<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tonimir+Kisasondi</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tonimir+Kisasondi"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Tonimir_Kisasondi"/>
		<updated>2026-04-29T19:28:38Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=256226</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=256226"/>
				<updated>2019-12-03T08:00:29Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, organising or holding OWASP meetups, do not hesitate to contact us, Croatia has a very small infosec community and we are very inclusive. If you are interested to be even more active in this area, we are happy to have co-leads. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
Welcome. Since our start, we agreed we will have regular meetings in Varaždin and Zagreb in order to make it more attractive. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organising local chapter. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': FOI, Pavlinska 2, 42000 Varaždin, Hrvatska at the scene of any FSec Underground meet ([https://www.facebook.com/fsec2017/ Page])&lt;br /&gt;
&lt;br /&gt;
'''Next Planned meetups:'''&lt;br /&gt;
 * 27th of February 2019 at [https://www.meetup.com/Kubernetes-Croatia/events/258931456/ Cloud Native meetup - Kino Europa]&lt;br /&gt;
 * At the DORS/CLUC 2019 (Zagreb) 18.04.2019 - https://2019.dorscluc.org/&lt;br /&gt;
 * At BSidesVarazdin.org - 18.9.2019&lt;br /&gt;
 * At Kubernetes and Cloud Native meetup Zagreb 5.12.2019 - https://www.meetup.com/Kubernetes-Croatia/events/266384582/&lt;br /&gt;
&lt;br /&gt;
'''Previous meetups:'''&lt;br /&gt;
 OWASP meetup at the IoT Hacking School of 2018  |([https://hack.foi.hr Info])&lt;br /&gt;
 OWASP meetup at the FSec 2017 ([https://www.flickr.com/photos/58943051@N07/sets/72157667605653398 Photos]) |  ([https://fsec.foi.hr Info])&lt;br /&gt;
 OWASP meetup at FSec 2016 ([https://www.flickr.com/photos/58943051@N07/sets/72157673516643570 Photos]) | ([https://fsec.foi.hr Info])&lt;br /&gt;
 [http://www.foi.unizg.hr/Ljetna-skola-aplikacijske-sigurnost-na-FOI-ju OWASP application security summer school] from 23th to 26th of September, 2014 @ FOI ([https://www.flickr.com/photos/58943051@N07/sets/72157648047647530/ Photos])&lt;br /&gt;
 OWASP round table/meetup on 14.9.2015 @ [http://fsec.foi.hr/ FOI/FSEC]&lt;br /&gt;
 OWASP regular/meeting on 26.2.2016 at 18:00 (FOI Infoclub, Basement) | [https://www.facebook.com/events/1840212762872033/ Link to FB Event]  [http://www.foi.unizg.hr/hr/novosti/razmjena-vjestina-owasp-croatia-meetup Link to Web]&lt;br /&gt;
 OWASP Croatia meeting 11.5.2016 at 17:00 (FER Zagreb, Hall B2) | [https://www.facebook.com/events/475076512695702/ Link to FB Event] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-May/000013.html Event details] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-April/000012.html Email CFP] | [[Croatia/presentations]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=253001</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=253001"/>
				<updated>2019-07-14T20:14:42Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, organising or holding OWASP meetups, do not hesitate to contact us, Croatia has a very small infosec community and we are very inclusive. If you are interested to be even more active in this area, we are happy to have co-leads. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
Welcome. Since our start, we agreed we will have regular meetings in Varaždin and Zagreb in order to make it more attractive. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organising local chapter. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': FOI, Pavlinska 2, 42000 Varaždin, Hrvatska at the scene of any FSec Underground meet ([https://www.facebook.com/fsec2017/ Page])&lt;br /&gt;
&lt;br /&gt;
'''Next Planned meetups:'''&lt;br /&gt;
 * 27th of February 2019 at [https://www.meetup.com/Kubernetes-Croatia/events/258931456/ Cloud Native meetup - Kino Europa]&lt;br /&gt;
 * At the DORS/CLUC 2019 (Zagreb) 18.04.2019 - https://2019.dorscluc.org/&lt;br /&gt;
 * At BSidesVarazdin - 18.9.2019&lt;br /&gt;
&lt;br /&gt;
'''Previous meetups:'''&lt;br /&gt;
 OWASP meetup at the IoT Hacking School of 2018  |([https://hack.foi.hr Info])&lt;br /&gt;
 OWASP meetup at the FSec 2017 ([https://www.flickr.com/photos/58943051@N07/sets/72157667605653398 Photos]) |  ([https://fsec.foi.hr Info])&lt;br /&gt;
 OWASP meetup at FSec 2016 ([https://www.flickr.com/photos/58943051@N07/sets/72157673516643570 Photos]) | ([https://fsec.foi.hr Info])&lt;br /&gt;
 [http://www.foi.unizg.hr/Ljetna-skola-aplikacijske-sigurnost-na-FOI-ju OWASP application security summer school] from 23th to 26th of September, 2014 @ FOI ([https://www.flickr.com/photos/58943051@N07/sets/72157648047647530/ Photos])&lt;br /&gt;
 OWASP round table/meetup on 14.9.2015 @ [http://fsec.foi.hr/ FOI/FSEC]&lt;br /&gt;
 OWASP regular/meeting on 26.2.2016 at 18:00 (FOI Infoclub, Basement) | [https://www.facebook.com/events/1840212762872033/ Link to FB Event]  [http://www.foi.unizg.hr/hr/novosti/razmjena-vjestina-owasp-croatia-meetup Link to Web]&lt;br /&gt;
 OWASP Croatia meeting 11.5.2016 at 17:00 (FER Zagreb, Hall B2) | [https://www.facebook.com/events/475076512695702/ Link to FB Event] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-May/000013.html Event details] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-April/000012.html Email CFP] | [[Croatia/presentations]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=247552</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=247552"/>
				<updated>2019-02-15T23:17:46Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, organising or holding OWASP meetups, do not hesitate to contact us, Croatia has a very small infosec community and we are very inclusive. If you are interested to be even more active in this area, we are happy to have co-leads. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
Welcome. Since our start, we agreed we will have regular meetings in Varaždin and Zagreb in order to make it more attractive. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organising local chapter. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': FOI, Pavlinska 2, 42000 Varaždin, Hrvatska at the scene of any FSec Underground meet ([https://www.facebook.com/fsec2017/ Page])&lt;br /&gt;
&lt;br /&gt;
'''Next Planned meetups:'''&lt;br /&gt;
 * 27th of February 2019 at [https://www.meetup.com/Kubernetes-Croatia/events/258931456/ Cloud Native meetup - Kino Europa]&lt;br /&gt;
 * At the DORS/CLUC 2019 (Zagreb) 18.04.2019 - https://2019.dorscluc.org/&lt;br /&gt;
 * At Sept 2019 (TBD)&lt;br /&gt;
&lt;br /&gt;
'''Previous meetups:'''&lt;br /&gt;
 OWASP meetup at the IoT Hacking School of 2018  |([https://hack.foi.hr Info])&lt;br /&gt;
 OWASP meetup at the FSec 2017 ([https://www.flickr.com/photos/58943051@N07/sets/72157667605653398 Photos]) |  ([https://fsec.foi.hr Info])&lt;br /&gt;
 OWASP meetup at FSec 2016 ([https://www.flickr.com/photos/58943051@N07/sets/72157673516643570 Photos]) | ([https://fsec.foi.hr Info])&lt;br /&gt;
 [http://www.foi.unizg.hr/Ljetna-skola-aplikacijske-sigurnost-na-FOI-ju OWASP application security summer school] from 23th to 26th of September, 2014 @ FOI ([https://www.flickr.com/photos/58943051@N07/sets/72157648047647530/ Photos])&lt;br /&gt;
 OWASP round table/meetup on 14.9.2015 @ [http://fsec.foi.hr/ FOI/FSEC]&lt;br /&gt;
 OWASP regular/meeting on 26.2.2016 at 18:00 (FOI Infoclub, Basement) | [https://www.facebook.com/events/1840212762872033/ Link to FB Event]  [http://www.foi.unizg.hr/hr/novosti/razmjena-vjestina-owasp-croatia-meetup Link to Web]&lt;br /&gt;
 OWASP Croatia meeting 11.5.2016 at 17:00 (FER Zagreb, Hall B2) | [https://www.facebook.com/events/475076512695702/ Link to FB Event] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-May/000013.html Event details] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-April/000012.html Email CFP] | [[Croatia/presentations]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=246129</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=246129"/>
				<updated>2018-12-18T21:36:44Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Patched to fix inaccuracies&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, organising or holding OWASP meetups, do not hesitate to contact us, Croatia has a very small infosec community and we are very inclusive. If you are interested to be even more active in this area, we are happy to have co-leads. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
Welcome. Since our start, we agreed we will have regular meetings in Varaždin and Zagreb in order to make it more attractive. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organising local chapter. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': FOI, Pavlinska 2, 42000 Varaždin, Hrvatska at the scene of any FSec Underground meet ([https://www.facebook.com/fsec2017/ Page])&lt;br /&gt;
&lt;br /&gt;
Next Planned meetups:&lt;br /&gt;
 * Last Friday of February 2019 (22.2) in Varaždin @ FOI&lt;br /&gt;
 * At the DORS/CLUC 2019 (Zagreb) - https://2019.dorscluc.org/&lt;br /&gt;
 * At Sept 2019 (TBD)&lt;br /&gt;
 '''Previous event''': OWASP meetup at the IoT Hacking School of 2018  |([https://hack.foi.hr Info])&lt;br /&gt;
 '''Previous event''': OWASP meetup at the FSec 2017 ([https://www.flickr.com/photos/58943051@N07/sets/72157667605653398 Photos]) |  ([https://fsec.foi.hr Info])&lt;br /&gt;
 '''Previous event''': OWASP meetup at FSec 2016 ([https://www.flickr.com/photos/58943051@N07/sets/72157673516643570 Photos]) | ([https://fsec.foi.hr Info])&lt;br /&gt;
 '''Previous event''': [http://www.foi.unizg.hr/Ljetna-skola-aplikacijske-sigurnost-na-FOI-ju OWASP application security summer school] from 23th to 26th of September, 2014 @ FOI ([https://www.flickr.com/photos/58943051@N07/sets/72157648047647530/ Photos])&lt;br /&gt;
 '''Previous meetup''': OWASP round table/meetup on 14.9.2015 @ [http://fsec.foi.hr/ FOI/FSEC]&lt;br /&gt;
 '''Previous meetings''': OWASP regular/meeting on 26.2.2016 at 18:00 (FOI Infoclub, Basement) | [https://www.facebook.com/events/1840212762872033/ Link to FB Event]  [http://www.foi.unizg.hr/hr/novosti/razmjena-vjestina-owasp-croatia-meetup Link to Web]&lt;br /&gt;
 '''Previous meeting''': OWASP Croatia meeting 11.5.2016 at 17:00 (FER Zagreb, Hall B2) | [https://www.facebook.com/events/475076512695702/ Link to FB Event] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-May/000013.html Event details] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-April/000012.html Email CFP] | [[Croatia/presentations]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=245190</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=245190"/>
				<updated>2018-11-16T14:13:57Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, organising or holding OWASP meetups, do not hesitate to contact us, Croatia has a very small infosec community and we are very inclusive. If you are interested to be even more active in this area, we are happy to have co-leads. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
Welcome. Since our start, we agreed we will have regular meetings in Varaždin and Zagreb in order to make it more attractive. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organising local chapter. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': FOI, Pavlinska 2, 42000 Varaždin, Hrvatska at the scene of any FSec Underground meet ([https://www.facebook.com/fsec2017/ Page])&lt;br /&gt;
&lt;br /&gt;
Next Planned meetups:&lt;br /&gt;
 * Last Friday of February 2018 (22.2) in Varaždin / FOI&lt;br /&gt;
 * At the DORS/CLUC 2019 (Zagreb)&lt;br /&gt;
 * At Sept 2019 (TBD)&lt;br /&gt;
&lt;br /&gt;
 '''Previous event''': OWASP meetup at the IoT Hacking School of 2018  |([https://hack.foi.hr Info])&lt;br /&gt;
 '''Previous event''': OWASP meetup at the FSec 2017 ([https://www.flickr.com/photos/58943051@N07/sets/72157667605653398 Photos]) |  ([https://fsec.foi.hr Info])&lt;br /&gt;
 '''Previous event''': OWASP meetup at FSec 2016 ([https://www.flickr.com/photos/58943051@N07/sets/72157673516643570 Photos]) | ([https://fsec.foi.hr Info])&lt;br /&gt;
 '''Previous event''': [http://www.foi.unizg.hr/Ljetna-skola-aplikacijske-sigurnost-na-FOI-ju OWASP application security summer school ] from 23th to 26th of September, 2014 @ FOI ([https://www.flickr.com/photos/58943051@N07/sets/72157648047647530/ Photos])&lt;br /&gt;
 '''Previous meetup''': OWASP round table/meetup on 14.9.2015 @ [http://fsec.foi.hr/ FOI/FSEC]&lt;br /&gt;
 '''Previous meetings''': OWASP regular/meeting on 26.2.2016 at 18:00 (FOI Infoclub, Basement) | [https://www.facebook.com/events/1840212762872033/ Link to FB Event]  [http://www.foi.unizg.hr/hr/novosti/razmjena-vjestina-owasp-croatia-meetup Link to Web]&lt;br /&gt;
 '''Previous meeting''': OWASP Croatia meeting 11.5.2016 at 17:00 (FER Zagreb, Hall B2) | [https://www.facebook.com/events/475076512695702/ Link to FB Event] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-May/000013.html Event details] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-April/000012.html Email CFP] | [[Croatia/presentations]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=245189</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=245189"/>
				<updated>2018-11-16T14:11:38Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, organising or holding OWASP meetups, do not hesitate to contact us, Croatia has a very small infosec community and we are very inclusive. If you are interested to be even more active in this area, we are happy to have co-leads. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
