June NoVA OWASP meeting]] || Java Open Review || Intermediate ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Bytecode_injection.ppt|Brian Chess from Fortify, presentation to NoVA OWASP chapter in June 2007.]] || Bytecode injection || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security at the VMM Layer - OWASP.ppt|Security at the VMM Layer by Ted Winograd]] || Security at the VMM Layer || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:KC June 2007 Evaluating and Tuning WAFs.pdf|Evaluating and Tuning Web Application Firewalls (Barry Archer)]] ||Presentation given at Kansas City June 2007 chapter meeting|| Intermediate ||June 2007 || [[Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_SDL-IT.pdf|Microsoft Security Development Lifecycle for IT (Rob Labbé)]] ||Presentation by Rob Labbe at Ottawa OWASP Chapter|| Novice ||May 2007|| [[Ottawa]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_Application_DOS.pdf|Application Denial of Service (Shaayy Cheen)]] ||Is it Really That Easy? Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_FuzzGuru.pdf|Fuzzing in Microsoft and FuzzGuru framework (John Neystadt)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_AppSec_and_Beyond.pdf|Application Security, not just development (David Lewis)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 Overtaking Google Desktop.pdf|Overtaking Google Desktop, Leveraging XSS to Raise Havoc (Yair Amit)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 UnregisterAttackInSip.pdf|Unregister Attack in SIP (Anat Bremler-Barr, Ronit Halachmi-Bekel and Jussi Kangasharju)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 WAF Positive Security.pdf|Positive Security Model for Web Applications, Challenges and Promise (Ofer Shezaf)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 DOT NET Reverse Engineering.pdf|.NET Reverse Engineering (Erez Metula)]] ||Presentation given at the Israel Mini Conference in May 2007|| Expert ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 OWASP Introduction.pdf|OWASP introduction (Ofer Shezaf)]] ||2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP BeLux 2007-06-22 Update on Internet Attack Statistics for Belgium in 2006.ppt|Update on Internet Attack Statistics for Belgium in 2006 by Hilar Leoste (Zone-H)]] || Update on Internet Attack Statistics for Belgium in 2006  || Novice ||May 2007 || [[Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:InfoSec_World_2007_-_Web_services_gateways.ppt Securing Web Services using XML Security Gateways by Tim Bond] || Securing Web Services using XML Security Gateways || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:SwA_Acquisition_WG_-_Overview.ppt Software Assurance in the Acquisition Process by Stan Wisseman] || Software Assurance in the Acquisition Process || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_Legal_Aspects_Jos_Dumortier.zip Legal Aspects of (Web) Application Security by Jos Dumortier] || Legal Aspects of (Web) Application Security  || Intermediate ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_AppSec_Research_Lieven_Desmet.zip AppSec Research (University Leuven Belgium)] ||  Formal absence of implementation bugs in web applications: a case study on indirect data sharing by Lieven Desmet || Expert ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Scanner-Sparkly.ppt|A Scanner Sparkly]] || A Scanner Sparkly, taken from the Phoenix OWASP presentations on Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp-lessonslearned.ppt|Grey Box Assessment Lessons Learned]] || &amp;quot;Grey Box Assessment Lessons Learned&amp;quot;, taken from the Phoenix OWASP presentations, Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_OWASP_Update.zip OWASP Update and OWASP BeLux Board Presentation (Seba)] || OWASP Update and OWASP BeLux Board Presentation || Novice||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security Metics- What can we measure- Zed Abbadi.pdf|Metics- What can we measure (Zed Abbadi)]] ||19 April NoVa chapter meeting presentation on Security Metrics || Novice ||April 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web Services Hacking and Hardening.pdf| Web Services Hacking and Hardening (Adam Vincent) ]] ||3/8/07 NoVA chapter meeting, Adam Vincent from Layer7  || Expert ||March 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/fe/Pres_20070206_04_svetsch_xss_worms_owasp.zip XSS Worms (Sven Vetsch)] || XSS Worms || Intermediate  ||Feb 2007 || [[Switzerland|Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_WebGoat-Pantera.zip WebGoat and Pantera presentation (Philippe Bogaerts)] || WebGoat and Pantera presentation   || Novice || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_AOP_security.zip Security implications of AOP for secure software (Bart De Win)] || Security implications of AOP for secure software || Expert || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/12/OWASP_Denver_Nov-06_presentation.ppt testing for common security flaws (David Byrne)] || testing for common security flaws || Intermediate || Nov 2006 || [[Denver|Denver]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/7c/Owasp-olli.pdf 40-ish slides on analyzing threats (Olli)] || Analyzing Threats || Novice || Dec 2006 || [[Helsinki|Helsinki]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/2c/KC_Dec2006_Attacking_The_App.pdf Attacking the Application (Dave Ferguson)] || Vulnerabilities, attacks and coding suggestions || Intermediate || Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/6a/KC_Dec2006_Ajax_Security_Concerns.pdf Ajax Security Concerns (Rohini Sulatycki)] || Ajax Security Concerns || Intermediate ||Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 Web Application Testing (Matteo Meucci)] || Anatomy of 2 Web Application Testing || Intermediate || Mar 2006 || [[Italy|Italy]]&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|[https://www.owasp.org/images/9/99/WTE-Cloud-Austin-2012-02.pdf Testing From the Cloud: Is the Sky Falling? ] || WTE Cloud-based Testing || Intermediate || Feb 2012 || [[Austin|Austin]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|(https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio) || Open Web application Security Project|| Intermediate|| 2015-07-04 || &lt;br /&gt;
&lt;br /&gt;
Chapter 4&lt;br /&gt;
&lt;br /&gt;
Specification Language&lt;br /&gt;
&lt;br /&gt;
This formal specification by language example presents cybersecurity studies (of over 10 projects) of how successful OWASP educational presentations test develop design and deliver cybersecurity software efficiently supporting formal methods as mathematically based techniquesthat are needed to assist  in the design and implementation of reliable cybersecurity software.&lt;br /&gt;
&lt;br /&gt;
Specification by language example is a must read for anyone serious about delivering translated cybersecurity language software that matters It is the result of a research on how teams internationally specify test develop design and deliver the right cybersecurity software without defects in very short computational delivery cycles  With cybersecurity case studies and real examples this presentation helps you understand how successful teams implement mathematical cybersecurity by example denoting &lt;br /&gt;
acceptable testing and behavior driven  development to bridge the communication gap between committees stakeholders and contributing teams build quality into cybersecurity from the start by testing developing designing and delivering supported languagfor syntax highlighting purposes It presents the collective knowledge of about 50 cybersecurity projects ranging from high traffic websites to virtual back office cybersecurity systems implemented by teams as diverse as small startups to groups spread across different continents working in a range of processes including Extreme programming Kanban Scrum and similar processes often bundled together under the names Lean and Agile This protocol is for testers software developers business analysts and project managers working on Syntax and Agile projects or teams moving to an Agile development method that want to improve quality  reduce correction of defective cybersecurity software and collaborate better with the OWASP committee.&lt;br /&gt;
Smith&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Retrieved notes from Categories Specification languages and Formal specification &lt;br /&gt;
For the last past decade computer systems have become increasingly more powerful as a result becoming more impactful to society  Established engineering disciplines use mathematical analysis as the foundation of creating and validating product design Formal language specifications are one im such a way for achievement in software engineering as reliability  once predicted Other methods such as testing are more commonly used to enhance code quality&lt;br /&gt;
&lt;br /&gt;
Usability given as such a specification it is possible to use formal verification techniques to demonstrate that a system design is correct with respect to its specification This allows incorrect system designs to be revised before any major investments have been made into an actual implementation Another approach is to use provably correct refinement steps to transform a specification into a design which is ultimately transformed into an implementation that is correct by construction.&lt;br /&gt;
&lt;br /&gt;
*It is important to note that a formal specification is not an implementation but rather it may be used to develop an implementation Formal specifications describe what a system should do not how the system should do it A good specification must have some of the following attributes: adequate internally consistent unambiguous complete satisfied constructability manageability and evolvability Usability Communicability Powerful and efficient analysis which is one of the main reasons there is interest in formal specifications that will provide an ability to perform proofs on cybersecurity software implementations These proofs may be used to validate a specification verify correctness of design, or to prove that a program satisfies a specification.&lt;br /&gt;
&lt;br /&gt;
Limitations&lt;br /&gt;
A design (or implementation) cannot ever be declared “correct” on its own. It can only ever be “corrected with respect to a given specification Whether the formal specification correctly describes the problem to be solved is a separate issue It is also a difficult issue to address since it ultimately concerns the problem constructing abstracted formal representations of an informal concrete problem domain and such an abstraction step is not amenable to formal proof. However, it is possible to validate a specification by proving “challenge” theorems concerning properties that the specification is expected to exhibit.o_O If correct Olloclip In these theorems reinforce the specifier's understanding of the specification and its relationship with the underlying problem domain If not the specification probably needs to be changed to better reflect the domain understanding of those involved with producing (and implementing) the specification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Flexibility&lt;br /&gt;
As far as flexibility goes a lot of software companies use agile methodologies that focus on flexibility Doing a formal specification of the whole system up front is often perceived as being the opposite of flexible However there is some research into the benefits of using formal specifications with &amp;quot;agile&amp;quot; development&lt;br /&gt;
Complexity is a requirement that is a high level of mathematical expertise and the analytical skills to understand and apply them effectively&lt;br /&gt;
I have a solution to develop resources and models that allow for these techniques to be implemented but hide underlying mathematics&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I hope to accomplish a good job of specifying user interfaces and user interaction that is Not cost-effective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Formal specification techniques have existed in various domains and on various scales for quite some time Implementations of formal specifications will differ depending on what kind of system they are attempting to model how they are applied and at what point in the software life cycle they have been introduced These types of models can be categorized into the following specification paradigms:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
History-based specification&lt;br /&gt;
&lt;br /&gt;
behavior based system histories&lt;br /&gt;
assertions are interpreted over time&lt;br /&gt;
State-based Specification&lt;br /&gt;
behavior based on system states&lt;br /&gt;
series of sequential steps (e.g. a financial transaction)&lt;br /&gt;
languages such as Z, VDM or B rely on this paradigm+&lt;br /&gt;
Transition-based specification&lt;br /&gt;
behavior based on transitions from state-to-state of the system&lt;br /&gt;
best used with a reactive system&lt;br /&gt;
languages such as Statecharts PROMELA STeP-SPL RSML or SCR rely on this paradigm&lt;br /&gt;
Functional specification&lt;br /&gt;
specify a system as a structure of mathematical functions&lt;br /&gt;
OBJ, ASL, PLUSS, LARCH, HOL or PVS rely on this paradigm&lt;br /&gt;
Operational Specification&lt;br /&gt;
early languages such as Paisley GIST Petri nets or process algebras rely on this paradigm&lt;br /&gt;
In addition to the above paradigms there are ways to apply certain heuristics to help improve the creation of these specifications The protocol referenced here best discusses heuristics to use when designing a specification.Heuristics= a rule or method that helps you solve problems faster than you would if you did all the computing&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
Algebraic specification= Providing a mathematical software engineering technique &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
^ a b c d e f g h i j k l m n o Lamsweerde, A. V. (2000). &amp;quot;Formal specification&amp;quot;. Proceedings of the conference on the future of Software engineering - ICSE '00. p. 147. doi:10.1145/336512.336546. ISBN &lt;br /&gt;
^ a b c d Sommerville, Ian (2009). &amp;quot;Formal Specification&amp;quot; (PDF). Software Engineering. Retrieved&lt;br /&gt;
^ a b c Nummenmaa, Timo; Tiensuu, Aleksi; Berki, Eleni; Mikkonen, Tommi; Kuittinen, Jussi; Kultima, Annakaisa (4 August 2011). &amp;quot;Supporting agile development by facilitating natural user interaction with executable formal specifications&amp;quot;. ACM SIGSOFT Software Engineering Notes 36 (4): 1–10. doi:10.1145/1988997.2003643. edit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Best Wishes,&lt;br /&gt;
Brenda Smith&lt;br /&gt;
a55dayidream@gmail.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Specification languages]]&lt;br /&gt;
[[Category:OWASP Education Project]]&lt;br /&gt;
[[Category:OWASP Presentations]]&lt;br /&gt;
[[Category:Chapter Resources]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197493</id>
		<title>OWASP Education Presentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197493"/>
				<updated>2015-07-16T14:23:49Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* OWASP Education Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page provide a commented overview of the OWASP presentations available.&amp;lt;br&amp;gt;&lt;br /&gt;
Please use the last line of the tables as template.&amp;lt;br&amp;gt;&lt;br /&gt;
Presentions can be tracked through:&lt;br /&gt;
* the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]&lt;br /&gt;
* From the chapter pages&lt;br /&gt;
Everybody is encouraged to link the presentations and add their findings on this page !&lt;br /&gt;
There are currently hundreds of presentations all over the OWASP web site. &lt;br /&gt;
If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.&lt;br /&gt;
Feel free to “mine” them and add them to the overview.&lt;br /&gt;
&lt;br /&gt;
== OWASP Education Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Education Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (2015-07-04)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/index.php/Education/Free_Training Free Developer Training]|| Developer AppSec Course by [[Eoin Keary]] and [https://www.owasp.org/index.php/User:Jmanico Jim Manico] || Intermediate || 2014-04-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Winter 2009v1.pptx|OWASP Overview Winter 2009]]|| Updated overview of OWASP || Novice || 2009-12-08&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Programa_de_Educacion_OWASP.ppt|Programa de Educacion OWASP]]|| Una introduccion a OWASP para Universidades y Centros Educativos por Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_Educational_Programme.ppt|OWASP Educational Programme]]|| An introduction to OWASP for Universities &amp;amp; Educational Institutions by Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Summer 2009.pptx|OWASP Overview Summer 2009]]|| Recent overview of OWASP by Jeff Williams || Novice || 2009-08-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Why WebAppSec Matters.ppt|Why WebAppSec Matters]]|| This module explains why security should be considered when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-Intro-2008-portuguese.ppt|OWASP Intro 2008 Portuguese]]|| Este módulo é uma intrudução sobre o projeto OWASP. || Novice || 2008-07-06&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module OWASP Top 10 Introduction and Remedies.ppt|OWASP Top 10 Introduction and Remedies]]|| This module explains the OWASP Top 10 web application vulnerabilities as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Embed within SDLC.ppt|Embed within SDLC]]|| This module explains the complete approach of Web Application Security when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good Secure Development Practices.ppt|Good Secure Development Practices]]|| This module explains some good secure development practices when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Testing for Vulnerabilities.ppt|Testing for Vulnerabilities]]|| This module explains application security testing when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good WebAppSec Resources.ppt|Good WebAppSec Resources]]|| This module points you to some good web application security resources when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
,&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Project Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Germany 2008 Conference OWASP Introduction v1.pptx|OWASP Introduction]] || OWASP Overview presentation covering OWASP, project parade and OWASP near you. Given by Seba during the Germany 2008 Conference || Novice || 2008-11-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 1.ppt|India08 Keynote - Part 1]] || OWASP Overview presentation. Part 1 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 2.ppt|India08 Keynote - Part 2]] || OWASP Overview presentation. Part 2 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP India - Tour of OWASP projects.ppt|Tour of OWASP’s projects]] || Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/images/5/59/RISK_2008_OWASP_Introduction_v1.pptx OWASP @ RISK08 (Norway)] || OWASP introduction at Norway RISK2008 conference by Seba || Novice || 2008-04-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP NY Keynote.ppt|OWASP NY Keynote by Jeff]] also available in [[:Image:20070620-FR-OWASP NY Keynote.ppt|French]]|| OWASP Overview presentation with slide &amp;quot;OWASP by the numbers&amp;quot; and slide with the sorry state of Tools (at best 45%) which caused some controverse || Novice || 2007-06-12&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 2007-01-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/e/e9/OWASP_Testing_Guide_Presentation_EUSecWest07.zip The OWASP Testing Guide v2 EUSecWest07 (Matteo Meucci, Alberto Revelli)] || Presentation at EUSecWest07 || Intermediate || 2007-03-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3c/OWASP_Flyer_Sep06.ppt OWASP Project Overview] || High level overview of projects and how OWASP works || Novice || 2006-09-19 &lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/4/49/OWASPAppSec2006Seattle_Security_Metrics.ppt The OWASP Application Security Metrics Project (Bob Austin)] || Presentation on the Application Security Metrics project || Novice || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/53/OWASPAppSecEU2006_CLASP_Project.ppt OWASP CLASP Project (Pravir Chandra)] || OWASP CLASP project presentation given at the 2006 European AppSec conference || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/30/OWASPAppSec2006Seattle_UsingSprajaxToTestAJAXSecurity.ppt Sprajax (Dan Cornell)] || OWASP Sprajax presentation given at the 2006 Seattle AppSec conference || Intermediate || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Conference Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Conference Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; | Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; | Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; | Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ModSecurityCoreRuleSet.ppt | Mod Security Core Rule Set (Ofer Shezaf)]] ||Ofer Shezaf's presentation on the Core Ruleset for the latest version of ModSecurity presented at 6th OWASP AppSec conference in Milan, Italy, in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPTestingGuide2v1.ppt | OWASP Testing Guide v2.1 (Matteo Meucci)]] ||Matteo Meucci's presentation on the OWASP Testing Guide v2 at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan CLASP.ppt | CLASP (Pravir Chandra)]] ||Pravir Chandra's presentation on the upcoming 2007 update to CLASP presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan AdvancedWebHacking.ppt | Advanced Web Hacking (PDP)]] ||PDPs presentation at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan XMLSecurityGatewayEvalCriteria.ppt | XML Security Gateway Evaluation Criteria (Gunnar Peterson)]] ||Gunnar Peterson's presentation about the new XML Security Gateway Evaluation Criteria project at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan TestingFlashApplications.ppt | Testing Flash Applications (Stephano Di Paolo)]] ||Stephano Di Paolo's presentation on how to test Flash applications presented at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert|| 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OvertakingGoogleDesktop.ppt | Overtaking Google Desktop (Yair Amit)]] ||Yair Amit's presentation on XSS Flaws in Google Desktop that can be exploited through google.com presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan MS ACETeamAppSecfromTheCore.ppt | ACE Team Application Security from the Core (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the Microsoft ACE team's application security process at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan Pantera.ppt | Pantera (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the new OWASP tool Pantera at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ProtectingWebAppsfromUniversalPDFXSS.ppt | Protecting Web applications from universal PDF XSS (Ivan Ristic)]] ||Ivan Ristic's Universal XSS PDF presentation at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SoftwareSecurity.ppt | Software Security (Rudolph Araujo)]] ||Rudolph Araujo's presentation on Application Security best practices at the 6th OWASP AppSec conference in Milan Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebGoatv5.ppt | WebGoat v5 (Dave Wichers)]] ||WebGoat v5 presentation by Dave Wichers at the 6th OWASP AppSec Conference in Milan, Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebScarabNG.ppt | WebScarab NG (Dave Wichers)]] ||Description of the new WebScarab-NG efforts presented by Dave Wichers at the 6th OWASP AppSec conference in Milan, Italy in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SANS SPSA Initiative.ppt | SANS SPSA Initiative (Dave Wichers)]] ||Description of the SANS Secure Coding Exam Initiative presented by Dave Wichers at the 6th OWASP AppSec conference in Milan Italy, May 2007.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPItalyActivities.ppt | OWASP Italy Activities (Raoul Chiesa)]] ||Raoul Chiesa's keynote for day 2 of the 6th OWASP AppSec conference on the state of application security in Italy including OWASP's activities in that country.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SecurityEngineeringInVista.ppt | Security engineering in Vista (Alex Lucas)]] ||Alex Lucas' from Microsoft's keynote presentation for Day 1 of the 6th OWASP AppSec conference in Milan on the benefits of Microsoft's SDL to the security of Vista. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/5f/OWASPAppSec2006Seattle_SecurityEngineeringInVista.ppt How the Security Development Lifecycle(SDL) Improved Windows Vista (Michael Howard)] || Michael Howard's talk on SDL from the OWASP Seattle AppSec Conference in 2006 || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/34/OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping the Application Assurance Process (Sebastien Deleersnyder)] || Presentation given during the European 2006 AppSec conference on the application assurance process || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8b/OWASPAppSecEU2006_InlineApproachforSecureSOAPRequests.ppt Inline Approach for Secure SOAP Requests and Early Validation (Mohammad Ashiqur Rahaman, Maartin Rits and Andreas Schaad SAP Research, Sophia Antipolis, France)] || Presentation given at the European 2006 AppSec conference about security and soap message structure issues || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/9c/OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls:When Are They Useful? (Ivan Ristic)] || Presentation about Web Application Firewalls || Novice || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/1a/OWASPAppSecEU2006_HTTPMessageSplittingSmugglingEtc.ppt HTTP Message Splitting, Smuggling and Other Animals (Amit Klein)] || A presentation about Message splitting other attacks around the HTTP protocol || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/OWASPAppSec2006Seattle_WebAppForensics.ppt Web Application Incident Response &amp;amp; Forensics: A Whole New Ball Game! (Rohyt Belani &amp;amp; Chuck Willis)] || Talk about Web Application Security incident handling and forensics given at the OWASP 2006 Seattle AppSec conference || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/d/d2/OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10.ppt Can (Automated) Testing Tools Really Find the OWASP Top 10? (Erwin Geirnaert) ] || A talk about how automated testing tools stack up against the OWASP top 10 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/28/OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding (Martin Johns / Justus Winter)] || Presentation given about how Sessions can be hi-jacked, etc... || Novice  || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/62/OWASPAppSecEU2006_SecurityTestingthruAutomatedSWTests.ppt Security Testing through Automated Software Tests (Stephen de Vries)] || Presentation given at the 2006 EuSec conference || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/0e/AppSec2005DC-Jeremy_Poteet-In_the_Line_of_Fire.ppt In the Line of Fire: Defending Highly Visible Targets (Jeremy Poteet)] || Conference given at the 2005 DC AppSec conference || Novice || 2005-10-1&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/93/AppSec2005DC-Matt_Fisher-Google_Hacking_and_Worms.ppt Google Hacking and Web Application Worms (Matt Fisher)] || Talk given at the 2005 DC AppSec conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/05/AppSec2005DC-Anthony_Canike-Enterprise_AppSec_Program.ppt Establishing an Enterprise Application Security Program (Tony Canike)] || Talk given at the 2005 DC AppSec Conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://owasp.org/images/0/0d/OWASPAppSec2006Seattle_Why_AJAX_Applications_More_Likely_Insecure.ppt Why AJAX Applications Are Far More Likely To Be Insecure (And What To Do About It) (Dave Wichers)] || Dave's talk on AJAX given at the Seattle 2006 AppSec conference || Intermediate || 2006-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[ (https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio) ||Security Analyst || Intermediate|| 2015-07-04&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Web Application Security Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Web Application Security Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Protecting Web Applications from Universal PDF XSS.ppt| Universal PDF XSS by Ivan Ristic]] || Protecting Web Applications from Universal PDF XSS || Intermediate || 2007-06-28&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:IdM-OWASP.v.0.2.14.pdf|Identity Management Basics (Derek Brown)]] ||Identity Management Basics|| Novice || 2007-05-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert || 2005-11-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate || 2006-02-27&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate || 2005-10-11&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/72/MMS_Spoofing.ppt MMS Spoofing (Matteo Meucci)] || A Case-study of a vulnerable web application || Intermediate&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f9/OWASPAppSecEU2006_AJAX_Security.ppt Ajax Security (Andrew van der Stock)] || Presentation on Ajax security for OWASP AppSec Europe 2006 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3a/OWASPAppSec2006Seattle_Web_Services_Security.ppt Advanced Web Services Security &amp;amp; Hacking (Justin Derry)] || Presentation given on Webservice security at the Seattle 2006 AppSec conference || Intermediate  || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/Integration_into_the_SDLC.ppt Integration into the SDLC (Eoin Keary)] || A presentation about why and how to integrate the SDLC. || Novice || 2005-04-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[ (https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio || Intermediate || 2015-07-04&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Chapter Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Month (Mon-yyyy)&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Chapter&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Common_Application_Flaws.ppt| Common Application Flaws (Brett Moore) ]] ||OWASP New Zealand chapter presentation on Common Application Flaws|| Novice/Intermediate ||November 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Time_Based_SQL_Injections.ppt| Time Based SQL Injections (Muhaimin Dzulfakar) ]] ||OWASP New Zealand chapter presentation on Time Based SQL Injections|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Browser_security.ppt| Browser Security (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Browser Security|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_CMH_SQLInjection__20080707.zip| 7/7/2008 SQL Injection (Columbus, OH)]] || SQL Injection Presentation given at the Columbus, OH OWASP Chapter Meeting. Powerpoint, derby DB, and applicable java code. || Novice / Intermediate || July 2008 || [[Columbus]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_ellak-Greece.ppt| Detecting Web Application Vulnerabilities Using Open Source Means (Konstantinos Papapanagiotou) ]] ||OWASP Greek Chapter presentation given at the Open Source Software (FLOSS) Conference in Athens|| Novice ||May 2008 || [[Greece]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Hacking_The_World_With_Flash.ppt| Hacking The World With Flash (Paul Craig) ]] ||OWASP New Zealand chapter presentation on Flash security|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web_spam_techniques.ppt| Web Spam Techniques (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Web Spam Techniques|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Xpath_Injection.ppt| Xpath Injection Overview (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Xpath Injection|| Intermediate ||February 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp security4mobileJava.pdf| Dependability for Java Mobile Code (Pierre Parrend) ]] ||OWASP Swiss chapter presentation on Mobile Java Security || Expert ||July 2007 || [[Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Trust Security Usability - v1.0.pdf|Trust, Security and Usability (Roger Carhuatocto) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-tratamiento_de_datos.pdf|Tratamiento seguro de datos en aplicaciones in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Conferencia_OWASP.pdf|Ataques DoS en aplicaciones Web (Jaime Blasco Bermejo) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Seguridad en entornos financieros.pdf|Seguridad en entornos financierosPedro (Pedro Sánchez) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Java_Open_Review.ppt|Brian Chess from Fortify shared what's going on with the Java Open Source review project at the June NoVA OWASP meeting]] || Java Open Review || Intermediate ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Bytecode_injection.ppt|Brian Chess from Fortify, presentation to NoVA OWASP chapter in June 2007.]] || Bytecode injection || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security at the VMM Layer - OWASP.ppt|Security at the VMM Layer by Ted Winograd]] || Security at the VMM Layer || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:KC June 2007 Evaluating and Tuning WAFs.pdf|Evaluating and Tuning Web Application Firewalls (Barry Archer)]] ||Presentation given at Kansas City June 2007 chapter meeting|| Intermediate ||June 2007 || [[Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_SDL-IT.pdf|Microsoft Security Development Lifecycle for IT (Rob Labbé)]] ||Presentation by Rob Labbe at Ottawa OWASP Chapter|| Novice ||May 2007|| [[Ottawa]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_Application_DOS.pdf|Application Denial of Service (Shaayy Cheen)]] ||Is it Really That Easy? Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_FuzzGuru.pdf|Fuzzing in Microsoft and FuzzGuru framework (John Neystadt)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_AppSec_and_Beyond.pdf|Application Security, not just development (David Lewis)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 Overtaking Google Desktop.pdf|Overtaking Google Desktop, Leveraging XSS to Raise Havoc (Yair Amit)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 UnregisterAttackInSip.pdf|Unregister Attack in SIP (Anat Bremler-Barr, Ronit Halachmi-Bekel and Jussi Kangasharju)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 WAF Positive Security.pdf|Positive Security Model for Web Applications, Challenges and Promise (Ofer Shezaf)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 DOT NET Reverse Engineering.pdf|.NET Reverse Engineering (Erez Metula)]] ||Presentation given at the Israel Mini Conference in May 2007|| Expert ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 OWASP Introduction.pdf|OWASP introduction (Ofer Shezaf)]] ||2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP BeLux 2007-06-22 Update on Internet Attack Statistics for Belgium in 2006.ppt|Update on Internet Attack Statistics for Belgium in 2006 by Hilar Leoste (Zone-H)]] || Update on Internet Attack Statistics for Belgium in 2006  || Novice ||May 2007 || [[Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:InfoSec_World_2007_-_Web_services_gateways.ppt Securing Web Services using XML Security Gateways by Tim Bond] || Securing Web Services using XML Security Gateways || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:SwA_Acquisition_WG_-_Overview.ppt Software Assurance in the Acquisition Process by Stan Wisseman] || Software Assurance in the Acquisition Process || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_Legal_Aspects_Jos_Dumortier.zip Legal Aspects of (Web) Application Security by Jos Dumortier] || Legal Aspects of (Web) Application Security  || Intermediate ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_AppSec_Research_Lieven_Desmet.zip AppSec Research (University Leuven Belgium)] ||  Formal absence of implementation bugs in web applications: a case study on indirect data sharing by Lieven Desmet || Expert ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Scanner-Sparkly.ppt|A Scanner Sparkly]] || A Scanner Sparkly, taken from the Phoenix OWASP presentations on Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp-lessonslearned.ppt|Grey Box Assessment Lessons Learned]] || &amp;quot;Grey Box Assessment Lessons Learned&amp;quot;, taken from the Phoenix OWASP presentations, Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_OWASP_Update.zip OWASP Update and OWASP BeLux Board Presentation (Seba)] || OWASP Update and OWASP BeLux Board Presentation || Novice||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security Metics- What can we measure- Zed Abbadi.pdf|Metics- What can we measure (Zed Abbadi)]] ||19 April NoVa chapter meeting presentation on Security Metrics || Novice ||April 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web Services Hacking and Hardening.pdf| Web Services Hacking and Hardening (Adam Vincent) ]] ||3/8/07 NoVA chapter meeting, Adam Vincent from Layer7  || Expert ||March 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/fe/Pres_20070206_04_svetsch_xss_worms_owasp.zip XSS Worms (Sven Vetsch)] || XSS Worms || Intermediate  ||Feb 2007 || [[Switzerland|Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_WebGoat-Pantera.zip WebGoat and Pantera presentation (Philippe Bogaerts)] || WebGoat and Pantera presentation   || Novice || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_AOP_security.zip Security implications of AOP for secure software (Bart De Win)] || Security implications of AOP for secure software || Expert || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/12/OWASP_Denver_Nov-06_presentation.ppt testing for common security flaws (David Byrne)] || testing for common security flaws || Intermediate || Nov 2006 || [[Denver|Denver]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/7c/Owasp-olli.pdf 40-ish slides on analyzing threats (Olli)] || Analyzing Threats || Novice || Dec 2006 || [[Helsinki|Helsinki]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/2c/KC_Dec2006_Attacking_The_App.pdf Attacking the Application (Dave Ferguson)] || Vulnerabilities, attacks and coding suggestions || Intermediate || Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/6a/KC_Dec2006_Ajax_Security_Concerns.pdf Ajax Security Concerns (Rohini Sulatycki)] || Ajax Security Concerns || Intermediate ||Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 Web Application Testing (Matteo Meucci)] || Anatomy of 2 Web Application Testing || Intermediate || Mar 2006 || [[Italy|Italy]]&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|[https://www.owasp.org/images/9/99/WTE-Cloud-Austin-2012-02.pdf Testing From the Cloud: Is the Sky Falling? ] || WTE Cloud-based Testing || Intermediate || Feb 2012 || [[Austin|Austin]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|(https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio) || Open Web application Security Project|| Intermediate|| 2015-07-04 || &lt;br /&gt;
&lt;br /&gt;
Chapter 4&lt;br /&gt;
&lt;br /&gt;
Specification Language&lt;br /&gt;
&lt;br /&gt;
This formal specification by language example presents cybersecurity studies (of over 10 projects) of how successful OWASP educational presentations test develop design and deliver cybersecurity software efficiently supporting formal methods as mathematically based techniquesthat are needed to assist  in the design and implementation of reliable cybersecurity software.&lt;br /&gt;
&lt;br /&gt;
Specification by language example is a must read for anyone serious about delivering translated cybersecurity language software that matters It is the result of a research on how teams internationally specify test develop design and deliver the right cybersecurity software without defects in very short computational delivery cycles  With cybersecurity case studies and real examples this presentation helps you understand how successful teams implement mathematical cybersecurity by example denoting &lt;br /&gt;
acceptable testing and behavior driven  development to bridge the communication gap between committees stakeholders and contributing teams build quality into cybersecurity from the start by testing developing designing and delivering supported languagfor syntax highlighting purposes It presents the collective knowledge of about 50 cybersecurity projects ranging from high traffic websites to virtual back office cybersecurity systems implemented by teams as diverse as small startups to groups spread across different continents working in a range of processes including Extreme programming Kanban Scrum and similar processes often bundled together under the names Lean and Agile This protocol is for testers software developers business analysts and project managers working on Syntax and Agile projects or teams moving to an Agile development method that want to improve quality  reduce correction of defective cybersecurity software and collaborate better with the OWASP committee.&lt;br /&gt;
Smith&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Retrieved notes from Categories Specification languages and Formal specification &lt;br /&gt;
For the last past decade computer systems have become increasingly more powerful as a result becoming more impactful to society  Established engineering disciplines use mathematical analysis as the foundation of creating and validating product design Formal language specifications are one im such a way for achievement in software engineering as reliability  once predicted Other methods such as testing are more commonly used to enhance code quality&lt;br /&gt;
&lt;br /&gt;
Usability given as such a specification it is possible to use formal verification techniques to demonstrate that a system design is correct with respect to its specification This allows incorrect system designs to be revised before any major investments have been made into an actual implementation Another approach is to use provably correct refinement steps to transform a specification into a design which is ultimately transformed into an implementation that is correct by construction.&lt;br /&gt;
&lt;br /&gt;
*It is important to note that a formal specification is not an implementation but rather it may be used to develop an implementation Formal specifications describe what a system should do not how the system should do it A good specification must have some of the following attributes: adequate internally consistent unambiguous complete satisfied constructability manageability and evolvability Usability Communicability Powerful and efficient analysis which is one of the main reasons there is interest in formal specifications that will provide an ability to perform proofs on cybersecurity software implementations These proofs may be used to validate a specification verify correctness of design, or to prove that a program satisfies a specification.&lt;br /&gt;
&lt;br /&gt;
Limitations&lt;br /&gt;
A design (or implementation) cannot ever be declared “correct” on its own. It can only ever be “corrected with respect to a given specification Whether the formal specification correctly describes the problem to be solved is a separate issue It is also a difficult issue to address since it ultimately concerns the problem constructing abstracted formal representations of an informal concrete problem domain and such an abstraction step is not amenable to formal proof. However, it is possible to validate a specification by proving “challenge” theorems concerning properties that the specification is expected to exhibit.o_O If correct Olloclip In these theorems reinforce the specifier's understanding of the specification and its relationship with the underlying problem domain If not the specification probably needs to be changed to better reflect the domain understanding of those involved with producing (and implementing) the specification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Flexibility&lt;br /&gt;
As far as flexibility goes a lot of software companies use agile methodologies that focus on flexibility Doing a formal specification of the whole system up front is often perceived as being the opposite of flexible However there is some research into the benefits of using formal specifications with &amp;quot;agile&amp;quot; development&lt;br /&gt;
Complexity is a requirement that is a high level of mathematical expertise and the analytical skills to understand and apply them effectively&lt;br /&gt;
I have a solution to develop resources and models that allow for these techniques to be implemented but hide underlying mathematics&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I hope to accomplish a good job of specifying user interfaces and user interaction that is Not cost-effective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Formal specification techniques have existed in various domains and on various scales for quite some time Implementations of formal specifications will differ depending on what kind of system they are attempting to model how they are applied and at what point in the software life cycle they have been introduced These types of models can be categorized into the following specification paradigms:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
History-based specification&lt;br /&gt;
&lt;br /&gt;
behavior based system histories&lt;br /&gt;
assertions are interpreted over time&lt;br /&gt;
State-based Specification&lt;br /&gt;
behavior based on system states&lt;br /&gt;
series of sequential steps (e.g. a financial transaction)&lt;br /&gt;
languages such as Z, VDM or B rely on this paradigm+&lt;br /&gt;
Transition-based specification&lt;br /&gt;
behavior based on transitions from state-to-state of the system&lt;br /&gt;
best used with a reactive system&lt;br /&gt;
languages such as Statecharts PROMELA STeP-SPL RSML or SCR rely on this paradigm&lt;br /&gt;
Functional specification&lt;br /&gt;
specify a system as a structure of mathematical functions&lt;br /&gt;
OBJ, ASL, PLUSS, LARCH, HOL or PVS rely on this paradigm&lt;br /&gt;
Operational Specification&lt;br /&gt;
early languages such as Paisley GIST Petri nets or process algebras rely on this paradigm&lt;br /&gt;
In addition to the above paradigms there are ways to apply certain heuristics to help improve the creation of these specifications The protocol referenced here best discusses heuristics to use when designing a specification.Heuristics= a rule or method that helps you solve problems faster than you would if you did all the computing&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