Welcome. Since our start, we agreed we will have regular meetings in Varaždin and Zagreb in order to make it more attractive. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organising local chapter. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': FOI, Pavlinska 2, 42000 Varaždin, Hrvatska at the scene of any FSec Underground meet ([https://www.facebook.com/fsec2017/ Page])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Previous event''': OWASP meetup at the IoT Hacking School of 2018  |([https://hack.foi.hr Info])&lt;br /&gt;
 '''Previous event''': OWASP meetup at the FSec 2017 ([https://www.flickr.com/photos/58943051@N07/sets/72157667605653398 Photos]) |  ([https://fsec.foi.hr Info])&lt;br /&gt;
 '''Previous event''': OWASP meetup at FSec 2016 ([https://www.flickr.com/photos/58943051@N07/sets/72157673516643570 Photos]) | ([https://fsec.foi.hr Info])&lt;br /&gt;
 '''Previous event''': [http://www.foi.unizg.hr/Ljetna-skola-aplikacijske-sigurnost-na-FOI-ju OWASP application security summer school ] from 23th to 26th of September, 2014 @ FOI ([https://www.flickr.com/photos/58943051@N07/sets/72157648047647530/ Photos])&lt;br /&gt;
 ''' Previous meetup''': OWASP round table/meetup on 14.9.2015 @ [http://fsec.foi.hr/ FOI/FSEC]&lt;br /&gt;
 '''Previous meetings''': OWASP regular/meeting on 26.2.2016 at 18:00 (FOI Infoclub, Basement) | [https://www.facebook.com/events/1840212762872033/ Link to FB Event]  [http://www.foi.unizg.hr/hr/novosti/razmjena-vjestina-owasp-croatia-meetup Link to Web]&lt;br /&gt;
 '''Previous meeting''': OWASP Croatia meeting 11.5.2016 at 17:00 (FER Zagreb, Hall B2) | [https://www.facebook.com/events/475076512695702/ Link to FB Event] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-May/000013.html Event details] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-April/000012.html Email CFP] | [[Croatia/presentations]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=245188</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=245188"/>
				<updated>2018-11-16T13:52:13Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, organising or holding OWASP meetups, do not hesitate to contact us, Croatia has a very small infosec community and we are very inclusive. If you are interested to be even more active in this area, we are happy to have co-leads. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
Welcome. Since our start, we agreed we will have regular meetings in Varaždin and Zagreb in order to make it more attractive. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organising local chapter. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': FOI, Pavlinska 2, 42000 Varaždin, Hrvatska at the scene of any FSec Underground meet ([https://www.facebook.com/fsec2017/ Page])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Previous event''': OWASP meetup at the IoT Hacking School of 2018  |([https://hack.foi.hr Info])&lt;br /&gt;
 '''Previous event''': OWASP meetup at the FSec 2017 ([https://www.flickr.com/photos/58943051@N07/sets/72157667605653398 Photos]) |  ([https://fsec.foi.hr Info])&lt;br /&gt;
 '''Previous event''': OWASP meetup at FSec 2016 ([https://www.flickr.com/photos/58943051@N07/sets/72157673516643570 Photos]) | ([https://fsec.foi.hr Info])&lt;br /&gt;
 '''Previous event''': [http://www.foi.unizg.hr/Ljetna-skola-aplikacijske-sigurnost-na-FOI-ju OWASP application security summer school ] from 23th to 26th of September, 2014 @ FOI ([https://www.flickr.com/photos/58943051@N07/sets/72157648047647530/ Photos])&lt;br /&gt;
''' Previous meetup''': OWASP round table/meetup on 14.9.2015 @ [http://fsec.foi.hr/ FOI/FSEC]&lt;br /&gt;
 '''Previous meetings''': OWASP regular/meeting on 26.2.2016 at 18:00 (FOI Infoclub, Basement) | [https://www.facebook.com/events/1840212762872033/ Link to FB Event]  [http://www.foi.unizg.hr/hr/novosti/razmjena-vjestina-owasp-croatia-meetup Link to Web]&lt;br /&gt;
 '''Previous meeting''': OWASP Croatia meeting 11.5.2016 at 17:00 (FER Zagreb, Hall B2) | [https://www.facebook.com/events/475076512695702/ Link to FB Event] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-May/000013.html Event details] | [http://lists.owasp.org/pipermail/owasp-croatia/2016-April/000012.html Email CFP] | [[Croatia/presentations]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi] and [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V13_Malicious_Code&amp;diff=244905</id>
		<title>ASVS V13 Malicious Code</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V13_Malicious_Code&amp;diff=244905"/>
				<updated>2018-11-06T00:11:51Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed table, made the content readable&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V13: Malicious Code Verification Requirements ==&lt;br /&gt;
'''Control Objective'''&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* Malicious activity is handled securely and properly as to not affect the rest of the application.&lt;br /&gt;
* Do not have time bombs or other time based attacks built into them&lt;br /&gt;
* Do not “phone home” to malicious or unauthorized destinations&lt;br /&gt;
* Applications do not have back doors, Easter eggs, salami attacks, or logic flaws that can be controlled by an attacker&lt;br /&gt;
&lt;br /&gt;
Malicious code is extremely rare, and is difficult to detect. Manual line by line code review can assist looking for logic bombs, but even the most experienced code reviewer will struggle to find malicious code even if they know it exists. This section is not possible to complete without access to source code, including as many third party libraries as possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 13.1 || Verify all malicious activity is adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 13.2 || Verify that the application source code, and as many third party libraries as possible, does not contain back doors, Easter eggs, and logic flaws in authentication, access control, input validation, and the business logic of high value transactions.  || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V13_Malicious_Code&amp;diff=244904</id>
		<title>ASVS V13 Malicious Code</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V13_Malicious_Code&amp;diff=244904"/>
				<updated>2018-11-06T00:11:22Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;V13: Malicious Code Verification Requirements&lt;br /&gt;
&lt;br /&gt;
Control Objective&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* Malicious activity is handled securely and properly as to not affect the rest of the application.&lt;br /&gt;
* Do not have time bombs or other time based attacks built into them&lt;br /&gt;
* Do not “phone home” to malicious or unauthorized destinations&lt;br /&gt;
* Applications do not have back doors, Easter eggs, salami attacks, or logic flaws that can be controlled by an attacker&lt;br /&gt;
&lt;br /&gt;
Malicious code is extremely rare, and is difficult to detect. Manual line by line code review can assist looking for logic bombs, but even the most experienced code reviewer will struggle to find malicious code even if they know it exists. This section is not possible to complete without access to source code, including as many third party libraries as possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Verification Requirements&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 13.1 || Verify all malicious activity is adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 13.2 || Verify that the application source code, and as many third party libraries as possible, does not contain back doors, Easter eggs, and logic flaws in authentication, access control, input validation, and the business logic of high value transactions.  || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
References&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tonimir_Kisasondi&amp;diff=244903</id>
		<title>User:Tonimir Kisasondi</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tonimir_Kisasondi&amp;diff=244903"/>
				<updated>2018-11-06T00:10:37Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Tonimir Kišasondi, PhD&lt;br /&gt;
&lt;br /&gt;
CEO @ Oru, a boutique information security consultancy from Varaždin, Croatia. &lt;br /&gt;
&lt;br /&gt;
web: www.oru.hr&lt;br /&gt;
&lt;br /&gt;
twitter: @kisasondi&lt;br /&gt;
&lt;br /&gt;
wire: @kisasondi  &lt;br /&gt;
&lt;br /&gt;
pgp: 0x00C68442&lt;br /&gt;
&lt;br /&gt;
pgpid: 77FCA8315CE34BCFB1C01B0CF1D9B3A200C68442&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V13_Malicious_Code&amp;diff=244902</id>
		<title>ASVS V13 Malicious Code</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V13_Malicious_Code&amp;diff=244902"/>
				<updated>2018-11-06T00:08:42Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed table, made the content readable.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V13: Malicious Code Verification Requirements ==&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* Malicious activity is handled securely and properly as to not affect the rest of the application.&lt;br /&gt;
* Do not have time bombs or other time based attacks built into them&lt;br /&gt;
* Do not “phone home” to malicious or unauthorized destinations&lt;br /&gt;
* Applications do not have back doors, Easter eggs, salami attacks, or logic flaws that can be controlled by an attacker&lt;br /&gt;
&lt;br /&gt;
Malicious code is extremely rare, and is difficult to detect. Manual line by line code review can assist looking for logic bombs, but even the most experienced code reviewer will struggle to find malicious code even if they know it exists. This section is not possible to complete without access to source code, including as many third party libraries as possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 13.1 || Verify all malicious activity is adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 13.2 || Verify that the application source code, and as many third party libraries as possible, does not contain back doors, Easter eggs, and logic flaws in authentication, access control, input validation, and the business logic of high value transactions.  || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V13_Malicious_Code&amp;diff=244901</id>
		<title>ASVS V13 Malicious Code</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V13_Malicious_Code&amp;diff=244901"/>
				<updated>2018-11-06T00:08:08Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;V13: Malicious Code Verification Requirements&lt;br /&gt;
&lt;br /&gt;
Control Objective&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* Malicious activity is handled securely and properly as to not affect the rest of the application.&lt;br /&gt;
* Do not have time bombs or other time based attacks built into them&lt;br /&gt;
* Do not “phone home” to malicious or unauthorized destinations&lt;br /&gt;
* Applications do not have back doors, Easter eggs, salami attacks, or logic flaws that can be controlled by an attacker&lt;br /&gt;
&lt;br /&gt;
Malicious code is extremely rare, and is difficult to detect. Manual line by line code review can assist looking for logic bombs, but even the most experienced code reviewer will struggle to find malicious code even if they know it exists. This section is not possible to complete without access to source code, including as many third party libraries as possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Verification Requirements&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 13.1 || Verify all malicious activity is adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 13.2 || Verify that the application source code, and as many third party libraries as possible, does not contain back doors, Easter eggs, and logic flaws in authentication, access control, input validation, and the business logic of high value transactions.  || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V15_Business_Logic_Flaws&amp;diff=244900</id>
		<title>ASVS V15 Business Logic Flaws</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V15_Business_Logic_Flaws&amp;diff=244900"/>
				<updated>2018-11-06T00:07:31Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed table, made the content readable.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V15: Business Logic Verification Requirements ==&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* The business logic flow is sequential and in order&lt;br /&gt;
* Business logic includes limits to detect and prevent automated attacks, such as continuous small funds transfers, or adding a million friends one at a time, and so on.&lt;br /&gt;
* High value business logic flows have considered abuse cases and malicious actors, and have protections against spoofing, tampering, repudiation, information disclosure, and elevation of privilege attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 15.1 || Verify the application will only process business logic flows in sequential step order, with all steps being processed in realistic human time, and not process out of order, skipped steps, process steps from another user, or too quickly submitted transactions. ||  || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 15.2 || Verify the application has business limits and correctly enforces on a per user basis, with configurable alerting and automated reactions to automated or unusual attack. ||  || ✓ || ✓ || 2.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0: Business Logic Testing ](https://www.owasp.org/index.php/Testing_for_business_logic)&lt;br /&gt;
* [OWASP Cheat Sheet](https://www.owasp.org/index.php/Business_Logic_Security_Cheat_Sheet)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V15_Business_Logic_Flaws&amp;diff=244899</id>