Algebraic specification= Providing a mathematical software engineering technique &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
^ a b c d e f g h i j k l m n o Lamsweerde, A. V. (2000). &amp;quot;Formal specification&amp;quot;. Proceedings of the conference on the future of Software engineering - ICSE '00. p. 147. doi:10.1145/336512.336546. ISBN &lt;br /&gt;
^ a b c d Sommerville, Ian (2009). &amp;quot;Formal Specification&amp;quot; (PDF). Software Engineering. Retrieved&lt;br /&gt;
^ a b c Nummenmaa, Timo; Tiensuu, Aleksi; Berki, Eleni; Mikkonen, Tommi; Kuittinen, Jussi; Kultima, Annakaisa (4 August 2011). &amp;quot;Supporting agile development by facilitating natural user interaction with executable formal specifications&amp;quot;. ACM SIGSOFT Software Engineering Notes 36 (4): 1–10. doi:10.1145/1988997.2003643. edit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Best Wishes,&lt;br /&gt;
Brenda Smith&lt;br /&gt;
a55dayidream@gmail.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Specification languages]]&lt;br /&gt;
[[Category:OWASP Education Project]]&lt;br /&gt;
[[Category:OWASP Presentations]]&lt;br /&gt;
[[Category:Chapter Resources]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197492</id>
		<title>OWASP Education Presentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=197492"/>
				<updated>2015-07-16T14:23:29Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* OWASP Project Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page provide a commented overview of the OWASP presentations available.&amp;lt;br&amp;gt;&lt;br /&gt;
Please use the last line of the tables as template.&amp;lt;br&amp;gt;&lt;br /&gt;
Presentions can be tracked through:&lt;br /&gt;
* the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]&lt;br /&gt;
* From the chapter pages&lt;br /&gt;
Everybody is encouraged to link the presentations and add their findings on this page !&lt;br /&gt;
There are currently hundreds of presentations all over the OWASP web site. &lt;br /&gt;
If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.&lt;br /&gt;
Feel free to “mine” them and add them to the overview.&lt;br /&gt;
&lt;br /&gt;
== OWASP Education Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Education Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (2015-07-04)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/index.php/Education/Free_Training Free Developer Training]|| Developer AppSec Course by [[Eoin Keary]] and [https://www.owasp.org/index.php/User:Jmanico Jim Manico] || Intermediate || 2014-04-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Winter 2009v1.pptx|OWASP Overview Winter 2009]]|| Updated overview of OWASP || Novice || 2009-12-08&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Programa_de_Educacion_OWASP.ppt|Programa de Educacion OWASP]]|| Una introduccion a OWASP para Universidades y Centros Educativos por Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_Educational_Programme.ppt|OWASP Educational Programme]]|| An introduction to OWASP for Universities &amp;amp; Educational Institutions by Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Summer 2009.pptx|OWASP Overview Summer 2009]]|| Recent overview of OWASP by Jeff Williams || Novice || 2009-08-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Why WebAppSec Matters.ppt|Why WebAppSec Matters]]|| This module explains why security should be considered when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-Intro-2008-portuguese.ppt|OWASP Intro 2008 Portuguese]]|| Este módulo é uma intrudução sobre o projeto OWASP. || Novice || 2008-07-06&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module OWASP Top 10 Introduction and Remedies.ppt|OWASP Top 10 Introduction and Remedies]]|| This module explains the OWASP Top 10 web application vulnerabilities as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Embed within SDLC.ppt|Embed within SDLC]]|| This module explains the complete approach of Web Application Security when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good Secure Development Practices.ppt|Good Secure Development Practices]]|| This module explains some good secure development practices when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Testing for Vulnerabilities.ppt|Testing for Vulnerabilities]]|| This module explains application security testing when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good WebAppSec Resources.ppt|Good WebAppSec Resources]]|| This module points you to some good web application security resources when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[ (https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio) || OWASP Education Presentation|| Intermediate || 2015-07-04&lt;br /&gt;
|}&lt;br /&gt;
,&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Project Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Germany 2008 Conference OWASP Introduction v1.pptx|OWASP Introduction]] || OWASP Overview presentation covering OWASP, project parade and OWASP near you. Given by Seba during the Germany 2008 Conference || Novice || 2008-11-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 1.ppt|India08 Keynote - Part 1]] || OWASP Overview presentation. Part 1 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 2.ppt|India08 Keynote - Part 2]] || OWASP Overview presentation. Part 2 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP India - Tour of OWASP projects.ppt|Tour of OWASP’s projects]] || Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/images/5/59/RISK_2008_OWASP_Introduction_v1.pptx OWASP @ RISK08 (Norway)] || OWASP introduction at Norway RISK2008 conference by Seba || Novice || 2008-04-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP NY Keynote.ppt|OWASP NY Keynote by Jeff]] also available in [[:Image:20070620-FR-OWASP NY Keynote.ppt|French]]|| OWASP Overview presentation with slide &amp;quot;OWASP by the numbers&amp;quot; and slide with the sorry state of Tools (at best 45%) which caused some controverse || Novice || 2007-06-12&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 2007-01-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/e/e9/OWASP_Testing_Guide_Presentation_EUSecWest07.zip The OWASP Testing Guide v2 EUSecWest07 (Matteo Meucci, Alberto Revelli)] || Presentation at EUSecWest07 || Intermediate || 2007-03-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3c/OWASP_Flyer_Sep06.ppt OWASP Project Overview] || High level overview of projects and how OWASP works || Novice || 2006-09-19 &lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/4/49/OWASPAppSec2006Seattle_Security_Metrics.ppt The OWASP Application Security Metrics Project (Bob Austin)] || Presentation on the Application Security Metrics project || Novice || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/53/OWASPAppSecEU2006_CLASP_Project.ppt OWASP CLASP Project (Pravir Chandra)] || OWASP CLASP project presentation given at the 2006 European AppSec conference || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/30/OWASPAppSec2006Seattle_UsingSprajaxToTestAJAXSecurity.ppt Sprajax (Dan Cornell)] || OWASP Sprajax presentation given at the 2006 Seattle AppSec conference || Intermediate || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Conference Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Conference Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; | Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; | Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; | Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ModSecurityCoreRuleSet.ppt | Mod Security Core Rule Set (Ofer Shezaf)]] ||Ofer Shezaf's presentation on the Core Ruleset for the latest version of ModSecurity presented at 6th OWASP AppSec conference in Milan, Italy, in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPTestingGuide2v1.ppt | OWASP Testing Guide v2.1 (Matteo Meucci)]] ||Matteo Meucci's presentation on the OWASP Testing Guide v2 at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan CLASP.ppt | CLASP (Pravir Chandra)]] ||Pravir Chandra's presentation on the upcoming 2007 update to CLASP presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan AdvancedWebHacking.ppt | Advanced Web Hacking (PDP)]] ||PDPs presentation at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan XMLSecurityGatewayEvalCriteria.ppt | XML Security Gateway Evaluation Criteria (Gunnar Peterson)]] ||Gunnar Peterson's presentation about the new XML Security Gateway Evaluation Criteria project at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan TestingFlashApplications.ppt | Testing Flash Applications (Stephano Di Paolo)]] ||Stephano Di Paolo's presentation on how to test Flash applications presented at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert|| 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OvertakingGoogleDesktop.ppt | Overtaking Google Desktop (Yair Amit)]] ||Yair Amit's presentation on XSS Flaws in Google Desktop that can be exploited through google.com presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan MS ACETeamAppSecfromTheCore.ppt | ACE Team Application Security from the Core (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the Microsoft ACE team's application security process at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan Pantera.ppt | Pantera (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the new OWASP tool Pantera at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ProtectingWebAppsfromUniversalPDFXSS.ppt | Protecting Web applications from universal PDF XSS (Ivan Ristic)]] ||Ivan Ristic's Universal XSS PDF presentation at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SoftwareSecurity.ppt | Software Security (Rudolph Araujo)]] ||Rudolph Araujo's presentation on Application Security best practices at the 6th OWASP AppSec conference in Milan Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebGoatv5.ppt | WebGoat v5 (Dave Wichers)]] ||WebGoat v5 presentation by Dave Wichers at the 6th OWASP AppSec Conference in Milan, Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebScarabNG.ppt | WebScarab NG (Dave Wichers)]] ||Description of the new WebScarab-NG efforts presented by Dave Wichers at the 6th OWASP AppSec conference in Milan, Italy in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SANS SPSA Initiative.ppt | SANS SPSA Initiative (Dave Wichers)]] ||Description of the SANS Secure Coding Exam Initiative presented by Dave Wichers at the 6th OWASP AppSec conference in Milan Italy, May 2007.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPItalyActivities.ppt | OWASP Italy Activities (Raoul Chiesa)]] ||Raoul Chiesa's keynote for day 2 of the 6th OWASP AppSec conference on the state of application security in Italy including OWASP's activities in that country.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SecurityEngineeringInVista.ppt | Security engineering in Vista (Alex Lucas)]] ||Alex Lucas' from Microsoft's keynote presentation for Day 1 of the 6th OWASP AppSec conference in Milan on the benefits of Microsoft's SDL to the security of Vista. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/5f/OWASPAppSec2006Seattle_SecurityEngineeringInVista.ppt How the Security Development Lifecycle(SDL) Improved Windows Vista (Michael Howard)] || Michael Howard's talk on SDL from the OWASP Seattle AppSec Conference in 2006 || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/34/OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping the Application Assurance Process (Sebastien Deleersnyder)] || Presentation given during the European 2006 AppSec conference on the application assurance process || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8b/OWASPAppSecEU2006_InlineApproachforSecureSOAPRequests.ppt Inline Approach for Secure SOAP Requests and Early Validation (Mohammad Ashiqur Rahaman, Maartin Rits and Andreas Schaad SAP Research, Sophia Antipolis, France)] || Presentation given at the European 2006 AppSec conference about security and soap message structure issues || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/9c/OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls:When Are They Useful? (Ivan Ristic)] || Presentation about Web Application Firewalls || Novice || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/1a/OWASPAppSecEU2006_HTTPMessageSplittingSmugglingEtc.ppt HTTP Message Splitting, Smuggling and Other Animals (Amit Klein)] || A presentation about Message splitting other attacks around the HTTP protocol || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/OWASPAppSec2006Seattle_WebAppForensics.ppt Web Application Incident Response &amp;amp; Forensics: A Whole New Ball Game! (Rohyt Belani &amp;amp; Chuck Willis)] || Talk about Web Application Security incident handling and forensics given at the OWASP 2006 Seattle AppSec conference || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/d/d2/OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10.ppt Can (Automated) Testing Tools Really Find the OWASP Top 10? (Erwin Geirnaert) ] || A talk about how automated testing tools stack up against the OWASP top 10 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/28/OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding (Martin Johns / Justus Winter)] || Presentation given about how Sessions can be hi-jacked, etc... || Novice  || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/62/OWASPAppSecEU2006_SecurityTestingthruAutomatedSWTests.ppt Security Testing through Automated Software Tests (Stephen de Vries)] || Presentation given at the 2006 EuSec conference || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/0e/AppSec2005DC-Jeremy_Poteet-In_the_Line_of_Fire.ppt In the Line of Fire: Defending Highly Visible Targets (Jeremy Poteet)] || Conference given at the 2005 DC AppSec conference || Novice || 2005-10-1&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/93/AppSec2005DC-Matt_Fisher-Google_Hacking_and_Worms.ppt Google Hacking and Web Application Worms (Matt Fisher)] || Talk given at the 2005 DC AppSec conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/05/AppSec2005DC-Anthony_Canike-Enterprise_AppSec_Program.ppt Establishing an Enterprise Application Security Program (Tony Canike)] || Talk given at the 2005 DC AppSec Conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://owasp.org/images/0/0d/OWASPAppSec2006Seattle_Why_AJAX_Applications_More_Likely_Insecure.ppt Why AJAX Applications Are Far More Likely To Be Insecure (And What To Do About It) (Dave Wichers)] || Dave's talk on AJAX given at the Seattle 2006 AppSec conference || Intermediate || 2006-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[ (https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio) ||Security Analyst || Intermediate|| 2015-07-04&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Web Application Security Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Web Application Security Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Protecting Web Applications from Universal PDF XSS.ppt| Universal PDF XSS by Ivan Ristic]] || Protecting Web Applications from Universal PDF XSS || Intermediate || 2007-06-28&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:IdM-OWASP.v.0.2.14.pdf|Identity Management Basics (Derek Brown)]] ||Identity Management Basics|| Novice || 2007-05-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert || 2005-11-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate || 2006-02-27&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate || 2005-10-11&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/72/MMS_Spoofing.ppt MMS Spoofing (Matteo Meucci)] || A Case-study of a vulnerable web application || Intermediate&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f9/OWASPAppSecEU2006_AJAX_Security.ppt Ajax Security (Andrew van der Stock)] || Presentation on Ajax security for OWASP AppSec Europe 2006 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3a/OWASPAppSec2006Seattle_Web_Services_Security.ppt Advanced Web Services Security &amp;amp; Hacking (Justin Derry)] || Presentation given on Webservice security at the Seattle 2006 AppSec conference || Intermediate  || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/Integration_into_the_SDLC.ppt Integration into the SDLC (Eoin Keary)] || A presentation about why and how to integrate the SDLC. || Novice || 2005-04-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[ (https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio || Intermediate || 2015-07-04&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Chapter Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Month (Mon-yyyy)&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Chapter&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Common_Application_Flaws.ppt| Common Application Flaws (Brett Moore) ]] ||OWASP New Zealand chapter presentation on Common Application Flaws|| Novice/Intermediate ||November 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Time_Based_SQL_Injections.ppt| Time Based SQL Injections (Muhaimin Dzulfakar) ]] ||OWASP New Zealand chapter presentation on Time Based SQL Injections|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Browser_security.ppt| Browser Security (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Browser Security|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_CMH_SQLInjection__20080707.zip| 7/7/2008 SQL Injection (Columbus, OH)]] || SQL Injection Presentation given at the Columbus, OH OWASP Chapter Meeting. Powerpoint, derby DB, and applicable java code. || Novice / Intermediate || July 2008 || [[Columbus]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_ellak-Greece.ppt| Detecting Web Application Vulnerabilities Using Open Source Means (Konstantinos Papapanagiotou) ]] ||OWASP Greek Chapter presentation given at the Open Source Software (FLOSS) Conference in Athens|| Novice ||May 2008 || [[Greece]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Hacking_The_World_With_Flash.ppt| Hacking The World With Flash (Paul Craig) ]] ||OWASP New Zealand chapter presentation on Flash security|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web_spam_techniques.ppt| Web Spam Techniques (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Web Spam Techniques|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Xpath_Injection.ppt| Xpath Injection Overview (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Xpath Injection|| Intermediate ||February 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp security4mobileJava.pdf| Dependability for Java Mobile Code (Pierre Parrend) ]] ||OWASP Swiss chapter presentation on Mobile Java Security || Expert ||July 2007 || [[Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Trust Security Usability - v1.0.pdf|Trust, Security and Usability (Roger Carhuatocto) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-tratamiento_de_datos.pdf|Tratamiento seguro de datos en aplicaciones in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Conferencia_OWASP.pdf|Ataques DoS en aplicaciones Web (Jaime Blasco Bermejo) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Seguridad en entornos financieros.pdf|Seguridad en entornos financierosPedro (Pedro Sánchez) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Java_Open_Review.ppt|Brian Chess from Fortify shared what's going on with the Java Open Source review project at the June NoVA OWASP meeting]] || Java Open Review || Intermediate ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Bytecode_injection.ppt|Brian Chess from Fortify, presentation to NoVA OWASP chapter in June 2007.]] || Bytecode injection || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security at the VMM Layer - OWASP.ppt|Security at the VMM Layer by Ted Winograd]] || Security at the VMM Layer || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:KC June 2007 Evaluating and Tuning WAFs.pdf|Evaluating and Tuning Web Application Firewalls (Barry Archer)]] ||Presentation given at Kansas City June 2007 chapter meeting|| Intermediate ||June 2007 || [[Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_SDL-IT.pdf|Microsoft Security Development Lifecycle for IT (Rob Labbé)]] ||Presentation by Rob Labbe at Ottawa OWASP Chapter|| Novice ||May 2007|| [[Ottawa]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_Application_DOS.pdf|Application Denial of Service (Shaayy Cheen)]] ||Is it Really That Easy? Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_FuzzGuru.pdf|Fuzzing in Microsoft and FuzzGuru framework (John Neystadt)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_AppSec_and_Beyond.pdf|Application Security, not just development (David Lewis)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 Overtaking Google Desktop.pdf|Overtaking Google Desktop, Leveraging XSS to Raise Havoc (Yair Amit)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 UnregisterAttackInSip.pdf|Unregister Attack in SIP (Anat Bremler-Barr, Ronit Halachmi-Bekel and Jussi Kangasharju)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 WAF Positive Security.pdf|Positive Security Model for Web Applications, Challenges and Promise (Ofer Shezaf)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 DOT NET Reverse Engineering.pdf|.NET Reverse Engineering (Erez Metula)]] ||Presentation given at the Israel Mini Conference in May 2007|| Expert ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 OWASP Introduction.pdf|OWASP introduction (Ofer Shezaf)]] ||2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP BeLux 2007-06-22 Update on Internet Attack Statistics for Belgium in 2006.ppt|Update on Internet Attack Statistics for Belgium in 2006 by Hilar Leoste (Zone-H)]] || Update on Internet Attack Statistics for Belgium in 2006  || Novice ||May 2007 || [[Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:InfoSec_World_2007_-_Web_services_gateways.ppt Securing Web Services using XML Security Gateways by Tim Bond] || Securing Web Services using XML Security Gateways || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:SwA_Acquisition_WG_-_Overview.ppt Software Assurance in the Acquisition Process by Stan Wisseman] || Software Assurance in the Acquisition Process || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_Legal_Aspects_Jos_Dumortier.zip Legal Aspects of (Web) Application Security by Jos Dumortier] || Legal Aspects of (Web) Application Security  || Intermediate ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_AppSec_Research_Lieven_Desmet.zip AppSec Research (University Leuven Belgium)] ||  Formal absence of implementation bugs in web applications: a case study on indirect data sharing by Lieven Desmet || Expert ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Scanner-Sparkly.ppt|A Scanner Sparkly]] || A Scanner Sparkly, taken from the Phoenix OWASP presentations on Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp-lessonslearned.ppt|Grey Box Assessment Lessons Learned]] || &amp;quot;Grey Box Assessment Lessons Learned&amp;quot;, taken from the Phoenix OWASP presentations, Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_OWASP_Update.zip OWASP Update and OWASP BeLux Board Presentation (Seba)] || OWASP Update and OWASP BeLux Board Presentation || Novice||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security Metics- What can we measure- Zed Abbadi.pdf|Metics- What can we measure (Zed Abbadi)]] ||19 April NoVa chapter meeting presentation on Security Metrics || Novice ||April 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web Services Hacking and Hardening.pdf| Web Services Hacking and Hardening (Adam Vincent) ]] ||3/8/07 NoVA chapter meeting, Adam Vincent from Layer7  || Expert ||March 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/fe/Pres_20070206_04_svetsch_xss_worms_owasp.zip XSS Worms (Sven Vetsch)] || XSS Worms || Intermediate  ||Feb 2007 || [[Switzerland|Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_WebGoat-Pantera.zip WebGoat and Pantera presentation (Philippe Bogaerts)] || WebGoat and Pantera presentation   || Novice || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_AOP_security.zip Security implications of AOP for secure software (Bart De Win)] || Security implications of AOP for secure software || Expert || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/12/OWASP_Denver_Nov-06_presentation.ppt testing for common security flaws (David Byrne)] || testing for common security flaws || Intermediate || Nov 2006 || [[Denver|Denver]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/7c/Owasp-olli.pdf 40-ish slides on analyzing threats (Olli)] || Analyzing Threats || Novice || Dec 2006 || [[Helsinki|Helsinki]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/2c/KC_Dec2006_Attacking_The_App.pdf Attacking the Application (Dave Ferguson)] || Vulnerabilities, attacks and coding suggestions || Intermediate || Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/6a/KC_Dec2006_Ajax_Security_Concerns.pdf Ajax Security Concerns (Rohini Sulatycki)] || Ajax Security Concerns || Intermediate ||Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 Web Application Testing (Matteo Meucci)] || Anatomy of 2 Web Application Testing || Intermediate || Mar 2006 || [[Italy|Italy]]&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|[https://www.owasp.org/images/9/99/WTE-Cloud-Austin-2012-02.pdf Testing From the Cloud: Is the Sky Falling? ] || WTE Cloud-based Testing || Intermediate || Feb 2012 || [[Austin|Austin]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|(https://www.owasp.org/index.php/User_talk:Briechenstein_Software_Studio) || Open Web application Security Project|| Intermediate|| 2015-07-04 || &lt;br /&gt;