		<title>ASVS V15 Business Logic Flaws</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V15_Business_Logic_Flaws&amp;diff=244899"/>
				<updated>2018-11-06T00:07:04Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;V15: Business Logic Verification Requirements&lt;br /&gt;
&lt;br /&gt;
Control Objective&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* The business logic flow is sequential and in order&lt;br /&gt;
* Business logic includes limits to detect and prevent automated attacks, such as continuous small funds transfers, or adding a million friends one at a time, and so on.&lt;br /&gt;
* High value business logic flows have considered abuse cases and malicious actors, and have protections against spoofing, tampering, repudiation, information disclosure, and elevation of privilege attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Verification Requirements&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 15.1 || Verify the application will only process business logic flows in sequential step order, with all steps being processed in realistic human time, and not process out of order, skipped steps, process steps from another user, or too quickly submitted transactions. ||  || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 15.2 || Verify the application has business limits and correctly enforces on a per user basis, with configurable alerting and automated reactions to automated or unusual attack. ||  || ✓ || ✓ || 2.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0: Business Logic Testing ](https://www.owasp.org/index.php/Testing_for_business_logic)&lt;br /&gt;
* [OWASP Cheat Sheet](https://www.owasp.org/index.php/Business_Logic_Security_Cheat_Sheet)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V16_Files_and_Resources&amp;diff=244898</id>
		<title>ASVS V16 Files and Resources</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V16_Files_and_Resources&amp;diff=244898"/>
				<updated>2018-11-06T00:05:21Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed table, made the content readable.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V16: File and Resources Verification Requirements ==&lt;br /&gt;
'''Control Objective'''&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* Untrusted file data should be handled accordingly and in a secure manner&lt;br /&gt;
* Obtained from untrusted sources are stored outside the webroot and limited permissions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 16.1 || Verify that URL redirects and forwards only allow whitelisted destinations, or show a warning when redirecting to potentially untrusted content. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.2 || Verify that untrusted file data submitted to the application is not used directly with file I/O commands, particularly to protect against path traversal, local file include, file mime type, reflective file download, and OS command injection vulnerabilities. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 16.3 || Verify that files obtained from untrusted sources are validated to be of expected type and scanned by antivirus scanners to prevent upload of known malicious content. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.4 || Verify that untrusted data is not used within inclusion, class loader, or reflection capabilities to prevent remote/local code execution vulnerabilities. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 16.5 || Verify that untrusted data is not used within cross-domain resource sharing (CORS) to protect against arbitrary remote content. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.6 || Verify that files obtained from untrusted sources are stored outside the webroot, with limited permissions, preferably with strong validation. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.7 || Verify that the web or application server is configured by default to deny access to remote resources or systems outside the web or application server. ||  || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.8 || Verify the application code does not execute uploaded data obtained from untrusted sources. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.9 || Verify that unsupported, insecure or deprecated client-side technologies are not used, such as NSAPI plugins, Flash, Shockwave, Active-X, Silverlight, NACL, or client-side Java applets. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 16.10 || Verify that the cross-domain resource sharing (CORS) Access-Control-Allow-Origin header does not simply reflect the request's origin header or support the &amp;quot;null&amp;quot; origin. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [File Extension Handling for Sensitive Information](https://www.owasp.org/index.php/Unrestricted_File_Upload)&lt;br /&gt;
* [Reflective file download by Oren Hatif](https://www.trustwave.com/Resources/SpiderLabs-Blog/Reflected-File-Download---A-New-Web-Attack-Vector/)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V16_Files_and_Resources&amp;diff=244897</id>
		<title>ASVS V16 Files and Resources</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V16_Files_and_Resources&amp;diff=244897"/>
				<updated>2018-11-06T00:04:54Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;V16: File and Resources Verification Requirements&lt;br /&gt;
&lt;br /&gt;
Control Objective&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* Untrusted file data should be handled accordingly and in a secure manner&lt;br /&gt;
* Obtained from untrusted sources are stored outside the webroot and limited permissions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Verification Requirements&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 16.1 || Verify that URL redirects and forwards only allow whitelisted destinations, or show a warning when redirecting to potentially untrusted content. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.2 || Verify that untrusted file data submitted to the application is not used directly with file I/O commands, particularly to protect against path traversal, local file include, file mime type, reflective file download, and OS command injection vulnerabilities. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 16.3 || Verify that files obtained from untrusted sources are validated to be of expected type and scanned by antivirus scanners to prevent upload of known malicious content. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.4 || Verify that untrusted data is not used within inclusion, class loader, or reflection capabilities to prevent remote/local code execution vulnerabilities. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 16.5 || Verify that untrusted data is not used within cross-domain resource sharing (CORS) to protect against arbitrary remote content. || ✓ || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.6 || Verify that files obtained from untrusted sources are stored outside the webroot, with limited permissions, preferably with strong validation. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.7 || Verify that the web or application server is configured by default to deny access to remote resources or systems outside the web or application server. ||  || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.8 || Verify the application code does not execute uploaded data obtained from untrusted sources. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 16.9 || Verify that unsupported, insecure or deprecated client-side technologies are not used, such as NSAPI plugins, Flash, Shockwave, Active-X, Silverlight, NACL, or client-side Java applets. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 16.10 || Verify that the cross-domain resource sharing (CORS) Access-Control-Allow-Origin header does not simply reflect the request's origin header or support the &amp;quot;null&amp;quot; origin. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [File Extension Handling for Sensitive Information](https://www.owasp.org/index.php/Unrestricted_File_Upload)&lt;br /&gt;
* [Reflective file download by Oren Hatif](https://www.trustwave.com/Resources/SpiderLabs-Blog/Reflected-File-Download---A-New-Web-Attack-Vector/)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V18_API&amp;diff=244896</id>
		<title>ASVS V18 API</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V18_API&amp;diff=244896"/>
				<updated>2018-11-06T00:03:57Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed table, made the content readable.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V18: API and Web Service Verification Requirements ==&lt;br /&gt;
'''Control Objective'''&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application that uses RESTful or SOAP based web services has:&lt;br /&gt;
&lt;br /&gt;
* Adequate authentication, session management and authorization of all web services&lt;br /&gt;
* Input validation of all parameters that transit from a lower to higher trust level&lt;br /&gt;
* Basic interoperability of SOAP web services layer to promote API use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 18.1 || Verify that the same encoding style is used between the client and the server. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.2 || Verify that access to administration and management functions within the Web Service Application is limited to web service administrators. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.3 || Verify that XML or JSON schema is in place and verified before accepting input. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.4 || Verify that all input is limited to an appropriate size limit. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.5 || Verify that SOAP based web services are compliant with Web Services-Interoperability (WS-I) Basic Profile at minimum. This essentially means TLS encryption.  || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 18.7 || Verify that the REST service is protected from Cross-Site Request Forgery via the use of at least one or more of the following: double submit cookie pattern, CSRF nonces, ORIGIN request header checks, and referrer request header checks. || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 18.8 || Verify the REST service explicitly check the incoming Content-Type to be the expected one, such as application/xml or application/json. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.9 || Verify that the message payload is signed to ensure reliable transport between client and service, using JSON Web Signing or WS-Security for SOAP requests. ||  || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 18.10 || Verify that alternative and less secure access paths do not exist. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0: Configuration and Deployment Management Testing](https://www.owasp.org/index.php/Testing_for_configuration_management)&lt;br /&gt;
* [OWASP Cross-Site Request Forgery cheat sheet](https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet)&lt;br /&gt;
* [JSON Web Tokens (and Signing)](https://jwt.io/)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V18_API&amp;diff=244895</id>
		<title>ASVS V18 API</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V18_API&amp;diff=244895"/>
				<updated>2018-11-06T00:03:32Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;V18: API and Web Service Verification Requirements&lt;br /&gt;
&lt;br /&gt;
Control Objective&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application that uses RESTful or SOAP based web services has:&lt;br /&gt;
&lt;br /&gt;
* Adequate authentication, session management and authorization of all web services&lt;br /&gt;
* Input validation of all parameters that transit from a lower to higher trust level&lt;br /&gt;
* Basic interoperability of SOAP web services layer to promote API use&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Verification Requirements&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 18.1 || Verify that the same encoding style is used between the client and the server. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.2 || Verify that access to administration and management functions within the Web Service Application is limited to web service administrators. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.3 || Verify that XML or JSON schema is in place and verified before accepting input. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.4 || Verify that all input is limited to an appropriate size limit. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.5 || Verify that SOAP based web services are compliant with Web Services-Interoperability (WS-I) Basic Profile at minimum. This essentially means TLS encryption.  || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 18.7 || Verify that the REST service is protected from Cross-Site Request Forgery via the use of at least one or more of the following: double submit cookie pattern, CSRF nonces, ORIGIN request header checks, and referrer request header checks. || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 18.8 || Verify the REST service explicitly check the incoming Content-Type to be the expected one, such as application/xml or application/json. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 18.9 || Verify that the message payload is signed to ensure reliable transport between client and service, using JSON Web Signing or WS-Security for SOAP requests. ||  || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 18.10 || Verify that alternative and less secure access paths do not exist. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0: Configuration and Deployment Management Testing](https://www.owasp.org/index.php/Testing_for_configuration_management)&lt;br /&gt;