&lt;br /&gt;
Chapter 4&lt;br /&gt;
&lt;br /&gt;
Specification Language&lt;br /&gt;
&lt;br /&gt;
This formal specification by language example presents cybersecurity studies (of over 10 projects) of how successful OWASP educational presentations test develop design and deliver cybersecurity software efficiently supporting formal methods as mathematically based techniquesthat are needed to assist  in the design and implementation of reliable cybersecurity software.&lt;br /&gt;
&lt;br /&gt;
Specification by language example is a must read for anyone serious about delivering translated cybersecurity language software that matters It is the result of a research on how teams internationally specify test develop design and deliver the right cybersecurity software without defects in very short computational delivery cycles  With cybersecurity case studies and real examples this presentation helps you understand how successful teams implement mathematical cybersecurity by example denoting &lt;br /&gt;
acceptable testing and behavior driven  development to bridge the communication gap between committees stakeholders and contributing teams build quality into cybersecurity from the start by testing developing designing and delivering supported languagfor syntax highlighting purposes It presents the collective knowledge of about 50 cybersecurity projects ranging from high traffic websites to virtual back office cybersecurity systems implemented by teams as diverse as small startups to groups spread across different continents working in a range of processes including Extreme programming Kanban Scrum and similar processes often bundled together under the names Lean and Agile This protocol is for testers software developers business analysts and project managers working on Syntax and Agile projects or teams moving to an Agile development method that want to improve quality  reduce correction of defective cybersecurity software and collaborate better with the OWASP committee.&lt;br /&gt;
Smith&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Retrieved notes from Categories Specification languages and Formal specification &lt;br /&gt;
For the last past decade computer systems have become increasingly more powerful as a result becoming more impactful to society  Established engineering disciplines use mathematical analysis as the foundation of creating and validating product design Formal language specifications are one im such a way for achievement in software engineering as reliability  once predicted Other methods such as testing are more commonly used to enhance code quality&lt;br /&gt;
&lt;br /&gt;
Usability given as such a specification it is possible to use formal verification techniques to demonstrate that a system design is correct with respect to its specification This allows incorrect system designs to be revised before any major investments have been made into an actual implementation Another approach is to use provably correct refinement steps to transform a specification into a design which is ultimately transformed into an implementation that is correct by construction.&lt;br /&gt;
&lt;br /&gt;
*It is important to note that a formal specification is not an implementation but rather it may be used to develop an implementation Formal specifications describe what a system should do not how the system should do it A good specification must have some of the following attributes: adequate internally consistent unambiguous complete satisfied constructability manageability and evolvability Usability Communicability Powerful and efficient analysis which is one of the main reasons there is interest in formal specifications that will provide an ability to perform proofs on cybersecurity software implementations These proofs may be used to validate a specification verify correctness of design, or to prove that a program satisfies a specification.&lt;br /&gt;
&lt;br /&gt;
Limitations&lt;br /&gt;
A design (or implementation) cannot ever be declared “correct” on its own. It can only ever be “corrected with respect to a given specification Whether the formal specification correctly describes the problem to be solved is a separate issue It is also a difficult issue to address since it ultimately concerns the problem constructing abstracted formal representations of an informal concrete problem domain and such an abstraction step is not amenable to formal proof. However, it is possible to validate a specification by proving “challenge” theorems concerning properties that the specification is expected to exhibit.o_O If correct Olloclip In these theorems reinforce the specifier's understanding of the specification and its relationship with the underlying problem domain If not the specification probably needs to be changed to better reflect the domain understanding of those involved with producing (and implementing) the specification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Flexibility&lt;br /&gt;
As far as flexibility goes a lot of software companies use agile methodologies that focus on flexibility Doing a formal specification of the whole system up front is often perceived as being the opposite of flexible However there is some research into the benefits of using formal specifications with &amp;quot;agile&amp;quot; development&lt;br /&gt;
Complexity is a requirement that is a high level of mathematical expertise and the analytical skills to understand and apply them effectively&lt;br /&gt;
I have a solution to develop resources and models that allow for these techniques to be implemented but hide underlying mathematics&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I hope to accomplish a good job of specifying user interfaces and user interaction that is Not cost-effective&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Formal specification techniques have existed in various domains and on various scales for quite some time Implementations of formal specifications will differ depending on what kind of system they are attempting to model how they are applied and at what point in the software life cycle they have been introduced These types of models can be categorized into the following specification paradigms:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
History-based specification&lt;br /&gt;
&lt;br /&gt;
behavior based system histories&lt;br /&gt;
assertions are interpreted over time&lt;br /&gt;
State-based Specification&lt;br /&gt;
behavior based on system states&lt;br /&gt;
series of sequential steps (e.g. a financial transaction)&lt;br /&gt;
languages such as Z, VDM or B rely on this paradigm+&lt;br /&gt;
Transition-based specification&lt;br /&gt;
behavior based on transitions from state-to-state of the system&lt;br /&gt;
best used with a reactive system&lt;br /&gt;
languages such as Statecharts PROMELA STeP-SPL RSML or SCR rely on this paradigm&lt;br /&gt;
Functional specification&lt;br /&gt;
specify a system as a structure of mathematical functions&lt;br /&gt;
OBJ, ASL, PLUSS, LARCH, HOL or PVS rely on this paradigm&lt;br /&gt;
Operational Specification&lt;br /&gt;
early languages such as Paisley GIST Petri nets or process algebras rely on this paradigm&lt;br /&gt;
In addition to the above paradigms there are ways to apply certain heuristics to help improve the creation of these specifications The protocol referenced here best discusses heuristics to use when designing a specification.Heuristics= a rule or method that helps you solve problems faster than you would if you did all the computing&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
Algebraic specification= Providing a mathematical software engineering technique &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
^ a b c d e f g h i j k l m n o Lamsweerde, A. V. (2000). &amp;quot;Formal specification&amp;quot;. Proceedings of the conference on the future of Software engineering - ICSE '00. p. 147. doi:10.1145/336512.336546. ISBN &lt;br /&gt;
^ a b c d Sommerville, Ian (2009). &amp;quot;Formal Specification&amp;quot; (PDF). Software Engineering. Retrieved&lt;br /&gt;
^ a b c Nummenmaa, Timo; Tiensuu, Aleksi; Berki, Eleni; Mikkonen, Tommi; Kuittinen, Jussi; Kultima, Annakaisa (4 August 2011). &amp;quot;Supporting agile development by facilitating natural user interaction with executable formal specifications&amp;quot;. ACM SIGSOFT Software Engineering Notes 36 (4): 1–10. doi:10.1145/1988997.2003643. edit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Best Wishes,&lt;br /&gt;
Brenda Smith&lt;br /&gt;
a55dayidream@gmail.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Specification languages]]&lt;br /&gt;
[[Category:OWASP Education Project]]&lt;br /&gt;
[[Category:OWASP Presentations]]&lt;br /&gt;
[[Category:Chapter Resources]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=197206</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=197206"/>
				<updated>2015-07-09T11:09:05Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Join Our Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group Join our meetup group]&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
===Join Our Events===&lt;br /&gt;
&lt;br /&gt;
Please join our meetup group if you would like to attend future events:&lt;br /&gt;
It is important to RSVP if you would like to attend, our venue is not very big.&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/First_Official_OWASP_Cape_Town_Meeting First Official OWASP Cape Town Meeting]&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
&lt;br /&gt;
Slides from 1st Official OWASP Cape Town Meeting: [https://www.owasp.org/images/c/cd/Owasp-meeting1-17jun2015.pdf 1st Meeting Slides]&lt;br /&gt;
&lt;br /&gt;
Slides from 2nd Meeting [https://www.owasp.org/images/6/6e/Intro_To_Enumeration_FINAL_MAIL_OUT.odp Intro To Enumeration]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=197205</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=197205"/>
				<updated>2015-07-09T11:08:21Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group Join our meetup group]&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
===Join Our Events===&lt;br /&gt;
&lt;br /&gt;
Please join our meetup group if you would like to attend future events:&lt;br /&gt;
It is important to RSVP if you would like to attend, our venue is not very big.&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/First_Official_OWASP_Cape_Town_Meeting First Official OWASP Cape Town Meeting]&lt;br /&gt;
&lt;br /&gt;
Slides from 1st Official OWASP Cape Town Meeting: [https://www.owasp.org/images/c/cd/Owasp-meeting1-17jun2015.pdf 1st Meeting Slides]&lt;br /&gt;
Slides from 2nd Meeting [https://www.owasp.org/images/6/6e/Intro_To_Enumeration_FINAL_MAIL_OUT.odp Intro To Enumeration]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Intro_To_Enumeration_FINAL_MAIL_OUT.odp&amp;diff=197204</id>
		<title>File:Intro To Enumeration FINAL MAIL OUT.odp</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Intro_To_Enumeration_FINAL_MAIL_OUT.odp&amp;diff=197204"/>
				<updated>2015-07-09T10:59:29Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: Slides from 8 July 2015 Cape Town Chapter meeting.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slides from 8 July 2015 Cape Town Chapter meeting.&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197099</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197099"/>
				<updated>2015-07-06T16:52:32Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP Python Security Flyer&lt;br /&gt;
** [https://www.owasp.org/images/2/2b/OWASP_PYSEC_FLYER.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_PYSEC_FLYER.pdf&amp;diff=197098</id>
		<title>File:OWASP PYSEC FLYER.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_PYSEC_FLYER.pdf&amp;diff=197098"/>
				<updated>2015-07-06T16:51:18Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: Flyer for OWASP Python Security&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Flyer for OWASP Python Security&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197097</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197097"/>
				<updated>2015-07-06T16:48:54Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197096</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197096"/>
				<updated>2015-07-06T16:48:23Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Classifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:http://www.apache.org/images/asf_logo.gif|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197095</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197095"/>
				<updated>2015-07-06T16:44:46Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Detect and Respond to Attacks from Within the Application */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197094</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197094"/>
				<updated>2015-07-06T16:42:44Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197093</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197093"/>
				<updated>2015-07-06T16:42:13Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* In Print */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197092</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197092"/>
				<updated>2015-07-06T16:41:55Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Media */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197091</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197091"/>
				<updated>2015-07-06T16:40:19Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Detection Points */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197090</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197090"/>
				<updated>2015-07-06T16:39:23Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197089</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197089"/>
				<updated>2015-07-06T16:38:04Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Past activities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197088</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197088"/>
				<updated>2015-07-06T16:37:38Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Code Roadmap */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197086</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197086"/>
				<updated>2015-07-06T16:36:25Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Current activities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== General Roadmap ===&lt;br /&gt;
&lt;br /&gt;
&amp;quot;- Set up website with wiki&lt;br /&gt;
&lt;br /&gt;
- Configure mailing list&lt;br /&gt;
&lt;br /&gt;
- Configure github account and create code structure&lt;br /&gt;
&lt;br /&gt;
- Create Project presentation and pamphlet&lt;br /&gt;
&lt;br /&gt;
- Publish initial batch of documents on python security issues and possible mitigations with code examples&lt;br /&gt;
&lt;br /&gt;
- Create python secure coding area&lt;br /&gt;
&lt;br /&gt;
- Introduce project to OWASP Chapters&lt;br /&gt;
&lt;br /&gt;
- Publish initial version of python secure coding manual&lt;br /&gt;
&lt;br /&gt;
- Publish hardened version of python coded for security purposes&lt;br /&gt;
&lt;br /&gt;
- Document usage of code security policies and call whitelisting&lt;br /&gt;
&lt;br /&gt;
- Document usage of message deduplication and data storage in hash rings&lt;br /&gt;
&lt;br /&gt;
- Document usage of ESAPI-extended security checks, including but not limited to controls applied to python internal calls, strings, processes, permissions, and low level kernel calls&lt;br /&gt;
&lt;br /&gt;
- Create initial documentation of base libraries and modules&lt;br /&gt;
&lt;br /&gt;
- Release library to customizec and integrate OpenSSL and cURL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of HTTPS communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for SSL analysis of FTPS/FTPES communication over SSL&lt;br /&gt;
&lt;br /&gt;
- Release utility for analysis of POPS/IMAPS/SMTPS connections over SSL&lt;br /&gt;
&lt;br /&gt;
- Release of utility for archival of SSL certificates and CRLs&lt;br /&gt;
&lt;br /&gt;
- Release utility for PE extraction and hash generation from web files&lt;br /&gt;
&lt;br /&gt;
- Release update version of &amp;quot;&amp;quot;OWASP-ESAPI-python&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197085</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197085"/>
				<updated>2015-07-06T16:34:53Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Technical Roadmap ===&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/ebranca/owasp-pysec/blob/master/doc/ROADMAP.txt Technical Roadmap or TODO on github]&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197084</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197084"/>
				<updated>2015-07-06T16:33:11Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project Approach =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197083</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197083"/>
				<updated>2015-07-06T16:32:25Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project | Project Approach}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197082</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197082"/>
				<updated>2015-07-06T16:31:38Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Project Founder */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197081</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197081"/>
				<updated>2015-07-06T16:31:12Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Reference Implementation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:MichaelCoates Michael Coates] [mailto:michael.coates@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197080</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197080"/>
				<updated>2015-07-06T16:30:59Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Licensing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as recommended by OWASP. &lt;br /&gt;
You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
=== Reference Implementation ===&lt;br /&gt;
The reference implementation is licensed under the [http://opensource.org/licenses/MIT MIT License], which is a permissive (commercial-friendly) license only requiring you to include a copy of the license upon distribution or copying.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:MichaelCoates Michael Coates] [mailto:michael.coates@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197079</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197079"/>
				<updated>2015-07-06T16:30:31Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Licensing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)&lt;br /&gt;
This license is a community friendly license as reccomded by OWASP. You can read more here: &lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]&lt;br /&gt;
&lt;br /&gt;
=== Reference Implementation ===&lt;br /&gt;
The reference implementation is licensed under the [http://opensource.org/licenses/MIT MIT License], which is a permissive (commercial-friendly) license only requiring you to include a copy of the license upon distribution or copying.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:MichaelCoates Michael Coates] [mailto:michael.coates@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197078</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197078"/>
				<updated>2015-07-06T16:25:45Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP AppSensor is free to use. &lt;br /&gt;
&lt;br /&gt;
=== Reference Implementation ===&lt;br /&gt;
The reference implementation is licensed under the [http://opensource.org/licenses/MIT MIT License], which is a permissive (commercial-friendly) license only requiring you to include a copy of the license upon distribution or copying.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:MichaelCoates Michael Coates] [mailto:michael.coates@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* OWASP Python Security Github https://github.com/ebranca/owasp-pysec/ (Current)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197077</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197077"/>
				<updated>2015-07-06T16:24:22Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP AppSensor is free to use. &lt;br /&gt;
&lt;br /&gt;
=== Guide ===&lt;br /&gt;
The guide is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
=== Reference Implementation ===&lt;br /&gt;
The reference implementation is licensed under the [http://opensource.org/licenses/MIT MIT License], which is a permissive (commercial-friendly) license only requiring you to include a copy of the license upon distribution or copying.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:MichaelCoates Michael Coates] [mailto:michael.coates@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* AppSensor v2 https://github.com/jtmelton/appsensor (Current)&lt;br /&gt;
* Note: LEGACY AppSensor v1 https://code.google.com/p/appsensor/&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197076</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197076"/>
				<updated>2015-07-06T16:24:04Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP AppSensor is free to use. &lt;br /&gt;
&lt;br /&gt;
=== Guide ===&lt;br /&gt;
The guide is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