* [OWASP Cross-Site Request Forgery cheat sheet](https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet)&lt;br /&gt;
* [JSON Web Tokens (and Signing)](https://jwt.io/)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V19_Configuration&amp;diff=244894</id>
		<title>ASVS V19 Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V19_Configuration&amp;diff=244894"/>
				<updated>2018-11-06T00:02:55Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed table, made the content readable.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V19: Configuration Verification Requirements ==&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application has:&lt;br /&gt;
&lt;br /&gt;
* Up to date libraries and platform(s).&lt;br /&gt;
* A secure by default configuration.&lt;br /&gt;
* Sufficient hardening that user initiated changes to default configuration do not unnecessarily expose or create security weaknesses or flaws to underlying systems.&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 19.1 || Verify that all components are up to date with proper security configuration(s) and version(s). This should include removal of unneeded configurations and folders such as sample applications, platform documentation, and default or example users.  || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.2 || Verify that communications between components, such as between the application server and the database server, are encrypted, particularly when the components are in different containers or on different systems. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.3 || Verify that communications between components, such as between the application server and the database server, is authenticated using an account with the least necessary privileges. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.4 || Verify application deployments are adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 19.5 || Verify that the application build and deployment processes are performed in a secure and repeatable method, such as CI / CD automation and automated configuration management.  ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.6 || Verify that authorised administrators have the capability to verify the integrity of all security-relevant configurations to detect tampering.  ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.7 || Verify that all application components are signed. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 19.8 || Verify that third party components come from trusted repositories. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 19.9 || Verify that build processes for system level languages have all security flags enabled, such as ASLR, DEP, and security checks.  ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 19.10 || Verify that all application assets are hosted by the application, such as JavaScript libraries, CSS stylesheets and web fonts are hosted by the application rather than rely on a CDN or external provider. ||  ||  || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.11 || Verify that all application components, services, and servers each use their own low privilege service account, that is not shared between applications nor used by administrators.  ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0: Configuration and Deployment Management Testing](https://www.owasp.org/index.php/Testing_for_configuration_management)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V19_Configuration&amp;diff=244893</id>
		<title>ASVS V19 Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V19_Configuration&amp;diff=244893"/>
				<updated>2018-11-06T00:02:22Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;V19: Configuration Verification Requirements&lt;br /&gt;
&lt;br /&gt;
Control Objective&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application has:&lt;br /&gt;
&lt;br /&gt;
* Up to date libraries and platform(s).&lt;br /&gt;
* A secure by default configuration.&lt;br /&gt;
* Sufficient hardening that user initiated changes to default configuration do not unnecessarily expose or create security weaknesses or flaws to underlying systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Verification Requirements:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 19.1 || Verify that all components are up to date with proper security configuration(s) and version(s). This should include removal of unneeded configurations and folders such as sample applications, platform documentation, and default or example users.  || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.2 || Verify that communications between components, such as between the application server and the database server, are encrypted, particularly when the components are in different containers or on different systems. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.3 || Verify that communications between components, such as between the application server and the database server, is authenticated using an account with the least necessary privileges. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.4 || Verify application deployments are adequately sandboxed, containerized or isolated to delay and deter attackers from attacking other applications. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 19.5 || Verify that the application build and deployment processes are performed in a secure and repeatable method, such as CI / CD automation and automated configuration management.  ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.6 || Verify that authorised administrators have the capability to verify the integrity of all security-relevant configurations to detect tampering.  ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.7 || Verify that all application components are signed. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 19.8 || Verify that third party components come from trusted repositories. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 19.9 || Verify that build processes for system level languages have all security flags enabled, such as ASLR, DEP, and security checks.  ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 19.10 || Verify that all application assets are hosted by the application, such as JavaScript libraries, CSS stylesheets and web fonts are hosted by the application rather than rely on a CDN or external provider. ||  ||  || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 19.11 || Verify that all application components, services, and servers each use their own low privilege service account, that is not shared between applications nor used by administrators.  ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0: Configuration and Deployment Management Testing](https://www.owasp.org/index.php/Testing_for_configuration_management)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V20_Internet_of_Things&amp;diff=244892</id>
		<title>ASVS V20 Internet of Things</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V20_Internet_of_Things&amp;diff=244892"/>
				<updated>2018-11-06T00:01:20Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== V20: Internet of Things Verification Requirements ===&lt;br /&gt;
This section contains controls that are Embedded/IoT device specific. These controls must be taken in conjunction with all other sections of the relevant ASVS Verification Level.&lt;br /&gt;
&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
Embedded/IoT devices should:&lt;br /&gt;
&lt;br /&gt;
* Have the same level of security controls within the device as found in the server, by enforcing security controls in a trusted environment.&lt;br /&gt;
* Sensitive data stored on the device should be done so in a secure manner.&lt;br /&gt;
* All sensitive data transmitted from the device should utilize transport layer security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that application layer debugging interfaces such USB or serial are disabled. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that cryptographic keys are unique to each individual device. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that memory protection controls such as ASLR and DEP are enabled by the embedded/IoT operating system, if applicable. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that on-chip debugging interfaces such as JTAG or SWD are disabled or that available protection mechanism is enabled and configured appropriately. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that physical debug headers are not present on the device. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that sensitive data is not stored unencrypted on the device. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the device prevents leaking of sensitive information. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps protect data-in-transit using transport security. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps validate the digital signature of server connections. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that wireless communications are mutually authenticated. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that wireless communications are sent over an encrypted channel.  || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps pin the digital signature to a trusted server(s). ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the presence of physical tamper resistance and/or tamper detection features, including epoxy. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that identifying markings on chips have been removed. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that any available Intellectual Property protection technologies provided by the chip manufacturer are enabled. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify security controls are in place to hinder firmware reverse engineering (e.g., removal of verbose debugging strings). ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the device validates the boot image signature before loading. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware update process is not vulnerable to time-of-check vs time-of-use attacks. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the device uses code signing and validates firmware upgrade files before installing. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the device cannot be downgraded to old versions of valid firmware. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify usage of cryptographically secure pseudo-random number generator on embedded device (e.g., using chip-provided random number generators). ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the device wipes firmware and sensitive data upon detection of tampering or receipt of invalid message. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that only microcontrollers that support disabling debugging interfaces (e.g. JTAG, SWD) are used. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that only microcontrollers that provide substantial protection from de-capping and side channel attacks are used. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that sensitive traces are not exposed to outer layers of the printed circuit board. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that inter-chip communication is encrypted. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the device uses code signing and validates code before execution. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that sensitive information maintained in memory is overwritten with zeros as soon as it is no longer required. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps utilize kernel containers for isolation between apps. ||  ||  || ✓ || 3.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Internet of Things Top 10](https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf)&lt;br /&gt;
* [OWASP Internet of Things Project](https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project)&lt;br /&gt;
* [Trudy TCP Proxy Tool](https://github.com/praetorian-inc/trudy)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V20_Internet_of_Things&amp;diff=244891</id>
		<title>ASVS V20 Internet of Things</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V20_Internet_of_Things&amp;diff=244891"/>
				<updated>2018-11-06T00:01:09Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed table, made the text readable.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{taggedDocument&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
=== V20: Internet of Things Verification Requirements ===&lt;br /&gt;
This section contains controls that are Embedded/IoT device specific. These controls must be taken in conjunction with all other sections of the relevant ASVS Verification Level.&lt;br /&gt;
&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
Embedded/IoT devices should:&lt;br /&gt;
&lt;br /&gt;
* Have the same level of security controls within the device as found in the server, by enforcing security controls in a trusted environment.&lt;br /&gt;
* Sensitive data stored on the device should be done so in a secure manner.&lt;br /&gt;