=== Reference Implementation ===&lt;br /&gt;
The reference implementation is licensed under the [http://opensource.org/licenses/MIT MIT License], which is a permissive (commercial-friendly) license only requiring you to include a copy of the license upon distribution or copying.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:MichaelCoates Michael Coates] [mailto:michael.coates@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* AppSensor v2 https://github.com/jtmelton/appsensor (Current)&lt;br /&gt;
* Note: LEGACY AppSensor v1 https://code.google.com/p/appsensor/&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197075</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197075"/>
				<updated>2015-07-06T16:21:54Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP AppSensor is free to use. &lt;br /&gt;
&lt;br /&gt;
=== Guide ===&lt;br /&gt;
The guide is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
=== Reference Implementation ===&lt;br /&gt;
The reference implementation is licensed under the [http://opensource.org/licenses/MIT MIT License], which is a permissive (commercial-friendly) license only requiring you to include a copy of the license upon distribution or copying.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Python Security Project? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:MichaelCoates Michael Coates] [mailto:michael.coates@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Enrico_Branca Enrico Branca] [mailto:enrico.branca@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [9 June 2015] AppSensor Code v2.1.0 [https://github.com/jtmelton/appsensor/releases/tag/v2.1.0 released]&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Code&lt;br /&gt;
* [19 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Documentation&lt;br /&gt;
* [09 Apr 2015] [https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf CISO Briefing] booklet published&lt;br /&gt;
* [22 Feb 2015] Proposal for [https://www.owasp.org/index.php/GSoC2015_Ideas#OWASP_AppSensor Google Summer of Code 2015]&lt;br /&gt;
* [13 Feb 2015] [https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf Introduction for Developers] flyer published&lt;br /&gt;
* [13 Feb 2015] AppSensor project awarded OWASP flagship status&lt;br /&gt;
* [28 Jan 2015] AppSensor Code v2.0.0 final [https://github.com/jtmelton/appsensor/releases/tag/v2.0.0 released]&lt;br /&gt;
* [18 Sep 2014] Guide book giveaway and signing at [http://2014.appsecusa.org/2014/ AppSecUSA 2014]&lt;br /&gt;
* [17 Sep 2014] Presentation at [http://www.meetup.com/London-API-Group/events/200768922/ London API Group]&lt;br /&gt;
* [12 Sep 2014] [http://appsensor.org/ AppSensor website] launched&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* AppSensor v2 https://github.com/jtmelton/appsensor (Current)&lt;br /&gt;
* Note: LEGACY AppSensor v1 https://code.google.com/p/appsensor/&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197074</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197074"/>
				<updated>2015-07-06T16:17:03Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
&lt;br /&gt;
* [http://www.crosstalkonline.org/ CrossTalk], The Journal of Defense Software Engineering&lt;br /&gt;
** Creating Attack-Aware Software Applications with Real Time Defenses, Vol. 24, No. 5, Sep/Oct 2011&lt;br /&gt;
&lt;br /&gt;
* Norwegian University of Science and Technology in Tronheim&lt;br /&gt;
** [http://ntnu.diva-portal.org/smash/record.jsf?pid=diva2:566091 AppSensor: Attack-Aware Applications Compared Against a Web Application Firewall and an Intrusion Detection System], Thomassen P, 2012&lt;br /&gt;
&lt;br /&gt;
*US Department of Homeland Security&lt;br /&gt;
** [https://buildsecurityin.us-cert.gov/swa/topics/resilient-software/ Resilient Software]&lt;br /&gt;
** [https://buildsecurityin.us-cert.gov/swa/resources Software Assurance Resources]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP AppSensor is free to use. &lt;br /&gt;
&lt;br /&gt;
=== Guide ===&lt;br /&gt;
The guide is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
=== Reference Implementation ===&lt;br /&gt;
The reference implementation is licensed under the [http://opensource.org/licenses/MIT MIT License], which is a permissive (commercial-friendly) license only requiring you to include a copy of the license upon distribution or copying.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is AppSensor? ==&lt;br /&gt;
&lt;br /&gt;
Detect and respond to attacks from within the application. This project includes both a well documented idea (the Guide) and a reference implementation (the Code). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Intro for Developers ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf Two-sided US Letter or A4]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-small.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
See the [http://appsensor.org/ new AppSensor website] for an introduction and quick start instructions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:MichaelCoates Michael Coates] [mailto:michael.coates@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dennis_Groves Dennis Groves] [mailto:dennis.groves@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:john.melton@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [9 June 2015] AppSensor Code v2.1.0 [https://github.com/jtmelton/appsensor/releases/tag/v2.1.0 released]&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Code&lt;br /&gt;
* [19 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Documentation&lt;br /&gt;
* [09 Apr 2015] [https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf CISO Briefing] booklet published&lt;br /&gt;
* [22 Feb 2015] Proposal for [https://www.owasp.org/index.php/GSoC2015_Ideas#OWASP_AppSensor Google Summer of Code 2015]&lt;br /&gt;
* [13 Feb 2015] [https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf Introduction for Developers] flyer published&lt;br /&gt;
* [13 Feb 2015] AppSensor project awarded OWASP flagship status&lt;br /&gt;
* [28 Jan 2015] AppSensor Code v2.0.0 final [https://github.com/jtmelton/appsensor/releases/tag/v2.0.0 released]&lt;br /&gt;
* [18 Sep 2014] Guide book giveaway and signing at [http://2014.appsecusa.org/2014/ AppSecUSA 2014]&lt;br /&gt;
* [17 Sep 2014] Presentation at [http://www.meetup.com/London-API-Group/events/200768922/ London API Group]&lt;br /&gt;
* [12 Sep 2014] [http://appsensor.org/ AppSensor website] launched&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* AppSensor v2 https://github.com/jtmelton/appsensor (Current)&lt;br /&gt;
* Note: LEGACY AppSensor v1 https://code.google.com/p/appsensor/&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197073</id>
		<title>OWASP Python Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Security_Project&amp;diff=197073"/>
				<updated>2015-07-06T16:15:26Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:120px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Appsensor-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Python Security Project ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for security professionals and developers to write applications more resilient to attacks and manipulations.&lt;br /&gt;
&lt;br /&gt;
The project is designed to explore how web applications can be developed in python by approaching the problem from three different angles:&lt;br /&gt;
&lt;br /&gt;
Security in python: white-box analysis, structural and functional analysis&lt;br /&gt;
Security of python: black-box analysis, identify and address security-related issues&lt;br /&gt;
Security with python: develop security hardened python suitable for high-risk and high-security environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Detect and Respond to Attacks from Within the Application ==&lt;br /&gt;
&lt;br /&gt;
=== Detection ===&lt;br /&gt;
AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.&lt;br /&gt;
=== Response===&lt;br /&gt;
AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.&lt;br /&gt;
===Defending the Application===&lt;br /&gt;
An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
&lt;br /&gt;
* [http://www.crosstalkonline.org/ CrossTalk], The Journal of Defense Software Engineering&lt;br /&gt;
** Creating Attack-Aware Software Applications with Real Time Defenses, Vol. 24, No. 5, Sep/Oct 2011&lt;br /&gt;
&lt;br /&gt;
* Norwegian University of Science and Technology in Tronheim&lt;br /&gt;
** [http://ntnu.diva-portal.org/smash/record.jsf?pid=diva2:566091 AppSensor: Attack-Aware Applications Compared Against a Web Application Firewall and an Intrusion Detection System], Thomassen P, 2012&lt;br /&gt;
&lt;br /&gt;
*US Department of Homeland Security&lt;br /&gt;
** [https://buildsecurityin.us-cert.gov/swa/topics/resilient-software/ Resilient Software]&lt;br /&gt;
** [https://buildsecurityin.us-cert.gov/swa/resources Software Assurance Resources]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP AppSensor is free to use. &lt;br /&gt;
&lt;br /&gt;
=== Guide ===&lt;br /&gt;
The guide is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
=== Reference Implementation ===&lt;br /&gt;
The reference implementation is licensed under the [http://opensource.org/licenses/MIT MIT License], which is a permissive (commercial-friendly) license only requiring you to include a copy of the license upon distribution or copying.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is AppSensor? ==&lt;br /&gt;
&lt;br /&gt;
Detect and respond to attacks from within the application. This project includes both a well documented idea (the Guide) and a reference implementation (the Code). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Intro for Developers ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf Two-sided US Letter or A4]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-small.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
See the [http://appsensor.org/ new AppSensor website] for an introduction and quick start instructions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf 12-page US Letter booklet]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Founder ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:MichaelCoates Michael Coates] [mailto:michael.coates@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dennis_Groves Dennis Groves] [mailto:dennis.groves@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:john.melton@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide v2.0.1 EN&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Hard copy]&lt;br /&gt;
* OWASP AppSensor Reference Implementation&lt;br /&gt;
** [https://github.com/jtmelton/appsensor v2 Code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [9 June 2015] AppSensor Code v2.1.0 [https://github.com/jtmelton/appsensor/releases/tag/v2.1.0 released]&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Code&lt;br /&gt;
* [19 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Documentation&lt;br /&gt;
* [09 Apr 2015] [https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf CISO Briefing] booklet published&lt;br /&gt;
* [22 Feb 2015] Proposal for [https://www.owasp.org/index.php/GSoC2015_Ideas#OWASP_AppSensor Google Summer of Code 2015]&lt;br /&gt;
* [13 Feb 2015] [https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf Introduction for Developers] flyer published&lt;br /&gt;
* [13 Feb 2015] AppSensor project awarded OWASP flagship status&lt;br /&gt;
* [28 Jan 2015] AppSensor Code v2.0.0 final [https://github.com/jtmelton/appsensor/releases/tag/v2.0.0 released]&lt;br /&gt;
* [18 Sep 2014] Guide book giveaway and signing at [http://2014.appsecusa.org/2014/ AppSecUSA 2014]&lt;br /&gt;
* [17 Sep 2014] Presentation at [http://www.meetup.com/London-API-Group/events/200768922/ London API Group]&lt;br /&gt;
* [12 Sep 2014] [http://appsensor.org/ AppSensor website] launched&lt;br /&gt;
&lt;br /&gt;
== Code Repository ==&lt;br /&gt;
* AppSensor v2 https://github.com/jtmelton/appsensor (Current)&lt;br /&gt;
* Note: LEGACY AppSensor v1 https://code.google.com/p/appsensor/&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSensor2_small.jpg|link=]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html AppSensor Guide] and [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html CISO Briefing] can be purchased at cost as a print on demand books.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Mature projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
All OWASP projects rely on the voluntary efforts of people in the software development and information security sectors. They have contributed their time and energy to make suggestions, provide feedback, write, review and edit documentation, give encouragement, make introductions, produce demonstration code, promote the concept, and provide OWASP support. They participated via the project’s mailing lists, by developing code, by updating the wiki, by undertaking research studies, and through contributions during the AppSensor working session at the OWASP Summit 2011 in Portugal and the AppSensor Summit at AppSec USA 2011. Without all their efforts, the project would not have progressed to this point, and this guide would not have been completed.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Josh Amishav-Zlatin&lt;br /&gt;
*Ryan Barnett&lt;br /&gt;
*Simon Bennetts&lt;br /&gt;
*Joe Bernik&lt;br /&gt;
*Rex Booth&lt;br /&gt;
*Luke Briner&lt;br /&gt;
*Rauf Butt&lt;br /&gt;
*Juan C Calderon&lt;br /&gt;
*Fabio Cerullo&lt;br /&gt;
*Marc Chisinevski&lt;br /&gt;
*Robert Chojnacki&lt;br /&gt;
*Michael Coates&lt;br /&gt;
*Dinis Cruz&lt;br /&gt;
*August Detlefsen&lt;br /&gt;
*Ryan Dewhurst&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Sean Fay&lt;br /&gt;
*Timo Goosen&lt;br /&gt;
*Dennis Groves&lt;br /&gt;
*Randy Janida&lt;br /&gt;
*Chetan Karande&lt;br /&gt;
*Eoin Keary&lt;br /&gt;
*Alex Lauerman&lt;br /&gt;
*Junior Lazuardi&lt;br /&gt;
*Benjamin-Hugo LeBlanc&lt;br /&gt;
*Jason Li&lt;br /&gt;
*Manuel López Arredondo&lt;br /&gt;
*Bob Maier&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Sherif Mansour Farag&lt;br /&gt;
*John Melton&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
*Mark Miller&lt;br /&gt;
*Craig Munson&lt;br /&gt;
*Louis Nadeau&lt;br /&gt;
*Giri Nambari&lt;br /&gt;
*Erlend Oftedal&lt;br /&gt;
*Jay Reynolds&lt;br /&gt;
*Chris Schmidt&lt;br /&gt;
*Sahil Shah&lt;br /&gt;
*Eric Sheridan&lt;br /&gt;
*John Steven&lt;br /&gt;
*Raphael Taban&lt;br /&gt;
*Alex Thissen&lt;br /&gt;
*Don Thomas&lt;br /&gt;
*Christopher Tidball&lt;br /&gt;
*Kevin W Wall&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Mehmet Yilmaz&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==OWASP Summer of Code 2008==&lt;br /&gt;
The AppSensor Project  was initially supported by the [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008 OWASP Summer of Code 2008], leading to the publication of the book AppSensor v1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Summer of Code 2012==&lt;br /&gt;
Additional development work on [http://www.google-melange.com/gsoc/project/google/gsoc2012/edil/60002 SOAP web services] was kindly supported by the [http://www.google-melange.com/gsoc/program/home/google/gsoc2012 Google Summer of Code 2012].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Acknowledgements ==&lt;br /&gt;
The project has also benefitted greatly from the generous contribution of time and effort by many volunteers in the OWASP community including those listed above, and contributors to the OWASP ESAPI project, members of the former OWASP Global Projects Committee, the OWASP Board, OWASP staff and support from the OWASP Project Reboot initiative. The v2 code and documentation were conceived during the AppSensor Summit held during AppSec USA 2011 in Minneapolis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Please join the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project General project]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-appsensor-dev Code development]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Current activities ==&lt;br /&gt;
&lt;br /&gt;
=== Non code ===&lt;br /&gt;
&lt;br /&gt;
* Update AppSensor Guide to keep in step with code changes and improvements to ideas ([http://lists.owasp.org/pipermail/owasp-appsensor-project/2015-February/000855.html see discussion and editable list of changes])&lt;br /&gt;
* Create demo&lt;br /&gt;
* Develop training materials&lt;br /&gt;
&lt;br /&gt;
=== v2 Code ===&lt;br /&gt;
&lt;br /&gt;
The current code being worked on is located on [https://github.com/jtmelton/appsensor GitHub]&lt;br /&gt;
&lt;br /&gt;
The code has been fully rewritten. &lt;br /&gt;
v2.0.0 final was released in late January 2015.&lt;br /&gt;
v2.1.0 final was released in June 2015.&lt;br /&gt;
&lt;br /&gt;
The main reason for the rewrite was to allow a client-server style model as opposed to requiring AppSensor be fully embedded in the application. You can now have a central server collecting events from multiple applications and performing analysis. These front-end applications can be in any language as long as they speak rest/soap. There's been a host of other changes, but this was the primary one. A number of starter ideas for coding, user interface and documentation have been outlined via the mailing list at [http://lists.owasp.org/pipermail/owasp-appsensor-project/2014-March/000682.html 17th March 2014].&lt;br /&gt;
&lt;br /&gt;
if you want to work on ANYTHING, please let jtmelton[@]gmail.com know.&lt;br /&gt;
&lt;br /&gt;
== Code Roadmap ==&lt;br /&gt;
&lt;br /&gt;
=== Q4 2015 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan - v 2.0.0 final release &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== Q4 2014 (2.0) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Oct - v 2.0.0 release candidate&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jan 2015 (delay due to bug) - v 2.0.0 final &amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Additional unit tests&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Move appsensor.org site over from static html to python&amp;lt;/strike&amp;gt; -&amp;gt; NOT NECESSARY&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up user documentation at appsensor.org&amp;lt;/strike&amp;gt; -&amp;gt; DONE&lt;br /&gt;
&lt;br /&gt;
=== June 2015 (2.1) === &lt;br /&gt;
* &amp;lt;strike&amp;gt;Add at least 1 attack emitter for DEVOPS visualization (JMX -&amp;gt; SNMP, syslog, SNMP, .. something)&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/19 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Sample application / demo&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/9 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Finish up developer documentation on github and appsensor.org&amp;lt;/strike&amp;gt; ([https://github.com/jtmelton/appsensor/issues/12 github issue]) -&amp;gt; DONE&lt;br /&gt;
* &amp;lt;strike&amp;gt;Preparation for GSOC 2015 submission&amp;lt;/strike&amp;gt; -&amp;gt; DONE - see [[GSoC2015_Ideas]] - Update - OWASP not selected&lt;br /&gt;
&lt;br /&gt;
=== September 2015 (2.2) === &lt;br /&gt;
* First version of administration UI for appsensor (monitoring UI) (github issues [https://github.com/jtmelton/appsensor/issues/10 here] and [https://github.com/jtmelton/appsensor/issues/11 here])&lt;br /&gt;
&lt;br /&gt;
=== January 2016 (2.3) === &lt;br /&gt;
* Get CI server (cloudbees?) setup ([https://github.com/jtmelton/appsensor/issues/15 github issue])&lt;br /&gt;
* Video demo of setting up appsensor (screen capture) (related to sample apps)&lt;br /&gt;
* New detection point implementations ([https://github.com/jtmelton/appsensor/issues/8 github issue])&lt;br /&gt;
* AOP examples of detection point implementations&lt;br /&gt;
&lt;br /&gt;
=== May 2016 (2.4) === &lt;br /&gt;
* Trend monitoring implementation ([https://github.com/jtmelton/appsensor/issues/6 github issue])&lt;br /&gt;
* Additional integrations for reporting (graphite, ganglia -&amp;gt; see list supported by codahale metrics)&lt;br /&gt;
&lt;br /&gt;
== Past activities ==&lt;br /&gt;
&lt;br /&gt;
'''June 2015''' Final release v2.1.0 code&lt;br /&gt;
&lt;br /&gt;
'''April 2015''' CISO Briefing booklet published&lt;br /&gt;
&lt;br /&gt;
'''February 2015''' Introduction for Developers flyer published&lt;br /&gt;
&lt;br /&gt;
'''January 2015''' Final release v2.0.0 code&lt;br /&gt;
&lt;br /&gt;
'''May 2014''' Finalisation and publication of the AppSensor Guide v2.0&lt;br /&gt;
&lt;br /&gt;
'''November, 2013''' - AppSensor 2.0 hackathon, and document writing &amp;amp; review at AppSecUSA 2013, New York&lt;br /&gt;
&lt;br /&gt;
'''2012-2013''' - Active Development of next AppSensor book&lt;br /&gt;
&lt;br /&gt;
'''September, 2011''' - AppSensor Summit at AppSec USA 2011, Minneapolis&lt;br /&gt;
&lt;br /&gt;
'''September, 2010''' - Presented at AppSecUSA [http://www.slideshare.net/michael_coates/real-time-application-defenses-the-reality-of-appsensor-esapi-5181743 slides]&lt;br /&gt;
&lt;br /&gt;
'''June, 2010''' - Active ESAPI Integration Underway&lt;br /&gt;
&lt;br /&gt;
'''November, 2009''' [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf OWASP DC, November 2009]&lt;br /&gt;
&lt;br /&gt;
'''2009''' v1.2 in the works, demo application in development &lt;br /&gt;
&lt;br /&gt;
'''May, 2009''' - AppSec EU Poland - Presentation ([http://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx PPT]) ([http://blip.tv/file/2198771 Video]) &lt;br /&gt;
&lt;br /&gt;
'''January, 2009''' - v1.1 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - AppSensor Talk at OWASP Portugal &lt;br /&gt;
&lt;br /&gt;
'''November, 2008''' - v1.0 Released - Beta Status &lt;br /&gt;
&lt;br /&gt;
'''April 16, 2008''' - Project Begins&lt;br /&gt;
&lt;br /&gt;
= Detection Points =&lt;br /&gt;
&lt;br /&gt;
Below are the primary detection points defined within AppSensor. These are just the titles; the document contains descriptions, examples and considerations for implementing these detection points. &lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_DetectionPoints Detailed Detection Point Information Here] '''&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.owasp.org/index.php/AppSensor_ResponseActions Response Action Information Here]'''&lt;br /&gt;
&lt;br /&gt;
'''Summary of Information'''&lt;br /&gt;
'''Detection Categories:''' &lt;br /&gt;
&lt;br /&gt;
RE - Request&lt;br /&gt;
&lt;br /&gt;
AE - Authentication&lt;br /&gt;
&lt;br /&gt;
SE - Session&lt;br /&gt;
&lt;br /&gt;
ACE - Access Control&lt;br /&gt;
&lt;br /&gt;
IE - Input&lt;br /&gt;
&lt;br /&gt;
EE - Encoding&lt;br /&gt;
&lt;br /&gt;
CIE - Command Injection&lt;br /&gt;
&lt;br /&gt;
FIO - File IO&lt;br /&gt;
&lt;br /&gt;
HT - Honey Trap&lt;br /&gt;
&lt;br /&gt;
UT - User Trend&lt;br /&gt;
&lt;br /&gt;
STE - System Trend&lt;br /&gt;
&lt;br /&gt;
RP - Reputation&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Signature Based Event Titles''' &lt;br /&gt;
&lt;br /&gt;
ID Event&lt;br /&gt;
&lt;br /&gt;
RE1 Unexpected HTTP Command&lt;br /&gt;
&lt;br /&gt;
RE2 Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
&lt;br /&gt;
RE3 GET When Expecting POST&lt;br /&gt;
&lt;br /&gt;
RE4 POST When Expecting GET&lt;br /&gt;
&lt;br /&gt;
RE5 Additional/Duplicated Data in Request&lt;br /&gt;
&lt;br /&gt;
RE6 Data Missing from Request&lt;br /&gt;
&lt;br /&gt;
RE7 Unexpected Quantity of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