* All sensitive data transmitted from the device should utilize transport layer security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that application layer debugging interfaces such USB or serial are disabled. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that cryptographic keys are unique to each individual device. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that memory protection controls such as ASLR and DEP are enabled by the embedded/IoT operating system, if applicable. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that on-chip debugging interfaces such as JTAG or SWD are disabled or that available protection mechanism is enabled and configured appropriately. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that physical debug headers are not present on the device. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that sensitive data is not stored unencrypted on the device. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the device prevents leaking of sensitive information. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps protect data-in-transit using transport security. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps validate the digital signature of server connections. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that wireless communications are mutually authenticated. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that wireless communications are sent over an encrypted channel.  || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps pin the digital signature to a trusted server(s). ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the presence of physical tamper resistance and/or tamper detection features, including epoxy. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that identifying markings on chips have been removed. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that any available Intellectual Property protection technologies provided by the chip manufacturer are enabled. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify security controls are in place to hinder firmware reverse engineering (e.g., removal of verbose debugging strings). ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the device validates the boot image signature before loading. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware update process is not vulnerable to time-of-check vs time-of-use attacks. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the device uses code signing and validates firmware upgrade files before installing. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the device cannot be downgraded to old versions of valid firmware. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify usage of cryptographically secure pseudo-random number generator on embedded device (e.g., using chip-provided random number generators). ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the device wipes firmware and sensitive data upon detection of tampering or receipt of invalid message. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that only microcontrollers that support disabling debugging interfaces (e.g. JTAG, SWD) are used. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that only microcontrollers that provide substantial protection from de-capping and side channel attacks are used. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that sensitive traces are not exposed to outer layers of the printed circuit board. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that inter-chip communication is encrypted. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the device uses code signing and validates code before execution. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that sensitive information maintained in memory is overwritten with zeros as soon as it is no longer required. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps utilize kernel containers for isolation between apps. ||  ||  || ✓ || 3.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Internet of Things Top 10](https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf)&lt;br /&gt;
* [OWASP Internet of Things Project](https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project)&lt;br /&gt;
* [Trudy TCP Proxy Tool](https://github.com/praetorian-inc/trudy)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V20_Internet_of_Things&amp;diff=244890</id>
		<title>ASVS V20 Internet of Things</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V20_Internet_of_Things&amp;diff=244890"/>
				<updated>2018-11-06T00:00:12Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{taggedDocument&lt;br /&gt;
| type=design&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
V20: Internet of Things Verification Requirements&lt;br /&gt;
This section contains controls that are Embedded/IoT device specific. These controls must be taken in conjunction with all other sections of the relevant ASVS Verification Level.&lt;br /&gt;
&lt;br /&gt;
Control Objective&lt;br /&gt;
&lt;br /&gt;
Embedded/IoT devices should:&lt;br /&gt;
&lt;br /&gt;
* Have the same level of security controls within the device as found in the server, by enforcing security controls in a trusted environment.&lt;br /&gt;
* Sensitive data stored on the device should be done so in a secure manner.&lt;br /&gt;
* All sensitive data transmitted from the device should utilize transport layer security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Verification Requirements&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that application layer debugging interfaces such USB or serial are disabled. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that cryptographic keys are unique to each individual device. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that memory protection controls such as ASLR and DEP are enabled by the embedded/IoT operating system, if applicable. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that on-chip debugging interfaces such as JTAG or SWD are disabled or that available protection mechanism is enabled and configured appropriately. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that physical debug headers are not present on the device. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that sensitive data is not stored unencrypted on the device. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the device prevents leaking of sensitive information. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps protect data-in-transit using transport security. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps validate the digital signature of server connections. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that wireless communications are mutually authenticated. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that wireless communications are sent over an encrypted channel.  || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps pin the digital signature to a trusted server(s). ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the presence of physical tamper resistance and/or tamper detection features, including epoxy. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that identifying markings on chips have been removed. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that any available Intellectual Property protection technologies provided by the chip manufacturer are enabled. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify security controls are in place to hinder firmware reverse engineering (e.g., removal of verbose debugging strings). ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the device validates the boot image signature before loading. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware update process is not vulnerable to time-of-check vs time-of-use attacks. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the device uses code signing and validates firmware upgrade files before installing. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the device cannot be downgraded to old versions of valid firmware. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify usage of cryptographically secure pseudo-random number generator on embedded device (e.g., using chip-provided random number generators). ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the device wipes firmware and sensitive data upon detection of tampering or receipt of invalid message. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that only microcontrollers that support disabling debugging interfaces (e.g. JTAG, SWD) are used. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that only microcontrollers that provide substantial protection from de-capping and side channel attacks are used. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that sensitive traces are not exposed to outer layers of the printed circuit board. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that inter-chip communication is encrypted. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify the device uses code signing and validates code before execution. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that sensitive information maintained in memory is overwritten with zeros as soon as it is no longer required. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 20.1 || Verify that the firmware apps utilize kernel containers for isolation between apps. ||  ||  || ✓ || 3.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Internet of Things Top 10](https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf)&lt;br /&gt;
* [OWASP Internet of Things Project](https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project)&lt;br /&gt;
* [Trudy TCP Proxy Tool](https://github.com/praetorian-inc/trudy)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V10_Communications&amp;diff=244889</id>
		<title>ASVS V10 Communications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V10_Communications&amp;diff=244889"/>
				<updated>2018-11-05T23:58:21Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed table, made the content readable&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V10: Communications Verification Requirements ==&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* That TLS is used where sensitive data is transmitted.&lt;br /&gt;
* That strong algorithms and ciphers are used at all times.&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that a path can be built from a trusted CA to each Transport Layer Security (TLS) server certificate, and that each server certificate is valid. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that TLS is used for all connections (including both external and backend connections) that are authenticated or that involve sensitive data or functions, and does not fall back to insecure or unencrypted protocols. Ensure the strongest alternative is the preferred algorithm. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that backend TLS connection failures are logged. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that certificate paths are built and verified for all client certificates using configured trust anchors and revocation information. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that all connections to external systems that involve sensitive information or functions are authenticated. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that there is a single standard TLS implementation that is used by the application that is configured to operate in an approved mode of operation. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that TLS certificate public key pinning (HPKP) is implemented with production and backup public keys. For more information, please see the references below.  ||  || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that HTTP Strict Transport Security headers are included on all requests and for all subdomains, such as Strict-Transport-Security: max-age=15724800; includeSubdomains || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that production website URL has been submitted to preloaded list of Strict Transport Security domains maintained by web browser vendors. Please see the references below. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that perfect forward secrecy is configured to mitigate passive attackers recording traffic. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that proper certification revocation, such as Online Certificate Status Protocol (OCSP) Stapling, is enabled and configured. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that only strong algorithms, ciphers, and protocols are used, through all the certificate hierarchy, including root and intermediary certificates of your selected certifying authority. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that the TLS settings are in line with current leading practice, particularly as common configurations, ciphers, and algorithms become insecure. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP – TLS Cheat Sheet. ](https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet)&lt;br /&gt;
* [Notes on “Approved modes of TLS”. In the past, the ASVS referred to the US standard FIPS 140-2, but as a global standard, applying US standards this can be difficult, contradictory, or confusing to apply. A better method of achieving compliance with 10.8 would be to review guides such as (https://wiki.mozilla.org/Security/Server_Side_TLS), generate known good configurations (https://mozilla.github.io/server-side-tls/ssl-config-generator/), and use known TLS evaluation tools, such as sslyze, various vulnerability scanners or trusted TLS online assessment services to obtain a desired level of security. In general, we see non-compliance for this section being the use of outdated or insecure ciphers and algorithms, the lack of perfect forward secrecy, outdated or insecure SSL protocols, weak preferred ciphers, and so on.]&lt;br /&gt;
* [Certificate pinning. For more information please review ](https://tools.ietf.org/html/rfc7469.)The rationale behind certificate pinning for production and backup keys is business continuity - see (https://noncombatant.org/2015/05/01/about-http-public-key-pinning/)&lt;br /&gt;