RE8 Unexpected Type of Characters in Parameter&lt;br /&gt;
&lt;br /&gt;
AE1 Use Of Multiple Usernames&lt;br /&gt;
&lt;br /&gt;
AE2 Multiple Failed Passwords&lt;br /&gt;
&lt;br /&gt;
AE3 High Rate of Login Attempts&lt;br /&gt;
&lt;br /&gt;
AE4 Unexpected Quantity of Characters in Username&lt;br /&gt;
&lt;br /&gt;
AE5 Unexpected Quantity of Characters in Password&lt;br /&gt;
&lt;br /&gt;
AE6 Unexpected Type of Character in Username&lt;br /&gt;
&lt;br /&gt;
AE7 Unexpected Type of Character in Password&lt;br /&gt;
&lt;br /&gt;
AE8 Providing Only the Username&lt;br /&gt;
&lt;br /&gt;
AE9 Providing Only the Password&lt;br /&gt;
&lt;br /&gt;
AE10 Adding POST Variable&lt;br /&gt;
&lt;br /&gt;
AE11 Missing POST Variable&lt;br /&gt;
&lt;br /&gt;
AE12 Utilization of Common Usernames&lt;br /&gt;
&lt;br /&gt;
SE1 Modifying Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE2 Adding New Cookie&lt;br /&gt;
&lt;br /&gt;
SE3 Deleting Existing Cookie&lt;br /&gt;
&lt;br /&gt;
SE4 Substituting Another User's Valid Session ID or Cookie&lt;br /&gt;
&lt;br /&gt;
SE5 Source IP Address Changes During Session&lt;br /&gt;
&lt;br /&gt;
SE6 Change Of User Agent Mid Session&lt;br /&gt;
&lt;br /&gt;
ACE1 Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE2 Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
&lt;br /&gt;
ACE3 Force Browsing Attempt&lt;br /&gt;
&lt;br /&gt;
ACE4 Evading Presentation Access Control Through Custom POST&lt;br /&gt;
&lt;br /&gt;
IE1 Cross Site Scripting Attempt&lt;br /&gt;
&lt;br /&gt;
IE2 Violation of Implemented White Lists&lt;br /&gt;
&lt;br /&gt;
IE3 Violation Of Implemented Black Lists&lt;br /&gt;
&lt;br /&gt;
IE4 Violation of Input Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE5 Violation of Stored Business Data Integrity&lt;br /&gt;
&lt;br /&gt;
IE6 Violation of Security Log Integrity&lt;br /&gt;
&lt;br /&gt;
EE1 Double Encoded Character&lt;br /&gt;
&lt;br /&gt;
EE2 Unexpected Encoding Used&lt;br /&gt;
&lt;br /&gt;
CIE1 Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
&lt;br /&gt;
CIE2 Detect Abnormal Quantity of Returned Records&lt;br /&gt;
&lt;br /&gt;
CIE3 Null Byte Character in File Request&lt;br /&gt;
&lt;br /&gt;
CIE4 Carriage Return or Line Feed Character In File Request&lt;br /&gt;
&lt;br /&gt;
FIO1 Detect Large Individual File &lt;br /&gt;
&lt;br /&gt;
FIO2 Detect Large Number of File Uploads&lt;br /&gt;
&lt;br /&gt;
HT1 Alteration to Honey Trap Data&lt;br /&gt;
&lt;br /&gt;
HT2 Honey Trap Resource Requested&lt;br /&gt;
&lt;br /&gt;
HT3 Honey Trap Data Used&lt;br /&gt;
&lt;br /&gt;
'''Behavior Based Event Titles'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
UT1 Irregular Use of Application&lt;br /&gt;
&lt;br /&gt;
UT2 Speed of Application Use&lt;br /&gt;
&lt;br /&gt;
UT3 Frequency of Site Use&lt;br /&gt;
&lt;br /&gt;
UT4 Frequency of Feature Use&lt;br /&gt;
&lt;br /&gt;
STE1 High Number of Logouts Across The Site&lt;br /&gt;
&lt;br /&gt;
STE2 High Number of Logins Across The Site&lt;br /&gt;
&lt;br /&gt;
STE3 Significant Change in Usage of Same Transaction Across The Site&lt;br /&gt;
&lt;br /&gt;
RP1 Suspicious or Disallowed User IP Address&lt;br /&gt;
&lt;br /&gt;
RP2 Suspicious External User Behavior&lt;br /&gt;
&lt;br /&gt;
RP3 Suspicious Client-Side Behavior&lt;br /&gt;
&lt;br /&gt;
RP4 Change to Environment Threat Level&lt;br /&gt;
&lt;br /&gt;
= Media =&lt;br /&gt;
&lt;br /&gt;
== Introductory Briefings ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Developers&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | Architects&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | CISOs&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-developer-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor_intro_for_developers.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor_crosstalk_small.jpg|link=http://www.crosstalkonline.org/storage/issue-archives/2011/201109/201109-Watson.pdf]]&lt;br /&gt;
| width=&amp;quot;20&amp;quot; |&lt;br /&gt;
| width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[File:Appsensor-cisobriefing-small.jpg|link=https://www.owasp.org/index.php/File:Appsensor-ciso-briefing.pdf]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The CISO briefing is also available to [http://www.lulu.com/shop/owasp-foundation/appsensor-ciso-briefing/paperback/product-22121723.html buy at cost in print].&lt;br /&gt;
&lt;br /&gt;
== AppSensor Website ==&lt;br /&gt;
&lt;br /&gt;
[[File:Appsensor-website-large.jpg|link=http://appsensor.org/]]&lt;br /&gt;
&lt;br /&gt;
[http://appsensor.org/ http://appsensor.org/]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Code ==&lt;br /&gt;
&lt;br /&gt;
*v2 [https://github.com/jtmelton/appsensor Github Code]&lt;br /&gt;
* (LEGACY) v1 [http://code.google.com/p/appsensor/ Google Code]&lt;br /&gt;
&lt;br /&gt;
== AppSensor Guide ==&lt;br /&gt;
&lt;br /&gt;
* OWASP AppSensor Guide &lt;br /&gt;
** v2.0 EN&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc DOC]&lt;br /&gt;
*** [http://www.lulu.com/shop/owasp-foundation/appsensor-guide/paperback/product-21608107.html Print on demand at cost hard copy]&lt;br /&gt;
** v1.1 EN&lt;br /&gt;
*** [https://www.owasp.org/images/2/2f/OWASP_AppSensor_Beta_1.1.pdf PDF]&lt;br /&gt;
*** [https://www.owasp.org/images/b/b0/OWASP_AppSensor_Beta_1.1.doc DOC]&lt;br /&gt;
&lt;br /&gt;
== Presentations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.brighttalk.com/webcast/20680 Automated Application Defenses to Thwart Advanced Attackers (Slides &amp;amp; Audio)]&lt;br /&gt;
&lt;br /&gt;
July, 2010 - OWASP London (UK) - [http://www.owasp.org/index.php/File:Owasp-london-20100715-appsensor-3.pdf Real Time Application Attack Detection and Response with OWASP AppSensor]&lt;br /&gt;
&lt;br /&gt;
June, 2010 - OWASP Leeds/North (UK) - OWASP AppSensor - The Self-Aware Web Application&lt;br /&gt;
&lt;br /&gt;
June, 2010 - Video presentation - [http://michael-coates.blogspot.com/2010/06/online-presentation-thursday-automated.html Automated Application Defenses to Thwart Advanced Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2009 -  AppSec DC - [http://www.owasp.org/images/0/06/Defend_Yourself-Integrating_Real_Time_Defenses_into_Online_Applications-Michael_Coates.pdf Defend Yourself: Integrating Real Time Defenses into Online Applications]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - [http://www.owasp.org/download/jmanico/owasp_podcast_51.mp3 OWASP Podcast #51 ]&lt;br /&gt;
&lt;br /&gt;
May, 2009 - AppSec EU Poland - [https://www.owasp.org/images/b/b7/AppsecEU09_MichaelCoates.pptx Real Time Defenses against Application Worms and Malicious Attackers]&lt;br /&gt;
&lt;br /&gt;
November, 2008 - [https://www.owasp.org/images/7/77/Presentation_AppSensor.ppt OWASP Summit Portugal 2008 PPT]&lt;br /&gt;
&lt;br /&gt;
==Video Demos of AppSensor==&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=8ItfuwvLxRk Detecting Multiple Attacks &amp;amp; Logging Out Attacker]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=CekUMk_VRV8 Detecting XSS Probes]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=LfD4y67qdWE Detecting URL Tampering]&lt;br /&gt;
&lt;br /&gt;
[http://www.youtube.com/watch?v=1D6nTlmYjhY Detecting Verb Tampering]&lt;br /&gt;
&lt;br /&gt;
==Source Documents / Artwork==&lt;br /&gt;
&lt;br /&gt;
* Guide&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appensor-guide-v2.doc Word (content only)], DOC 11Mb&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/appsensor-guide-2v0-owasp.zip Word, images, Lulu covers, diagrams], ZIP 96Mb&lt;br /&gt;
* Introduction for Developers&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-a4.zip A4 Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Appsensor-intro-for-developers-usletter.zip US letter Illustrator and PDF exports], ZIP 19Mb&lt;br /&gt;
* Poster&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-appsensor-poster-a1.zip A1 Illustrator and PDF export] ZIP, 18Mb&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_AppSensor_Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|AppSensor Project]] [[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:SAMM-EH-3]] [[Category:SAMM-SA-2]]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Python_Security_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Authentication_Cheat_Sheet&amp;diff=195853</id>
		<title>Authentication Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Authentication_Cheat_Sheet&amp;diff=195853"/>
				<updated>2015-06-07T11:53:15Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Validation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
'''Authentication''' is the process of verification that an individual,entity  or website is who it claims to be. Authentication in the context of web applications is commonly performed by submitting a user name or ID and one or more items of private information that only a given user should know. Another form of Authentication is Knowledged Based Authentication.&lt;br /&gt;
&lt;br /&gt;
'''Session Management''' is a process by which a server maintains the state of an entity interacting with it. This is required for a server to remember how to react to subsequent requests throughout a transaction. Sessions are maintained on the server by a session identifier which can be passed back and forward between the client and server when transmitting and receiving requests. Sessions should be unique per user and computationally very difficult to predict.&lt;br /&gt;
&lt;br /&gt;
= Authentication General Guidelines  =&lt;br /&gt;
&lt;br /&gt;
== User IDs ==&lt;br /&gt;
&lt;br /&gt;
Make sure your usernames/userids are case insensitive. Regardless, it would be very strange for user 'smith' and user 'Smith' to be different users. Could result in serious confusion.&lt;br /&gt;
&lt;br /&gt;
=== Email address as a User ID ===&lt;br /&gt;
&lt;br /&gt;
Many sites use email addresses as a user id, which is a good mechanism for ensuring a unique identifier for each user without adding the burden of remembering a new username.&lt;br /&gt;
However, many web applications do not treat email addresses correctly due to common misconceptions about what constitutes a valid address.&lt;br /&gt;
&lt;br /&gt;
Specifically, it is completely valid to have an mailbox address which:&lt;br /&gt;
* Is case sensitive in the local-part&lt;br /&gt;
* Has non-alphanumeric characters in the local-part (including + and '''@''')&lt;br /&gt;
* Has zero or more labels (though zero is admittedly not going to occur)&lt;br /&gt;
&lt;br /&gt;
The local-part is the part of the mailbox address to the left of the rightmost @ character.&lt;br /&gt;
The domain is the part of the mailbox address to the right of the rightmost @ character and consists of zero or more labels joined by a period character.&lt;br /&gt;
&lt;br /&gt;
At the time of writing, RFC 5321 is the current standard defining SMTP and what constitutes a valid mailbox address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Validation ====&lt;br /&gt;
Many web applications contain computationally expensive and inaccurate regular expressions that attempt to validate email addresses.&lt;br /&gt;
&lt;br /&gt;
Recent changes to the landscape mean that the number of false-negatives will increase, particularly due to:&lt;br /&gt;
* Increased popularity of sub-addressing by providers such as Gmail (commonly using &amp;lt;tt&amp;gt;+&amp;lt;/tt&amp;gt; as a token in the local-part to affect delivery)&lt;br /&gt;
* New gTLDs with long names (many regular expressions check the number and length of each label in the domain)&lt;br /&gt;
&lt;br /&gt;
Following RFC 5321, best practice for validating an email address would be to:&lt;br /&gt;
* Check for presence of at least one &amp;lt;tt&amp;gt;@&amp;lt;/tt&amp;gt; symbol in the address&lt;br /&gt;
* Ensure the local-part is no longer than 64 octets&lt;br /&gt;
* Ensure the domain is no longer than 255 octets&lt;br /&gt;
* Ensure the address is deliverable&lt;br /&gt;
&lt;br /&gt;
To ensure an address is deliverable, the only way to check this is to send the user an email and have the user take action to confirm receipt.&lt;br /&gt;
Beyond confirming that the email address is valid and deliverable, this also provides a positive acknowledgement that the user has access to the mailbox and is likely to be authorised to use it. This does not mean that other users cannot access this mailbox, for example when the user makes use of a service that generates a throw away email address.&lt;br /&gt;
&lt;br /&gt;
==== Address Normalisation ====&lt;br /&gt;
As the local-part of email addresses are, in fact - case sensitive, it is important to store and compare email addresses correctly.&lt;br /&gt;
To normalise an email address input, you would convert the domain part ONLY to lowercase.&lt;br /&gt;
&lt;br /&gt;
Unfortunately this does and will make input harder to normalise and correctly match to a users intent.&lt;br /&gt;
&lt;br /&gt;
It is reasonable to only accept one unique capitalisation of an otherwise identical address, however in this case it is critical to:&lt;br /&gt;
* Store the user-part as provided and verified by user verification&lt;br /&gt;
* Perform comparisons by &amp;lt;tt&amp;gt;lowercase(provided)==lowercase(persisted)&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Implement Proper Password Strength Controls ==&lt;br /&gt;
&lt;br /&gt;
A key concern when using passwords for authentication is password strength. A &amp;quot;strong&amp;quot; password policy makes it difficult or even improbable for one to guess the password through either manual or automated means. The following characteristics define a strong password: &lt;br /&gt;
&lt;br /&gt;
=== Password Length ===&lt;br /&gt;
&lt;br /&gt;
Longer passwords provide a greater combination of characters and consequently make it more difficult for an attacker to guess. &lt;br /&gt;
&lt;br /&gt;
* '''Minimum''' length of the passwords should be '''enforced''' by the application.&lt;br /&gt;
** Passwords '''shorter than 10 characters''' are considered to be weak ([http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf]).&lt;br /&gt;
&lt;br /&gt;
While minimum length enforcement may cause problems with memorizing passwords among some users, applications should encourage them to set ''passphrases'' (sentences or combination of words) that can be much longer than typical passwords and yet much easier to remember.&lt;br /&gt;
&lt;br /&gt;
* '''Maximum''' password length should not be set '''too low''', as it will prevent users from creating passphrases. Typical maximum length is 128 characters.&lt;br /&gt;
** Passphrases shorter than 20 characters are usually considered weak if they only consist of lower case Latin characters.&lt;br /&gt;
&lt;br /&gt;
* Every character counts!!&lt;br /&gt;
**Make sure that every character the user types in is actually included in the password. We've seen systems that truncate the password at a length shorter than what the user provided (e.g., truncated at 15 characters when they entered 20).&lt;br /&gt;
**This is usually handled by setting the length of ALL password input fields to be exactly the same length as the maximum length password. This is particularly important if your max password length is short, like 20-30 characters.&lt;br /&gt;
&lt;br /&gt;
=== Password Complexity ===&lt;br /&gt;
&lt;br /&gt;
Applications should enforce password complexity rules to discourage easy to guess passwords. Password mechanisms should allow virtually any character the user can type to be part of their password, including the space character. Passwords should, obviously, be case sensitive in order to increase their complexity. Occasionally, we find systems where passwords aren't case sensitive, frequently due to legacy system issues like old mainframes that didn't have case sensitive passwords.&lt;br /&gt;
&lt;br /&gt;
The password change mechanism should require a minimum level of complexity that makes sense for the application and its user population. For example:&lt;br /&gt;
&lt;br /&gt;
*Password must meet at least 3 out of the following 4 complexity rules&lt;br /&gt;
**at least 1 uppercase character (A-Z) &lt;br /&gt;
**at least 1 lowercase character (a-z) &lt;br /&gt;
**at least 1 digit (0-9) &lt;br /&gt;
**at least 1 [[Password special characters|special character (punctuation)]] &amp;amp;mdash; do not forget to treat space as special characters too&lt;br /&gt;
*at least 10 characters &lt;br /&gt;
*at most 128 characters&lt;br /&gt;
*not more than 2 identical characters in a row (e.g., 111 not allowed)&lt;br /&gt;
&lt;br /&gt;
As application's require more complex password policies, they need to be very clear about what these policies are.&lt;br /&gt;
*The required policy needs to be explicitly stated on the password change page&lt;br /&gt;
** be sure to list every special character you allow, so it's obvious to the user&lt;br /&gt;
&lt;br /&gt;
Recommendation:&lt;br /&gt;
* Ideally, the application would indicate to the user as they type in their new password how much of the complexity policy their new password meets&lt;br /&gt;
**In fact, the submit button should be grayed out until the new password meets the complexity policy and the 2nd copy of the new password matches the 1st. This will make it far easier for the user to understand and comply with your complexity policy.&lt;br /&gt;
&lt;br /&gt;
Regardless of how the UI behaves, when a user submits their password change request:&lt;br /&gt;
*If the new password doesn't comply with the complexity policy, the error message should describe EVERY complexity rule that the new password does not comply with, not just the 1st rule it doesn't comply with&lt;br /&gt;
&lt;br /&gt;
Changing passwords should be EASY, not a hunt in the dark.&lt;br /&gt;
&lt;br /&gt;
== Implement Secure Password Recovery Mechanism ==&lt;br /&gt;
&lt;br /&gt;
It is common for an application to have a mechanism that provides a means for a user to gain access to their account in the event they forget their password. Please see [[Forgot Password Cheat Sheet]] for details on this feature.&lt;br /&gt;
&lt;br /&gt;
== Store Passwords in a Secure Fashion ==&lt;br /&gt;
&lt;br /&gt;
It is critical for a application to store a password using the right cryptographic technique. Please see [[Password Storage Cheat Sheet]] for details on this feature.&lt;br /&gt;
&lt;br /&gt;
== Transmit Passwords Only Over TLS ==&lt;br /&gt;
&lt;br /&gt;
See: [[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
The login page and all subsequent authenticated pages must be exclusively accessed over TLS. The initial login page, referred to as the &amp;quot;login landing page&amp;quot;, must be served over TLS. Failure to utilize TLS for the login landing page allows an attacker to modify the login form action, causing the user's credentials to be posted to an arbitrary location. Failure to utilize TLS for authenticated pages after the login enables an attacker to view the unencrypted session ID and compromise the user's authenticated session.&lt;br /&gt;
&lt;br /&gt;
== Require Re-authentication for Sensitive Features ==&lt;br /&gt;
&lt;br /&gt;
In order to mitigate CSRF and session hijacking, it's important to require the current credentials for an account before updating sensitive account information such as the user's password, user's email, or before sensitive transactions, such as shipping a purchase to a new address.  Without this countermeasure, an attacker may be able to execute sensitive transactions through a CSRF or XSS attack without needing to know the user's current credentials.  Additionally, an attacker may get temporary physical access to a user's browser or steal their session ID to take over the user's session.&lt;br /&gt;
&lt;br /&gt;
== Utilize Multi-Factor Authentication ==&lt;br /&gt;
&lt;br /&gt;
Multi-factor authentication (MFA) is using more than one authentication factor to logon or process a transaction:&lt;br /&gt;
&lt;br /&gt;
*Something you know (account details or passwords) &lt;br /&gt;
*Something you have (tokens or mobile phones) &lt;br /&gt;
*Something you are (biometrics)&lt;br /&gt;
&lt;br /&gt;
Authentication schemes such as One Time Passwords (OTP) implemented using a hardware token can also be key in fighting attacks such as CSRF and client-side malware. A number of hardware tokens suitable for MFA are available in the market that allow good integration with web applications. See: [http://en.wikipedia.org/wiki/Security_token].&lt;br /&gt;
&lt;br /&gt;
=== SSL Client Authentication ===&lt;br /&gt;
&lt;br /&gt;
SSL Client Authentication, also known as two-way SSL authentication, consists of both, browser and server, sending their respective SSL certificates during the TLS handshake process. Just as you can validate the authenticity of a server by using the certificate and asking a well known Certificate Authority (CA) if the certificate is valid, the server can authenticate the user by receiving a certificate from the client and validating against a third party CA or its own CA. To do this, the server must provide the user with a certificate generated specifically for him, assigning values to the subject so that these can be used to determine what user the certificate should validate. The user installs the certificate on a browser and now uses it for the website.&lt;br /&gt;
&lt;br /&gt;
It is a good idea to do this when:&lt;br /&gt;
&lt;br /&gt;
*It is acceptable (or even preferred) that the user only has access to the website from only a single computer/browser.&lt;br /&gt;
*The user is not easily scared by the process of installing SSL certificates on his browser or there will be someone, probably from IT support, that will do this for the user.&lt;br /&gt;
*The website requires an extra step of security.&lt;br /&gt;
*It is also a good thing to use when the website is for an intranet of a company or organization.&lt;br /&gt;
&lt;br /&gt;
It is generally not a good idea to use this method for widely and publicly available websites that will have an average user. For example, it wouldn't be a good idea to implement this for a website like Facebook. While this technique can prevent the user from having to type a password (thus protecting against an average keylogger from stealing it), it is still considered a good idea to consider using both a password and SSL client authentication combined.&lt;br /&gt;
&lt;br /&gt;
For more information, see: [http://publib.boulder.ibm.com/infocenter/tivihelp/v5r1/index.jsp?topic=%2Fcom.ibm.itim.infocenter.doc%2Fcpt%2Fcpt_ic_security_ssl_authent2way.html] or [http://www.codeproject.com/Articles/326574/An-Introduction-to-Mutual-SSL-Authentication]&lt;br /&gt;
&lt;br /&gt;
== Authentication and Error Messages ==&lt;br /&gt;
&lt;br /&gt;
Incorrectly implemented error messages in the case of authentication functionality can be used for the purposes of user ID and password enumeration. An application should respond (both HTTP and HTML) in a generic manner.&lt;br /&gt;
&lt;br /&gt;
==== Authentication Responses ====&lt;br /&gt;
&lt;br /&gt;
An application should respond with a generic error message regardless of whether the user ID or password was incorrect. It should also give no indication to the status of an existing account.&lt;br /&gt;
&lt;br /&gt;
==== Incorrect Response Examples ====&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Login for User foo: invalid password&amp;quot; &lt;br /&gt;
*&amp;quot;Login failed, invalid user ID&amp;quot; &lt;br /&gt;
*&amp;quot;Login failed; account disabled&amp;quot; &lt;br /&gt;
*&amp;quot;Login failed; this user is not active&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Correct Response Example ====&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Login failed; Invalid userID or password&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The correct response does not indicate if the user ID or password is the incorrect parameter and hence inferring a valid user ID. &lt;br /&gt;
&lt;br /&gt;
==== Error Codes and URLs ====&lt;br /&gt;
&lt;br /&gt;
The application may return a different HTTP Error code depending on the authentication attempt response. It may respond with a 200 for a positive result and a 403 for a negative result. Even though a generic error page is shown to a user, the HTTP response code may differ which can leak information about whether the account is valid or not.&lt;br /&gt;
&lt;br /&gt;
== Prevent Brute-Force Attacks ==&lt;br /&gt;
&lt;br /&gt;
If an attacker is able to guess passwords without the account becoming disabled due to failed authentication attempts, the attacker has an opportunity to continue with a brute force attack until the account is compromised.  Automating brute-force/password guessing attacks on web applications is a trivial challenge. Password lockout mechanisms should be employed that lock out an account if more than a preset number of unsuccessful login attempts are made.  Password lockout mechanisms have a logical weakness. An attacker that undertakes a large number of authentication attempts on known account names can produce a result that locks out entire blocks of user accounts.  Given that the intent of a password lockout system is to protect from brute-force attacks, a sensible strategy is to lockout accounts for a period of time (e.g., 20 minutes). This significantly slows down attackers, while allowing the accounts to reopen automatically for legitimate users.&lt;br /&gt;
&lt;br /&gt;
Also, multi-factor authentication is a very powerful deterrent when trying to prevent brute force attacks since the credentials are a moving target. When multi-factor is implemented and active, account lockout may no longer be necessary.&lt;br /&gt;
&lt;br /&gt;
= Use of authentication protocols that require no password =&lt;br /&gt;
&lt;br /&gt;
While authentication through a user/password combination and using multi-factor authentication is considered generally secure, there are use cases where it isn't considered the best option or even safe. An example of this are third party applications that desire connecting to the web application, either from a mobile device, another website, desktop or other situations. When this happens, it is NOT considered safe to allow the third party application to store the user/password combo, since then it extends the attack surface into their hands, where it isn't in your control. For this, and other use cases, there are several authentication protocols that can protect you from exposing your users' data to attackers.&lt;br /&gt;
&lt;br /&gt;
== OAuth ==&lt;br /&gt;
&lt;br /&gt;
Open Authorization (OAuth) is a protocol that allows an application to authenticate against a server as a user, without requiring passwords or any third party server that acts as an identity provider. It uses a token generated by the server, and provides how the authorization flows most occur, so that a client, such as a mobile application, can tell the server what user is using the service. &lt;br /&gt;
&lt;br /&gt;
The recommendation is to use and implement OAuth 1.0a or OAuth 2.0, since the very first version (OAuth1.0) has been found to be vulnerable to session fixation.&lt;br /&gt;
&lt;br /&gt;
OAuth 2.0 relies on HTTPS for security and is currently used and implemented by API's from companies such as Facebook, Google, Twitter and Microsoft. OAuth1.0a is more difficult to use because it requires the use of cryptographic libraries for digital signatures, however does not rely on HTTPS for security and can therefore be more suited for higher risk transactions.&lt;br /&gt;
&lt;br /&gt;
== OpenId ==&lt;br /&gt;
&lt;br /&gt;
OpenId is an HTTP-based protocol that uses identity providers to validate that a user is who he says he is. It is a very simple protocol which allows a service provider initiated way for single sign-on (SSO). This allows the user to re-use a single identity given to a trusted OpenId identity provider and be the same user in multiple websites, without the need to provide any website the password, except for the OpenId identity provider.&lt;br /&gt;
&lt;br /&gt;
Due to its simplicity and that it provides protection of passwords, OpenId has been well adopted. Some of the well known identity providers for OpenId are Stack Exchange, Google, Facebook and Yahoo!&lt;br /&gt;
&lt;br /&gt;
For non-enterprise environment, OpenId is considered a secure and often better choice, as long as the identity provider is of trust.&lt;br /&gt;
&lt;br /&gt;
== SAML ==&lt;br /&gt;
&lt;br /&gt;
Security Assertion Markup Language (SAML) is often considered to compete with OpenId. The most recommended version is 2.0, since it is very feature complete and provides a strong security. Like with OpenId, SAML uses identity providers, but unlike it, it is XML-based and provides more flexibility. SAML is based on browser redirects which send XML data. Unlike SAML, it isn't only initiated by a service provider, but it can also be initiated from the identity provider. This allows the user to navigate through different portals while still being authenticated without having to do anything, making the process transparent.&lt;br /&gt;
&lt;br /&gt;
While OpenId has taken most of the consumer market, SAML is often the choice for enterprise applications. The reason for this is often that there are few OpenId identity providers which are considered of enterprise class (meaning that the way they validate the user identity doesn't have high standards required for enterprise identity). It is more common to see SAML being used inside of intranet websites, sometimes even using a server from the intranet as the identity provider.&lt;br /&gt;
&lt;br /&gt;
In the past few years, applications like SAP ERP and SharePoint (SharePoint by using Active Directory Federation Services 2.0) have decided to use SAML 2.0 authentication as an often preferred method for single sign-on implementations whenever enterprise federation is required for web services and web applications.&lt;br /&gt;
&lt;br /&gt;
== FIDO ==&lt;br /&gt;
The Fast Identity Online (FIDO) Alliance has created two protocols to facilitate online authentication : the Universal Authentication Framework (UAF) protocol and the Universal Second Factor (U2F) protocol. While UAF focuses on passwordless authentication, U2F allows the addition of a second factor to existing password-based authentication. Both protocols are based on a public key cryptography challenge-response model. &lt;br /&gt;
&lt;br /&gt;
UAF takes advantage of existing security technologies present on devices for authentication including fingerprint sensors, cameras(face biometrics), microphones(voice biometrics), Trusted Execution Environments(TEEs), Secure Elements(SEs) and others. The protocol is designed to plug-in these device capabilities into a common authentication framework. UAF works with both native applications and web applications.&lt;br /&gt;
&lt;br /&gt;
U2F augments password-based authentication using a hardware token (typically USB) that stores cryptographic authentication keys and uses them for signing. The user can use the same token as a second factor for multiple applications. U2F works with web applications. It provides '''protection against phishing''' by using the URL of the website to lookup the stored authentication key.&lt;br /&gt;
&lt;br /&gt;
= Session Management General Guidelines  =&lt;br /&gt;
&lt;br /&gt;
Session management is directly related to authentication. The '''Session Management General Guidelines''' previously available on this OWASP Authentication Cheat Sheet have been integrated into the [[Session Management Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= Password Managers =&lt;br /&gt;
&lt;br /&gt;
Password managers are programs, browser plugins or web services that automate management of large number of different credentials, including memorizing and filling-in, generating random passwords on different sites etc. The web application can help password managers by:&lt;br /&gt;
&lt;br /&gt;
* using standard HTML forms for username and password input,&lt;br /&gt;
* not disabling copy and paste on HTML form fields,&lt;br /&gt;
* allowing very long passwords,&lt;br /&gt;
* not using multi-stage login schemes (username on first screen, then password),&lt;br /&gt;
* not using highly scripted (JavaScript) authentication schemes.&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Eoin Keary eoinkeary[at]owasp.org &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Authentication_Cheat_Sheet&amp;diff=195852</id>
		<title>Authentication Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Authentication_Cheat_Sheet&amp;diff=195852"/>
				<updated>2015-06-07T11:20:17Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
'''Authentication''' is the process of verification that an individual,entity  or website is who it claims to be. Authentication in the context of web applications is commonly performed by submitting a user name or ID and one or more items of private information that only a given user should know. Another form of Authentication is Knowledged Based Authentication.&lt;br /&gt;
&lt;br /&gt;
'''Session Management''' is a process by which a server maintains the state of an entity interacting with it. This is required for a server to remember how to react to subsequent requests throughout a transaction. Sessions are maintained on the server by a session identifier which can be passed back and forward between the client and server when transmitting and receiving requests. Sessions should be unique per user and computationally very difficult to predict.&lt;br /&gt;
&lt;br /&gt;
= Authentication General Guidelines  =&lt;br /&gt;
&lt;br /&gt;
== User IDs ==&lt;br /&gt;
&lt;br /&gt;
Make sure your usernames/userids are case insensitive. Regardless, it would be very strange for user 'smith' and user 'Smith' to be different users. Could result in serious confusion.&lt;br /&gt;
&lt;br /&gt;
=== Email address as a User ID ===&lt;br /&gt;
&lt;br /&gt;
Many sites use email addresses as a user id, which is a good mechanism for ensuring a unique identifier for each user without adding the burden of remembering a new username.&lt;br /&gt;
However, many web applications do not treat email addresses correctly due to common misconceptions about what constitutes a valid address.&lt;br /&gt;
&lt;br /&gt;
Specifically, it is completely valid to have an mailbox address which:&lt;br /&gt;
* Is case sensitive in the local-part&lt;br /&gt;
* Has non-alphanumeric characters in the local-part (including + and '''@''')&lt;br /&gt;
* Has zero or more labels (though zero is admittedly not going to occur)&lt;br /&gt;
&lt;br /&gt;
The local-part is the part of the mailbox address to the left of the rightmost @ character.&lt;br /&gt;
The domain is the part of the mailbox address to the right of the rightmost @ character and consists of zero or more labels joined by a period character.&lt;br /&gt;
&lt;br /&gt;
At the time of writing, RFC 5321 is the current standard defining SMTP and what constitutes a valid mailbox address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Validation ====&lt;br /&gt;
Many web applications contain computationally expensive and inaccurate regular expressions that attempt to validate email addresses.&lt;br /&gt;
&lt;br /&gt;
Recent changes to the landscape mean that the number of false-negatives will increase, particularly due to:&lt;br /&gt;
* Increased popularity of sub-addressing by providers such as Gmail (commonly using &amp;lt;tt&amp;gt;+&amp;lt;/tt&amp;gt; as a token in the local-part to affect delivery)&lt;br /&gt;
* New gTLDs with long names (many regular expressions check the number and length of each label in the domain)&lt;br /&gt;
&lt;br /&gt;
Following RFC 5321, best practice for validating an email address would be to:&lt;br /&gt;
* Check for presence of at least one &amp;lt;tt&amp;gt;@&amp;lt;/tt&amp;gt; symbol in the address&lt;br /&gt;
* Ensure the local-part is no longer than 64 octets&lt;br /&gt;
* Ensure the domain is no longer than 255 octets&lt;br /&gt;
* Ensure the address is deliverable&lt;br /&gt;
&lt;br /&gt;
To ensure an address is deliverable, the only way to check this is to send the user an email and have the user take action to confirm receipt.&lt;br /&gt;
Beyond confirming that the email address is valid and deliverable, this also provides a positive acknowledgement that the user has access to the mailbox and is likely to be authorised to use it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Address Normalisation ====&lt;br /&gt;
As the local-part of email addresses are, in fact - case sensitive, it is important to store and compare email addresses correctly.&lt;br /&gt;
To normalise an email address input, you would convert the domain part ONLY to lowercase.&lt;br /&gt;
&lt;br /&gt;
Unfortunately this does and will make input harder to normalise and correctly match to a users intent.&lt;br /&gt;
&lt;br /&gt;
It is reasonable to only accept one unique capitalisation of an otherwise identical address, however in this case it is critical to:&lt;br /&gt;
* Store the user-part as provided and verified by user verification&lt;br /&gt;
* Perform comparisons by &amp;lt;tt&amp;gt;lowercase(provided)==lowercase(persisted)&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Implement Proper Password Strength Controls ==&lt;br /&gt;
&lt;br /&gt;
A key concern when using passwords for authentication is password strength. A &amp;quot;strong&amp;quot; password policy makes it difficult or even improbable for one to guess the password through either manual or automated means. The following characteristics define a strong password: &lt;br /&gt;
&lt;br /&gt;
=== Password Length ===&lt;br /&gt;
&lt;br /&gt;
Longer passwords provide a greater combination of characters and consequently make it more difficult for an attacker to guess. &lt;br /&gt;
&lt;br /&gt;
* '''Minimum''' length of the passwords should be '''enforced''' by the application.&lt;br /&gt;
** Passwords '''shorter than 10 characters''' are considered to be weak ([http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf]).&lt;br /&gt;
&lt;br /&gt;
While minimum length enforcement may cause problems with memorizing passwords among some users, applications should encourage them to set ''passphrases'' (sentences or combination of words) that can be much longer than typical passwords and yet much easier to remember.&lt;br /&gt;
&lt;br /&gt;
* '''Maximum''' password length should not be set '''too low''', as it will prevent users from creating passphrases. Typical maximum length is 128 characters.&lt;br /&gt;
** Passphrases shorter than 20 characters are usually considered weak if they only consist of lower case Latin characters.&lt;br /&gt;
&lt;br /&gt;
* Every character counts!!&lt;br /&gt;
**Make sure that every character the user types in is actually included in the password. We've seen systems that truncate the password at a length shorter than what the user provided (e.g., truncated at 15 characters when they entered 20).&lt;br /&gt;
**This is usually handled by setting the length of ALL password input fields to be exactly the same length as the maximum length password. This is particularly important if your max password length is short, like 20-30 characters.&lt;br /&gt;
&lt;br /&gt;
=== Password Complexity ===&lt;br /&gt;
&lt;br /&gt;
Applications should enforce password complexity rules to discourage easy to guess passwords. Password mechanisms should allow virtually any character the user can type to be part of their password, including the space character. Passwords should, obviously, be case sensitive in order to increase their complexity. Occasionally, we find systems where passwords aren't case sensitive, frequently due to legacy system issues like old mainframes that didn't have case sensitive passwords.&lt;br /&gt;
&lt;br /&gt;
The password change mechanism should require a minimum level of complexity that makes sense for the application and its user population. For example:&lt;br /&gt;
&lt;br /&gt;
*Password must meet at least 3 out of the following 4 complexity rules&lt;br /&gt;
**at least 1 uppercase character (A-Z) &lt;br /&gt;
**at least 1 lowercase character (a-z) &lt;br /&gt;
**at least 1 digit (0-9) &lt;br /&gt;
**at least 1 [[Password special characters|special character (punctuation)]] &amp;amp;mdash; do not forget to treat space as special characters too&lt;br /&gt;
*at least 10 characters &lt;br /&gt;
*at most 128 characters&lt;br /&gt;
*not more than 2 identical characters in a row (e.g., 111 not allowed)&lt;br /&gt;
&lt;br /&gt;
As application's require more complex password policies, they need to be very clear about what these policies are.&lt;br /&gt;
*The required policy needs to be explicitly stated on the password change page&lt;br /&gt;
** be sure to list every special character you allow, so it's obvious to the user&lt;br /&gt;
&lt;br /&gt;
Recommendation:&lt;br /&gt;
* Ideally, the application would indicate to the user as they type in their new password how much of the complexity policy their new password meets&lt;br /&gt;
**In fact, the submit button should be grayed out until the new password meets the complexity policy and the 2nd copy of the new password matches the 1st. This will make it far easier for the user to understand and comply with your complexity policy.&lt;br /&gt;
&lt;br /&gt;
Regardless of how the UI behaves, when a user submits their password change request:&lt;br /&gt;
*If the new password doesn't comply with the complexity policy, the error message should describe EVERY complexity rule that the new password does not comply with, not just the 1st rule it doesn't comply with&lt;br /&gt;
&lt;br /&gt;
Changing passwords should be EASY, not a hunt in the dark.&lt;br /&gt;
&lt;br /&gt;
== Implement Secure Password Recovery Mechanism ==&lt;br /&gt;
&lt;br /&gt;
It is common for an application to have a mechanism that provides a means for a user to gain access to their account in the event they forget their password. Please see [[Forgot Password Cheat Sheet]] for details on this feature.&lt;br /&gt;
&lt;br /&gt;
== Store Passwords in a Secure Fashion ==&lt;br /&gt;
&lt;br /&gt;
It is critical for a application to store a password using the right cryptographic technique. Please see [[Password Storage Cheat Sheet]] for details on this feature.&lt;br /&gt;
&lt;br /&gt;
== Transmit Passwords Only Over TLS ==&lt;br /&gt;
&lt;br /&gt;
See: [[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
The login page and all subsequent authenticated pages must be exclusively accessed over TLS. The initial login page, referred to as the &amp;quot;login landing page&amp;quot;, must be served over TLS. Failure to utilize TLS for the login landing page allows an attacker to modify the login form action, causing the user's credentials to be posted to an arbitrary location. Failure to utilize TLS for authenticated pages after the login enables an attacker to view the unencrypted session ID and compromise the user's authenticated session.&lt;br /&gt;
&lt;br /&gt;
== Require Re-authentication for Sensitive Features ==&lt;br /&gt;
&lt;br /&gt;
In order to mitigate CSRF and session hijacking, it's important to require the current credentials for an account before updating sensitive account information such as the user's password, user's email, or before sensitive transactions, such as shipping a purchase to a new address.  Without this countermeasure, an attacker may be able to execute sensitive transactions through a CSRF or XSS attack without needing to know the user's current credentials.  Additionally, an attacker may get temporary physical access to a user's browser or steal their session ID to take over the user's session.&lt;br /&gt;
&lt;br /&gt;
== Utilize Multi-Factor Authentication ==&lt;br /&gt;
&lt;br /&gt;
Multi-factor authentication (MFA) is using more than one authentication factor to logon or process a transaction:&lt;br /&gt;
&lt;br /&gt;
*Something you know (account details or passwords) &lt;br /&gt;
*Something you have (tokens or mobile phones) &lt;br /&gt;
*Something you are (biometrics)&lt;br /&gt;
&lt;br /&gt;
Authentication schemes such as One Time Passwords (OTP) implemented using a hardware token can also be key in fighting attacks such as CSRF and client-side malware. A number of hardware tokens suitable for MFA are available in the market that allow good integration with web applications. See: [http://en.wikipedia.org/wiki/Security_token].&lt;br /&gt;
&lt;br /&gt;
=== SSL Client Authentication ===&lt;br /&gt;
&lt;br /&gt;
SSL Client Authentication, also known as two-way SSL authentication, consists of both, browser and server, sending their respective SSL certificates during the TLS handshake process. Just as you can validate the authenticity of a server by using the certificate and asking a well known Certificate Authority (CA) if the certificate is valid, the server can authenticate the user by receiving a certificate from the client and validating against a third party CA or its own CA. To do this, the server must provide the user with a certificate generated specifically for him, assigning values to the subject so that these can be used to determine what user the certificate should validate. The user installs the certificate on a browser and now uses it for the website.&lt;br /&gt;
&lt;br /&gt;
It is a good idea to do this when:&lt;br /&gt;
&lt;br /&gt;
*It is acceptable (or even preferred) that the user only has access to the website from only a single computer/browser.&lt;br /&gt;
*The user is not easily scared by the process of installing SSL certificates on his browser or there will be someone, probably from IT support, that will do this for the user.&lt;br /&gt;
*The website requires an extra step of security.&lt;br /&gt;
*It is also a good thing to use when the website is for an intranet of a company or organization.&lt;br /&gt;
&lt;br /&gt;
It is generally not a good idea to use this method for widely and publicly available websites that will have an average user. For example, it wouldn't be a good idea to implement this for a website like Facebook. While this technique can prevent the user from having to type a password (thus protecting against an average keylogger from stealing it), it is still considered a good idea to consider using both a password and SSL client authentication combined.&lt;br /&gt;
&lt;br /&gt;
For more information, see: [http://publib.boulder.ibm.com/infocenter/tivihelp/v5r1/index.jsp?topic=%2Fcom.ibm.itim.infocenter.doc%2Fcpt%2Fcpt_ic_security_ssl_authent2way.html] or [http://www.codeproject.com/Articles/326574/An-Introduction-to-Mutual-SSL-Authentication]&lt;br /&gt;
&lt;br /&gt;
== Authentication and Error Messages ==&lt;br /&gt;
&lt;br /&gt;