* [OWASP Certificate Pinning Cheat Sheet](https://www.owasp.org/index.php/Pinning_Cheat_Sheet)&lt;br /&gt;
* [OWASP Certificate and Public Key Pinning](https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning)&lt;br /&gt;
* [Time of first use (TOFU) Pinning](https://developer.mozilla.org/en/docs/Web/Security/Public_Key_Pinning)&lt;br /&gt;
* [Pre-loading HTTP Strict Transport Security](https://www.chromium.org/hsts)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V10_Communications&amp;diff=244888</id>
		<title>ASVS V10 Communications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V10_Communications&amp;diff=244888"/>
				<updated>2018-11-05T23:57:51Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;V10: Communications Verification Requirements&lt;br /&gt;
&lt;br /&gt;
Control Objective&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* That TLS is used where sensitive data is transmitted.&lt;br /&gt;
* That strong algorithms and ciphers are used at all times.&lt;br /&gt;
&lt;br /&gt;
Security Verification Requirements:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since |&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that a path can be built from a trusted CA to each Transport Layer Security (TLS) server certificate, and that each server certificate is valid. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that TLS is used for all connections (including both external and backend connections) that are authenticated or that involve sensitive data or functions, and does not fall back to insecure or unencrypted protocols. Ensure the strongest alternative is the preferred algorithm. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that backend TLS connection failures are logged. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that certificate paths are built and verified for all client certificates using configured trust anchors and revocation information. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that all connections to external systems that involve sensitive information or functions are authenticated. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that there is a single standard TLS implementation that is used by the application that is configured to operate in an approved mode of operation. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that TLS certificate public key pinning (HPKP) is implemented with production and backup public keys. For more information, please see the references below.  ||  || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that HTTP Strict Transport Security headers are included on all requests and for all subdomains, such as Strict-Transport-Security: max-age=15724800; includeSubdomains || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that production website URL has been submitted to preloaded list of Strict Transport Security domains maintained by web browser vendors. Please see the references below. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that perfect forward secrecy is configured to mitigate passive attackers recording traffic. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that proper certification revocation, such as Online Certificate Status Protocol (OCSP) Stapling, is enabled and configured. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that only strong algorithms, ciphers, and protocols are used, through all the certificate hierarchy, including root and intermediary certificates of your selected certifying authority. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 10.1 || Verify that the TLS settings are in line with current leading practice, particularly as common configurations, ciphers, and algorithms become insecure. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP – TLS Cheat Sheet. ](https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet)&lt;br /&gt;
* [Notes on “Approved modes of TLS”. In the past, the ASVS referred to the US standard FIPS 140-2, but as a global standard, applying US standards this can be difficult, contradictory, or confusing to apply. A better method of achieving compliance with 10.8 would be to review guides such as (https://wiki.mozilla.org/Security/Server_Side_TLS), generate known good configurations (https://mozilla.github.io/server-side-tls/ssl-config-generator/), and use known TLS evaluation tools, such as sslyze, various vulnerability scanners or trusted TLS online assessment services to obtain a desired level of security. In general, we see non-compliance for this section being the use of outdated or insecure ciphers and algorithms, the lack of perfect forward secrecy, outdated or insecure SSL protocols, weak preferred ciphers, and so on.]&lt;br /&gt;
* [Certificate pinning. For more information please review ](https://tools.ietf.org/html/rfc7469.)The rationale behind certificate pinning for production and backup keys is business continuity - see (https://noncombatant.org/2015/05/01/about-http-public-key-pinning/)&lt;br /&gt;
* [OWASP Certificate Pinning Cheat Sheet](https://www.owasp.org/index.php/Pinning_Cheat_Sheet)&lt;br /&gt;
* [OWASP Certificate and Public Key Pinning](https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning)&lt;br /&gt;
* [Time of first use (TOFU) Pinning](https://developer.mozilla.org/en/docs/Web/Security/Public_Key_Pinning)&lt;br /&gt;
* [Pre-loading HTTP Strict Transport Security](https://www.chromium.org/hsts)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V9_Data_Protection&amp;diff=244884</id>
		<title>ASVS V9 Data Protection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V9_Data_Protection&amp;diff=244884"/>
				<updated>2018-11-05T23:33:38Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed the page, made it readable.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V9: Data Protection Verification Requirements ==&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
There are three key elements to sound data protection: Confidentiality, Integrity and Availability (CIA). This standard assumes that data protection is enforced on a trusted system, such as a server, which has been hardened and has sufficient protections.&lt;br /&gt;
&lt;br /&gt;
Applications have to assume that all user devices are compromised in some way. Where an application transmits or stores sensitive information on insecure devices, such as shared computers, phones and tablets, the application is responsible for ensuring data stored on these devices is encrypted and cannot be easily illicitly obtained, altered or disclosed.&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level data protection requirements:&lt;br /&gt;
&lt;br /&gt;
*	Confidentiality: Data should be protected from unauthorised observation or disclosure both in transit and when stored.&lt;br /&gt;
*	Integrity: Data should be protected being maliciously created, altered or deleted by unauthorized attackers.&lt;br /&gt;
*	Availability: Data should be available to authorized users as required&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 || Verify that all forms containing sensitive information have disabled client side caching, including autocomplete features. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.2 || Verify that the list of sensitive data processed by the application is identified, and that there is an explicit policy for how access to this data must be controlled, encrypted and enforced under relevant data protection directives. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 || Verify that all sensitive data is sent to the server in the HTTP message body or headers (i.e., URL parameters are never used to send sensitive data). || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.4 || Verify that the application sets sufficient anti-caching headers such that any sensitive and personal information displayed by the application or entered by the user should not be cached on disk by mainstream modern browsers (e.g. visit about:cache to review disk cache). || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.5 || Verify that on the server, all cached or temporary copies of sensitive data stored are protected from unauthorized access or purged/invalidated after the authorized user accesses the sensitive data. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.6 || Verify that there is a method to remove each type of sensitive data from the application at the end of the required retention policy. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.7 || Verify the application minimizes the number of parameters in a request, such as hidden fields, Ajax variables, cookies and header values. ||  || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.8 || Verify the application has the ability to detect and alert on abnormal numbers of requests for data harvesting for an example screen scraping. ||  ||  || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.9 || Verify that data stored in client side storage (such as HTML5 local storage, session storage, IndexedDB, regular cookies or Flash cookies) does not contain sensitive data or PII. || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.10 || Verify accessing sensitive data is logged, if the data is collected under relevant data protection directives or where logging of accesses is required. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.11 || Verify that sensitive information maintained in memory is overwritten with zeros as soon as it is no longer required, to mitigate memory dumping attacks. ||  || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.12 || Placeholder for GDPR || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.13 || Placeholder for GDPR || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.14 || Verify that authenticated data is cleared from client storage, such as the browser DOM, after the client or session is terminated. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [Consider using Security Headers website to check security and anti-caching headers](https://securityheaders.io)&lt;br /&gt;
* [OWASP Secure Headers project](https://www.owasp.org/index.php/OWASP_Secure_Headers_Project)&lt;br /&gt;
* [User Privacy Protection Cheat Sheet](https://www.owasp.org/index.php/User_Privacy_Protection_Cheat_Sheet)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V9_Data_Protection&amp;diff=244883</id>
		<title>ASVS V9 Data Protection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V9_Data_Protection&amp;diff=244883"/>
				<updated>2018-11-05T23:33:02Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;V9: Data Protection Verification Requirements&lt;br /&gt;
&lt;br /&gt;
Control Objective&lt;br /&gt;
&lt;br /&gt;
There are three key elements to sound data protection: Confidentiality, Integrity and Availability (CIA). This standard assumes that data protection is enforced on a trusted system, such as a server, which has been hardened and has sufficient protections.&lt;br /&gt;
&lt;br /&gt;
Applications have to assume that all user devices are compromised in some way. Where an application transmits or stores sensitive information on insecure devices, such as shared computers, phones and tablets, the application is responsible for ensuring data stored on these devices is encrypted and cannot be easily illicitly obtained, altered or disclosed.&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level data protection requirements:&lt;br /&gt;
&lt;br /&gt;
*	Confidentiality: Data should be protected from unauthorised observation or disclosure both in transit and when stored.&lt;br /&gt;
*	Integrity: Data should be protected being maliciously created, altered or deleted by unauthorized attackers.&lt;br /&gt;
*	Availability: Data should be available to authorized users as required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## Security Verification Requirements&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 || Verify that all forms containing sensitive information have disabled client side caching, including autocomplete features. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.2 || Verify that the list of sensitive data processed by the application is identified, and that there is an explicit policy for how access to this data must be controlled, encrypted and enforced under relevant data protection directives. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 || Verify that all sensitive data is sent to the server in the HTTP message body or headers (i.e., URL parameters are never used to send sensitive data). || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.4 || Verify that the application sets sufficient anti-caching headers such that any sensitive and personal information displayed by the application or entered by the user should not be cached on disk by mainstream modern browsers (e.g. visit about:cache to review disk cache). || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.5 || Verify that on the server, all cached or temporary copies of sensitive data stored are protected from unauthorized access or purged/invalidated after the authorized user accesses the sensitive data. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.6 || Verify that there is a method to remove each type of sensitive data from the application at the end of the required retention policy. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.7 || Verify the application minimizes the number of parameters in a request, such as hidden fields, Ajax variables, cookies and header values. ||  || ✓ || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.8 || Verify the application has the ability to detect and alert on abnormal numbers of requests for data harvesting for an example screen scraping. ||  ||  || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.9 || Verify that data stored in client side storage (such as HTML5 local storage, session storage, IndexedDB, regular cookies or Flash cookies) does not contain sensitive data or PII. || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.10 || Verify accessing sensitive data is logged, if the data is collected under relevant data protection directives or where logging of accesses is required. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 9.11 || Verify that sensitive information maintained in memory is overwritten with zeros as soon as it is no longer required, to mitigate memory dumping attacks. ||  || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.12 || Placeholder for GDPR || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.13 || Placeholder for GDPR || ✓ || ✓ || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 9.14 || Verify that authenticated data is cleared from client storage, such as the browser DOM, after the client or session is terminated. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [Consider using Security Headers website to check security and anti-caching headers](https://securityheaders.io)&lt;br /&gt;