Incorrectly implemented error messages in the case of authentication functionality can be used for the purposes of user ID and password enumeration. An application should respond (both HTTP and HTML) in a generic manner.&lt;br /&gt;
&lt;br /&gt;
==== Authentication Responses ====&lt;br /&gt;
&lt;br /&gt;
An application should respond with a generic error message regardless of whether the user ID or password was incorrect. It should also give no indication to the status of an existing account.&lt;br /&gt;
&lt;br /&gt;
==== Incorrect Response Examples ====&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Login for User foo: invalid password&amp;quot; &lt;br /&gt;
*&amp;quot;Login failed, invalid user ID&amp;quot; &lt;br /&gt;
*&amp;quot;Login failed; account disabled&amp;quot; &lt;br /&gt;
*&amp;quot;Login failed; this user is not active&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Correct Response Example ====&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Login failed; Invalid userID or password&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The correct response does not indicate if the user ID or password is the incorrect parameter and hence inferring a valid user ID. &lt;br /&gt;
&lt;br /&gt;
==== Error Codes and URLs ====&lt;br /&gt;
&lt;br /&gt;
The application may return a different HTTP Error code depending on the authentication attempt response. It may respond with a 200 for a positive result and a 403 for a negative result. Even though a generic error page is shown to a user, the HTTP response code may differ which can leak information about whether the account is valid or not.&lt;br /&gt;
&lt;br /&gt;
== Prevent Brute-Force Attacks ==&lt;br /&gt;
&lt;br /&gt;
If an attacker is able to guess passwords without the account becoming disabled due to failed authentication attempts, the attacker has an opportunity to continue with a brute force attack until the account is compromised.  Automating brute-force/password guessing attacks on web applications is a trivial challenge. Password lockout mechanisms should be employed that lock out an account if more than a preset number of unsuccessful login attempts are made.  Password lockout mechanisms have a logical weakness. An attacker that undertakes a large number of authentication attempts on known account names can produce a result that locks out entire blocks of user accounts.  Given that the intent of a password lockout system is to protect from brute-force attacks, a sensible strategy is to lockout accounts for a period of time (e.g., 20 minutes). This significantly slows down attackers, while allowing the accounts to reopen automatically for legitimate users.&lt;br /&gt;
&lt;br /&gt;
Also, multi-factor authentication is a very powerful deterrent when trying to prevent brute force attacks since the credentials are a moving target. When multi-factor is implemented and active, account lockout may no longer be necessary.&lt;br /&gt;
&lt;br /&gt;
= Use of authentication protocols that require no password =&lt;br /&gt;
&lt;br /&gt;
While authentication through a user/password combination and using multi-factor authentication is considered generally secure, there are use cases where it isn't considered the best option or even safe. An example of this are third party applications that desire connecting to the web application, either from a mobile device, another website, desktop or other situations. When this happens, it is NOT considered safe to allow the third party application to store the user/password combo, since then it extends the attack surface into their hands, where it isn't in your control. For this, and other use cases, there are several authentication protocols that can protect you from exposing your users' data to attackers.&lt;br /&gt;
&lt;br /&gt;
== OAuth ==&lt;br /&gt;
&lt;br /&gt;
Open Authorization (OAuth) is a protocol that allows an application to authenticate against a server as a user, without requiring passwords or any third party server that acts as an identity provider. It uses a token generated by the server, and provides how the authorization flows most occur, so that a client, such as a mobile application, can tell the server what user is using the service. &lt;br /&gt;
&lt;br /&gt;
The recommendation is to use and implement OAuth 1.0a or OAuth 2.0, since the very first version (OAuth1.0) has been found to be vulnerable to session fixation.&lt;br /&gt;
&lt;br /&gt;
OAuth 2.0 relies on HTTPS for security and is currently used and implemented by API's from companies such as Facebook, Google, Twitter and Microsoft. OAuth1.0a is more difficult to use because it requires the use of cryptographic libraries for digital signatures, however does not rely on HTTPS for security and can therefore be more suited for higher risk transactions.&lt;br /&gt;
&lt;br /&gt;
== OpenId ==&lt;br /&gt;
&lt;br /&gt;
OpenId is an HTTP-based protocol that uses identity providers to validate that a user is who he says he is. It is a very simple protocol which allows a service provider initiated way for single sign-on (SSO). This allows the user to re-use a single identity given to a trusted OpenId identity provider and be the same user in multiple websites, without the need to provide any website the password, except for the OpenId identity provider.&lt;br /&gt;
&lt;br /&gt;
Due to its simplicity and that it provides protection of passwords, OpenId has been well adopted. Some of the well known identity providers for OpenId are Stack Exchange, Google, Facebook and Yahoo!&lt;br /&gt;
&lt;br /&gt;
For non-enterprise environment, OpenId is considered a secure and often better choice, as long as the identity provider is of trust.&lt;br /&gt;
&lt;br /&gt;
== SAML ==&lt;br /&gt;
&lt;br /&gt;
Security Assertion Markup Language (SAML) is often considered to compete with OpenId. The most recommended version is 2.0, since it is very feature complete and provides a strong security. Like with OpenId, SAML uses identity providers, but unlike it, it is XML-based and provides more flexibility. SAML is based on browser redirects which send XML data. Unlike SAML, it isn't only initiated by a service provider, but it can also be initiated from the identity provider. This allows the user to navigate through different portals while still being authenticated without having to do anything, making the process transparent.&lt;br /&gt;
&lt;br /&gt;
While OpenId has taken most of the consumer market, SAML is often the choice for enterprise applications. The reason for this is often that there are few OpenId identity providers which are considered of enterprise class (meaning that the way they validate the user identity doesn't have high standards required for enterprise identity). It is more common to see SAML being used inside of intranet websites, sometimes even using a server from the intranet as the identity provider.&lt;br /&gt;
&lt;br /&gt;
In the past few years, applications like SAP ERP and SharePoint (SharePoint by using Active Directory Federation Services 2.0) have decided to use SAML 2.0 authentication as an often preferred method for single sign-on implementations whenever enterprise federation is required for web services and web applications.&lt;br /&gt;
&lt;br /&gt;
== FIDO ==&lt;br /&gt;
The Fast Identity Online (FIDO) Alliance has created two protocols to facilitate online authentication : the Universal Authentication Framework (UAF) protocol and the Universal Second Factor (U2F) protocol. While UAF focuses on passwordless authentication, U2F allows the addition of a second factor to existing password-based authentication. Both protocols are based on a public key cryptography challenge-response model. &lt;br /&gt;
&lt;br /&gt;
UAF takes advantage of existing security technologies present on devices for authentication including fingerprint sensors, cameras(face biometrics), microphones(voice biometrics), Trusted Execution Environments(TEEs), Secure Elements(SEs) and others. The protocol is designed to plug-in these device capabilities into a common authentication framework. UAF works with both native applications and web applications.&lt;br /&gt;
&lt;br /&gt;
U2F augments password-based authentication using a hardware token (typically USB) that stores cryptographic authentication keys and uses them for signing. The user can use the same token as a second factor for multiple applications. U2F works with web applications. It provides '''protection against phishing''' by using the URL of the website to lookup the stored authentication key.&lt;br /&gt;
&lt;br /&gt;
= Session Management General Guidelines  =&lt;br /&gt;
&lt;br /&gt;
Session management is directly related to authentication. The '''Session Management General Guidelines''' previously available on this OWASP Authentication Cheat Sheet have been integrated into the [[Session Management Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= Password Managers =&lt;br /&gt;
&lt;br /&gt;
Password managers are programs, browser plugins or web services that automate management of large number of different credentials, including memorizing and filling-in, generating random passwords on different sites etc. The web application can help password managers by:&lt;br /&gt;
&lt;br /&gt;
* using standard HTML forms for username and password input,&lt;br /&gt;
* not disabling copy and paste on HTML form fields,&lt;br /&gt;
* allowing very long passwords,&lt;br /&gt;
* not using multi-stage login schemes (username on first screen, then password),&lt;br /&gt;
* not using highly scripted (JavaScript) authentication schemes.&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Eoin Keary eoinkeary[at]owasp.org &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195820</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195820"/>
				<updated>2015-06-05T08:44:47Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group Join our meetup group]&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
===Join Our Events===&lt;br /&gt;
&lt;br /&gt;
Please join our meetup group if you would like to attend future events:&lt;br /&gt;
It is important to RSVP if you would like to attend, our venue is not very big.&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195819</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195819"/>
				<updated>2015-06-05T08:44:15Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
&lt;br /&gt;
*[*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group Join our meetup group]&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
===Join Our Events===&lt;br /&gt;
&lt;br /&gt;
Please join our meetup group if you would like to attend future events:&lt;br /&gt;
It is important to RSVP if you would like to attend, our venue is not very big.&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195818</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195818"/>
				<updated>2015-06-05T08:43:36Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
===Join Our Events===&lt;br /&gt;
&lt;br /&gt;
Please join our meetup group if you would like to attend future events:&lt;br /&gt;
It is important to RSVP if you would like to attend, our venue is not very big.&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195817</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195817"/>
				<updated>2015-06-05T08:43:02Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
'''Join Our Events'''&lt;br /&gt;
Please join our meetup group if you would like to attend future events:&lt;br /&gt;
It is important to RSVP if you would like to attend, our venue is not very big.&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195816</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195816"/>
				<updated>2015-06-05T08:42:18Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
Please join our meetup group if you would like to attend future events:&lt;br /&gt;
It is important to RSVP if you would like to attend, our venue is not very big.&lt;br /&gt;
*[http://www.meetup.com/OWASP-Cape-Town-Chapter-Meetup OWASP Cape Town Chapter Meetup Group]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195778</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195778"/>
				<updated>2015-06-04T10:28:54Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:timo.goosen@owasp.org Timo Goosen]&lt;br /&gt;
[mailto:christo.goosen@owasp.org Christo Goosen]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cape-town|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/3_Jun_2015_Codebridge Codebridge 3 Jun 2015]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195705</id>
		<title>Cape Town</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cape_Town&amp;diff=195705"/>
				<updated>2015-06-03T11:03:59Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cape Town|extra=The chapter leaders are [mailto:Timo.Goosen@ Timo Goosen]&lt;br /&gt;
[mailto:Christo.Goosen@ Christo Goosen]&lt;br /&gt;
[mailto:Johan.Snyman@ Johan Snyman]&lt;br /&gt;
.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-southafrica|emailarchives=http://lists.owasp.org/pipermail/owasp-cape-town}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Africa]]&lt;br /&gt;
[[Category:South Africa]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Secure_Configuration_Guide&amp;diff=191259</id>
		<title>Secure Configuration Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Secure_Configuration_Guide&amp;diff=191259"/>
				<updated>2015-03-12T14:53:36Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* 6. Crypto misconfiguration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome on the page of Secure Configuration Guide!&lt;br /&gt;
&lt;br /&gt;
Project description is available here: https://www.owasp.org/index.php/OWASP_Secure_Configuration_Guide&lt;br /&gt;
&lt;br /&gt;
When editing the page, please follow the page structure, described in [[Template:OWASP Secure Configuration Guide]]&lt;br /&gt;
&lt;br /&gt;
= Table of Contents =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1. Introduction ==&lt;br /&gt;
&lt;br /&gt;
'''1.1. The OWASP Secure Configuration Guide'''&lt;br /&gt;
&lt;br /&gt;
'''1.2. Misconfiguration. Defender's point'''&lt;br /&gt;
&lt;br /&gt;
'''1.3. Misconfiguration. Attacker's point'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2. Web servers misconfiguration ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_Apache|2.1. Apache]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_IIS|2.2. IIS]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_nginx|2.3. nginx]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_GWS|2.4. GWS]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_IBM|2.5. IBM HTTP Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_LIGHTTPD|2.6 lighttpd]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_OPENBSD_HTTPD|2.7 New OpenBSD HTTPD Webserver]]'''&lt;br /&gt;
&lt;br /&gt;
== 3. Application servers misconfiguration ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_Tomcat|3.1. Apache Tomcat]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_Borland|3.2. Borland Enterprise Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_ColdFusion|3.3. ColdFusion]]''' &lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_WebSphere|3.4. IBM WebSphere Application Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_JBoss|3.5. JBoss Enterprise Application Platform]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_Jetty|3.6. Jetty]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_NetWeaver|3.7. SAP NetWeaver Application Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_Oracle|3.8. Oracle Application Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_WebLogic|3.9. Oracle WebLogic Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_GlassFish|3.10. Oracle GlassFish Server]]'''&lt;br /&gt;
&lt;br /&gt;
== 4. Web frameworks misconfiguration ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Struts|4.1. Apache Struts]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_ASPNET|4.2. ASP.NET]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_CakePHP|4.3. CakePHP]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_CodeIgniter|4.4. CodeIgniter]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Django|4.5. Django]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Lithium|4.6. Lithium]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Rails|4.7. Ruby on Rails]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Spring|4.8. Spring]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Symfony|4.9. Symfony]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Zend|4.10. Zend]]'''&lt;br /&gt;
&lt;br /&gt;
== 5. CMS misconfiguration ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Bitrix|5.1. Bitrix]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Drupal|5.2. Drupal]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Joomla|5.3. Joomla]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Magento|5.4. Magento]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_OpenCart|5.5. OpenCart]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_phpBB|5.6. phpBB]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Shopify|5.7. Shopify]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_TYPO3|5.8. TYPO3]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_vBulletin|5.9. vBulletin]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Wordpress|5.10. Wordpress]]'''&lt;br /&gt;
&lt;br /&gt;
== 6. Crypto misconfiguration  ==&lt;br /&gt;
&lt;br /&gt;
'''Hardening'''&lt;br /&gt;
*[https://bettercrypto.org/static/applied-crypto-hardening.pdf Applied Crypto Hardening General Hardening]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Testing Crypto Config'''&lt;br /&gt;
*[https://www.owasp.org/index.php/Testing_for_SSL-TLS_%28OWASP-CM-001%29 Testing for SSL-TLS OWASP-CM-001]&lt;br /&gt;
*[https://www.digicert.com/help/ Digicert Testing Suite]&lt;br /&gt;
*[https://www.ssllabs.com/ssltest/index.html SSL Labs SSL Test]&lt;br /&gt;
&lt;br /&gt;
== 7. Services ==&lt;br /&gt;
&lt;br /&gt;
'''7.1. VNC''' - srsly.de ;)&lt;br /&gt;
&lt;br /&gt;
'''SSH'''&lt;br /&gt;
&lt;br /&gt;
'''RDP'''&lt;br /&gt;
&lt;br /&gt;
'''7.2 to be complemented later'''&lt;br /&gt;
&lt;br /&gt;
== 8. Devices ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_D_BIGIP|8.1. BIG-IP]]''' &lt;br /&gt;
&lt;br /&gt;
'''8.2. Routers''' &lt;br /&gt;
&lt;br /&gt;
'''8.3. Firewalls '''&lt;br /&gt;
&lt;br /&gt;
'''8.4. to be complemented later'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Secure_Configuration_Guide&amp;diff=191256</id>
		<title>Secure Configuration Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Secure_Configuration_Guide&amp;diff=191256"/>
				<updated>2015-03-12T14:43:38Z</updated>
		
		<summary type="html">&lt;p&gt;Timo.goosen: /* 6. Crypto misconfiguration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome on the page of Secure Configuration Guide!&lt;br /&gt;
&lt;br /&gt;
Project description is available here: https://www.owasp.org/index.php/OWASP_Secure_Configuration_Guide&lt;br /&gt;
&lt;br /&gt;
When editing the page, please follow the page structure, described in [[Template:OWASP Secure Configuration Guide]]&lt;br /&gt;
&lt;br /&gt;
= Table of Contents =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1. Introduction ==&lt;br /&gt;
&lt;br /&gt;
'''1.1. The OWASP Secure Configuration Guide'''&lt;br /&gt;
&lt;br /&gt;
'''1.2. Misconfiguration. Defender's point'''&lt;br /&gt;
&lt;br /&gt;
'''1.3. Misconfiguration. Attacker's point'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2. Web servers misconfiguration ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_Apache|2.1. Apache]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_IIS|2.2. IIS]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_nginx|2.3. nginx]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_GWS|2.4. GWS]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_IBM|2.5. IBM HTTP Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_LIGHTTPD|2.6 lighttpd]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WS_OPENBSD_HTTPD|2.7 New OpenBSD HTTPD Webserver]]'''&lt;br /&gt;
&lt;br /&gt;
== 3. Application servers misconfiguration ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_Tomcat|3.1. Apache Tomcat]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_Borland|3.2. Borland Enterprise Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_ColdFusion|3.3. ColdFusion]]''' &lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_WebSphere|3.4. IBM WebSphere Application Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_JBoss|3.5. JBoss Enterprise Application Platform]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_Jetty|3.6. Jetty]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_NetWeaver|3.7. SAP NetWeaver Application Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_Oracle|3.8. Oracle Application Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_WebLogic|3.9. Oracle WebLogic Server]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_AS_GlassFish|3.10. Oracle GlassFish Server]]'''&lt;br /&gt;
&lt;br /&gt;
== 4. Web frameworks misconfiguration ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Struts|4.1. Apache Struts]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_ASPNET|4.2. ASP.NET]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_CakePHP|4.3. CakePHP]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_CodeIgniter|4.4. CodeIgniter]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Django|4.5. Django]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Lithium|4.6. Lithium]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Rails|4.7. Ruby on Rails]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Spring|4.8. Spring]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Symfony|4.9. Symfony]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_WF_Zend|4.10. Zend]]'''&lt;br /&gt;
&lt;br /&gt;
== 5. CMS misconfiguration ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Bitrix|5.1. Bitrix]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Drupal|5.2. Drupal]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Joomla|5.3. Joomla]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Magento|5.4. Magento]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_OpenCart|5.5. OpenCart]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_phpBB|5.6. phpBB]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Shopify|5.7. Shopify]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_TYPO3|5.8. TYPO3]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_vBulletin|5.9. vBulletin]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_CMS_Wordpress|5.10. Wordpress]]'''&lt;br /&gt;
&lt;br /&gt;
== 6. Crypto misconfiguration  ==&lt;br /&gt;
&lt;br /&gt;
The most comprehensive guide found so far:&lt;br /&gt;
&lt;br /&gt;
*[https://bettercrypto.org/static/applied-crypto-hardening.pdf Applied Crypto Hardening]&lt;br /&gt;
&lt;br /&gt;
== 7. Services ==&lt;br /&gt;
&lt;br /&gt;
'''7.1. VNC''' - srsly.de ;)&lt;br /&gt;
&lt;br /&gt;
'''SSH'''&lt;br /&gt;
&lt;br /&gt;
'''RDP'''&lt;br /&gt;
&lt;br /&gt;
'''7.2 to be complemented later'''&lt;br /&gt;
&lt;br /&gt;
== 8. Devices ==&lt;br /&gt;
&lt;br /&gt;
'''[[SCG_D_BIGIP|8.1. BIG-IP]]''' &lt;br /&gt;
&lt;br /&gt;
'''8.2. Routers''' &lt;br /&gt;
&lt;br /&gt;
'''8.3. Firewalls '''&lt;br /&gt;
&lt;br /&gt;
'''8.4. to be complemented later'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Timo.goosen</name></author>	</entry>

	</feed>