* [OWASP Secure Headers project](https://www.owasp.org/index.php/OWASP_Secure_Headers_Project)&lt;br /&gt;
* [User Privacy Protection Cheat Sheet](https://www.owasp.org/index.php/User_Privacy_Protection_Cheat_Sheet)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V8_Error_Handling&amp;diff=244882</id>
		<title>ASVS V8 Error Handling</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V8_Error_Handling&amp;diff=244882"/>
				<updated>2018-11-05T23:29:37Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed the page, fixed the table, everything is readable.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V8: Error Handling and Logging Verification Requirements ==&lt;br /&gt;
&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
The primary objective of error handling and logging is to provide a useful reaction by the user, administrators, and incident response teams. The objective is not to create massive amounts of logs, but high quality logs, with more signal than discarded noise.&lt;br /&gt;
&lt;br /&gt;
High quality logs will often contain sensitive data, and must be protected as per local data privacy laws or directives. This should include:&lt;br /&gt;
&lt;br /&gt;
* Not collecting or logging sensitive information if not specifically required.&lt;br /&gt;
* Ensuring all logged information is handled securely and protected as per its data classification.&lt;br /&gt;
* Ensuring that logs are not forever, but have an absolute lifetime that is as short as possible.&lt;br /&gt;
&lt;br /&gt;
If logs contain private or sensitive data, the definition of which varies from country to country, the logs become some of the most sensitive information held by the application and thus very attractive to attackers in their own right.&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that the application does not output error messages or stack traces containing sensitive data that could assist an attacker, including session id, software/framework versions and personal information. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that error handling logic in security controls denies access by default. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify security logging controls provide the ability to log success and particularly failure events that are identified as security-relevant. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that each log event includes necessary information that would allow for a detailed investigation of the timeline when an event happens. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that all events that include untrusted data will not execute as code in the intended log viewing software. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that security logs are protected from unauthorized access and modification. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that the application does not log sensitive data as defined under local privacy laws or regulations, organizational sensitive data as defined by a risk assessment, or sensitive authentication data that could assist an attacker, including user’s session identifiers, passwords, hashes, or API tokens. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that all non-printable symbols and field separators are properly encoded in log entries, to prevent log injection. ||  ||  || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that log fields from trusted and untrusted sources are distinguishable in log entries. ||  ||  || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that an audit log or similar allows for non-repudiation of key transactions. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that logs are stored on a different partition than the application is running with proper log rotation. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that time sources are synchronized to the correct time and time zone. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0 content: Testing for Error Handling](https://www.owasp.org/index.php/Testing_for_Error_Handling)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V8_Error_Handling&amp;diff=244881</id>
		<title>ASVS V8 Error Handling</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V8_Error_Handling&amp;diff=244881"/>
				<updated>2018-11-05T23:28:40Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed the table.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;# V8: Error Handling and Logging Verification Requirements&lt;br /&gt;
&lt;br /&gt;
## Control Objective&lt;br /&gt;
&lt;br /&gt;
The primary objective of error handling and logging is to provide a useful reaction by the user, administrators, and incident response teams. The objective is not to create massive amounts of logs, but high quality logs, with more signal than discarded noise.&lt;br /&gt;
&lt;br /&gt;
High quality logs will often contain sensitive data, and must be protected as per local data privacy laws or directives. This should include:&lt;br /&gt;
&lt;br /&gt;
* Not collecting or logging sensitive information if not specifically required.&lt;br /&gt;
* Ensuring all logged information is handled securely and protected as per its data classification.&lt;br /&gt;
* Ensuring that logs are not forever, but have an absolute lifetime that is as short as possible.&lt;br /&gt;
&lt;br /&gt;
If logs contain private or sensitive data, the definition of which varies from country to country, the logs become some of the most sensitive information held by the application and thus very attractive to attackers in their own right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## Security Verification Requirements&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that the application does not output error messages or stack traces containing sensitive data that could assist an attacker, including session id, software/framework versions and personal information. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that error handling logic in security controls denies access by default. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify security logging controls provide the ability to log success and particularly failure events that are identified as security-relevant. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that each log event includes necessary information that would allow for a detailed investigation of the timeline when an event happens. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that all events that include untrusted data will not execute as code in the intended log viewing software. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that security logs are protected from unauthorized access and modification. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that the application does not log sensitive data as defined under local privacy laws or regulations, organizational sensitive data as defined by a risk assessment, or sensitive authentication data that could assist an attacker, including user’s session identifiers, passwords, hashes, or API tokens. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that all non-printable symbols and field separators are properly encoded in log entries, to prevent log injection. ||  ||  || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that log fields from trusted and untrusted sources are distinguishable in log entries. ||  ||  || ✓ || 2.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that an audit log or similar allows for non-repudiation of key transactions. || ✓ || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that security logs have some form of integrity checking or controls to prevent unauthorized modification. ||  ||  || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that logs are stored on a different partition than the application is running with proper log rotation. ||  ||  || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 || Verify that time sources are synchronized to the correct time and time zone. || ✓ || ✓ || ✓ || 3.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## References&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0 content: Testing for Error Handling](https://www.owasp.org/index.php/Testing_for_Error_Handling)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V7_Cryptography&amp;diff=244880</id>
		<title>ASVS V7 Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V7_Cryptography&amp;diff=244880"/>
				<updated>2018-11-05T23:26:05Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed broken numbering.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V7: Cryptography Verification Requirements ==&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* That all cryptographic modules fail in a secure manner and that errors are handled correctly.&lt;br /&gt;
* That a suitable random number generator is used when randomness is required.&lt;br /&gt;
* That access to keys is managed in a secure way.&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since&lt;br /&gt;
|-&lt;br /&gt;
| 7.2 || Verify that all cryptographic modules fail securely, and errors are handled in a way that does not enable Padding Oracle. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.6 || Verify that all random numbers, random file names, random GUIDs, and random strings are generated using the cryptographic module’s approved random number generator when these random values are intended to be not guessable by an attacker. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.7 || Verify that cryptographic algorithms used by the application have been validated against FIPS 140-2 or an equivalent standard. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.8 || Verify that cryptographic modules operate in their approved mode according to their published security policies. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.9 || Verify that there is an explicit policy for how cryptographic keys are managed (e.g., generated, distributed, revoked, and expired). Verify that this key lifecycle is properly enforced. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.11 || Verify that all consumers of cryptographic services do not have direct access to key material. Isolate cryptographic processes, including master secrets and consider the use of a virtualized or physical hardware key vault (HSM).  ||  ||  || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 7.12 || Verify that Personally Identifiable Information (PII) and other sensitive data is stored encrypted while at rest. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 7.13 || Verify that sensitive passwords or key material maintained in memory is overwritten with zeros as soon as it is no longer required, to mitigate memory dumping attacks. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 7.14 || Verify that all keys and passwords are replaceable, and are generated or replaced at installation time. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.15 || Verify that random numbers are created with proper entropy even when the application is under heavy load, or that the application degrades gracefully in such circumstances. ||  ||  || ✓ ||3.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0: Testing for weak Cryptography](https://www.owasp.org/index.php/Testing_for_weak_Cryptography)&lt;br /&gt;
* [OWASP Cheat Sheet: Cryptographic Storage](https://www.owasp.org/index.php/Cryptographic_Storage_Cheat_Sheet)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V7_Cryptography&amp;diff=244879</id>
		<title>ASVS V7 Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V7_Cryptography&amp;diff=244879"/>
				<updated>2018-11-05T23:25:36Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Fixed the broken table, tidyed up the content for it to be presentable.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== V7: Cryptography Verification Requirements ==&lt;br /&gt;
'''Control Objective:'''&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* That all cryptographic modules fail in a secure manner and that errors are handled correctly.&lt;br /&gt;
* That a suitable random number generator is used when randomness is required.&lt;br /&gt;
* That access to keys is managed in a secure way.&lt;br /&gt;
&lt;br /&gt;
'''Security Verification Requirements:'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since&lt;br /&gt;
|-&lt;br /&gt;
| 7.2 || Verify that all cryptographic modules fail securely, and errors are handled in a way that does not enable Padding Oracle. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.6 || Verify that all random numbers, random file names, random GUIDs, and random strings are generated using the cryptographic module’s approved random number generator when these random values are intended to be not guessable by an attacker. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.7 || Verify that cryptographic algorithms used by the application have been validated against FIPS 140-2 or an equivalent standard. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.8 || Verify that cryptographic modules operate in their approved mode according to their published security policies. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.9 || Verify that there is an explicit policy for how cryptographic keys are managed (e.g., generated, distributed, revoked, and expired). Verify that this key lifecycle is properly enforced. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.11 || Verify that all consumers of cryptographic services do not have direct access to key material. Isolate cryptographic processes, including master secrets and consider the use of a virtualized or physical hardware key vault (HSM).  ||  ||  || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 7.12 || Verify that Personally Identifiable Information (PII) and other sensitive data is stored encrypted while at rest. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 7.13 || Verify that sensitive passwords or key material maintained in memory is overwritten with zeros as soon as it is no longer required, to mitigate memory dumping attacks. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 7.14 || Verify that all keys and passwords are replaceable, and are generated or replaced at installation time. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.15 || Verify that random numbers are created with proper entropy even when the application is under heavy load, or that the application degrades gracefully in such circumstances. ||  ||  || ✓ ||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''References:'''&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0: Testing for weak Cryptography](https://www.owasp.org/index.php/Testing_for_weak_Cryptography)&lt;br /&gt;
* [OWASP Cheat Sheet: Cryptographic Storage](https://www.owasp.org/index.php/Cryptographic_Storage_Cheat_Sheet)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ASVS_V7_Cryptography&amp;diff=244878</id>
		<title>ASVS V7 Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ASVS_V7_Cryptography&amp;diff=244878"/>
				<updated>2018-11-05T23:23:36Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;# V7: Cryptography Verification Requirements&lt;br /&gt;
&lt;br /&gt;
## Control Objective&lt;br /&gt;
&lt;br /&gt;
Ensure that a verified application satisfies the following high level requirements:&lt;br /&gt;
&lt;br /&gt;
* That all cryptographic modules fail in a secure manner and that errors are handled correctly.&lt;br /&gt;
* That a suitable random number generator is used when randomness is required.&lt;br /&gt;
* That access to keys is managed in a secure way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## Security Verification Requirements&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! # !! Description !! L1 !! L2 !! L3 !! Since&lt;br /&gt;
|-&lt;br /&gt;
| 7.2 || Verify that all cryptographic modules fail securely, and errors are handled in a way that does not enable Padding Oracle. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.6 || Verify that all random numbers, random file names, random GUIDs, and random strings are generated using the cryptographic module’s approved random number generator when these random values are intended to be not guessable by an attacker. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.7 || Verify that cryptographic algorithms used by the application have been validated against FIPS 140-2 or an equivalent standard. || ✓ || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.8 || Verify that cryptographic modules operate in their approved mode according to their published security policies. ||  ||  || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.9 || Verify that there is an explicit policy for how cryptographic keys are managed (e.g., generated, distributed, revoked, and expired). Verify that this key lifecycle is properly enforced. ||  || ✓ || ✓ || 1.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.11 || Verify that all consumers of cryptographic services do not have direct access to key material. Isolate cryptographic processes, including master secrets and consider the use of a virtualized or physical hardware key vault (HSM).  ||  ||  || ✓ || 3.0.1&lt;br /&gt;
|-&lt;br /&gt;
| 7.12 || Verify that Personally Identifiable Information (PII) and other sensitive data is stored encrypted while at rest. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 7.13 || Verify that sensitive passwords or key material maintained in memory is overwritten with zeros as soon as it is no longer required, to mitigate memory dumping attacks. ||  || ✓ || ✓ || 3.1&lt;br /&gt;
|-&lt;br /&gt;
| 7.14 || Verify that all keys and passwords are replaceable, and are generated or replaced at installation time. ||  || ✓ || ✓ || 3.0&lt;br /&gt;
|-&lt;br /&gt;
| 7.15 || Verify that random numbers are created with proper entropy even when the application is under heavy load, or that the application degrades gracefully in such circumstances. ||  ||  || ✓ || 3.0&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
## References&lt;br /&gt;
&lt;br /&gt;
For more information, see also:&lt;br /&gt;
&lt;br /&gt;
* [OWASP Testing Guide 4.0: Testing for weak Cryptography](https://www.owasp.org/index.php/Testing_for_weak_Cryptography)&lt;br /&gt;
* [OWASP Cheat Sheet: Cryptographic Storage](https://www.owasp.org/index.php/Cryptographic_Storage_Cheat_Sheet)&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Smart_Contract_Top_10&amp;diff=237875</id>
		<title>Smart Contract Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Smart_Contract_Top_10&amp;diff=237875"/>
				<updated>2018-02-18T22:16:47Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Smart Contract Top 10 ==&lt;br /&gt;
&lt;br /&gt;
Work in progress / Placeholder page for the Smart Contract Top 10 vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Insufficient bounding'''&lt;br /&gt;
[ERC20SA]&lt;br /&gt;
[Fallback]&lt;br /&gt;
[Reentrancy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Bad cryptographic practices:'''&lt;br /&gt;
[Random]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Random] https://blog.positive.com/predicting-random-numbers-in-ethereum-smart-contracts-e5358c6b8620&lt;br /&gt;
&lt;br /&gt;
[Fallback] https://solidity.readthedocs.io/en/latest/contracts.html#fallback-function&lt;br /&gt;
&lt;br /&gt;
[Reentrancy] https://solidity.readthedocs.io/en/develop/security-considerations.html&lt;br /&gt;
&lt;br /&gt;
[ERC20SA] http://vessenes.com/the-erc20-short-address-attack-explained/&lt;br /&gt;
&lt;br /&gt;
[UncheckedSend] http://hackingdistributed.com/2016/06/16/scanning-live-ethereum-contracts-for-bugs/&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Smart_Contract_Top_10&amp;diff=237874</id>
		<title>Smart Contract Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Smart_Contract_Top_10&amp;diff=237874"/>
				<updated>2018-02-18T22:00:48Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Created page with &amp;quot;== OWASP Smart Contract Top 10 ==  Work in progress / Placeholder page for the Smart Contract Top 10 vulnerabilities.    '''Insufficient bounding''' [ERC20SA] [Fallback] [Reen...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Smart Contract Top 10 ==&lt;br /&gt;
&lt;br /&gt;
Work in progress / Placeholder page for the Smart Contract Top 10 vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Insufficient bounding'''&lt;br /&gt;
[ERC20SA]&lt;br /&gt;
[Fallback]&lt;br /&gt;
[Reentrancy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Bad cryptographic practices:'''&lt;br /&gt;
[Random]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Random] https://blog.positive.com/predicting-random-numbers-in-ethereum-smart-contracts-e5358c6b8620&lt;br /&gt;
&lt;br /&gt;
[Fallback] https://solidity.readthedocs.io/en/latest/contracts.html#fallback-function&lt;br /&gt;
&lt;br /&gt;
[Reentrancy] https://solidity.readthedocs.io/en/develop/security-considerations.html&lt;br /&gt;
&lt;br /&gt;
[ERC20SA] http://vessenes.com/the-erc20-short-address-attack-explained/&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=227652</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=227652"/>
				<updated>2017-03-20T10:20:09Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Improvements in vulnerabilities and attack surface areas&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226190</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226190"/>
				<updated>2017-02-09T15:39:54Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226189</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=226189"/>
				<updated>2017-02-09T15:13:50Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=225342</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=225342"/>
				<updated>2017-01-18T20:57:17Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilties&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
== ==&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
== ==&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
== ==&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
== ==&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/category/podcast/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=208960</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=208960"/>
				<updated>2016-02-15T17:14:28Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leaders are [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] and [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Croatia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Welcome. We're just starting organizing things here. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organizing local chapter. Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': FOI, Pavlinska 2, 42000 Varaždin, Hrvatska&lt;br /&gt;
&lt;br /&gt;
 '''Previous event''': [http://www.foi.unizg.hr/Ljetna-skola-aplikacijske-sigurnost-na-FOI-ju OWASP application security summer school ] from 23th to 26th of September, 2014 @ FOI ([https://www.flickr.com/photos/58943051@N07/sets/72157648047647530/ Photos])&lt;br /&gt;
&lt;br /&gt;
 '''Previous meeting''': OWASP round table/meetup on 14.9.2015 @ [http://fsec.foi.hr/ FOI/FSEC]&lt;br /&gt;
&lt;br /&gt;
 '''Next meeting''': OWASP regular/meeting on 26.2.2016 at 18:00 (FOI Infoclub, Basement) | [https://www.facebook.com/events/1840212762872033/ Link to FB Event]  [http://www.foi.unizg.hr/hr/novosti/razmjena-vjestina-owasp-croatia-meetup Link to Web]&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] and [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=207729</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=207729"/>
				<updated>2016-01-30T16:29:03Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leaders are [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] and [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Croatia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Welcome. We're just starting organizing things here. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organizing local chapter. Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': FOI, Pavlinska 2, 42000 Varaždin, Hrvatska&lt;br /&gt;
&lt;br /&gt;
 '''Previous event''': [http://www.foi.unizg.hr/Ljetna-skola-aplikacijske-sigurnost-na-FOI-ju OWASP application security summer school ] from 23th to 26th of September, 2014 @ FOI ([https://www.flickr.com/photos/58943051@N07/sets/72157648047647530/ Photos])&lt;br /&gt;
&lt;br /&gt;
 '''Previous meeting''': OWASP round table/meetup on 14.9.2015 @ [http://fsec.foi.hr/ FOI/FSEC]&lt;br /&gt;
&lt;br /&gt;
 '''Next meeting''': OWASP regular/meeting on 26.2.2016 at 18:00 (FOI Infoclub, Basement) | [https://www.facebook.com/events/1840212762872033/ Link to FB Event]&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] and [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Contract_Annex/hr&amp;diff=184556</id>
		<title>OWASP Secure Software Contract Annex/hr</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Contract_Annex/hr&amp;diff=184556"/>
				<updated>2014-11-02T16:53:16Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Prijevod: [https://www.owasp.org/index.php/User:Tonimir_Kisasondi Tonimir Kišasondi], Laboratorij za otvorene sustave i sigurnost, Fakultet organizacije i informatike, Varaždin&lt;br /&gt;
&lt;br /&gt;
===Temeljne pretpostavke:===&lt;br /&gt;
&lt;br /&gt;
1.	Odluke o potrebnoj razini sigurnosti temelje se na razumijevanju rizika koji su vezani uz sustav koji se razvija.&lt;br /&gt;
&lt;br /&gt;
2.	Pristup osiguravanju sigurnosti mora se temeljiti na pristupu analize i implementacije potrebne razine sigurnosti kroz cijeli životni ciklus proizvoda ili sustava.&lt;br /&gt;
&lt;br /&gt;
3.	Kontrole tj. mjere zaštite nisu poseban, dodatni dio sustava već integrirani dio u svim elementima sustava. Kontrole ne smiju biti poseban ili dodatan dio razvoja sustava.&lt;br /&gt;
&lt;br /&gt;
4.	Dokumentacija sustava mora sadržavati opise svih primijenjenih kontrola u sustavu.&lt;br /&gt;
&lt;br /&gt;
5.	Dokumentacija mora biti jasna, korisna i transparentna te mora opisivati dizajn integriranog, cjelovitog sustava sigurnosti, procjenu rizika koja je provedena u sklopu razvoja i moguće probleme. &lt;br /&gt;
&lt;br /&gt;
6.	Ranjivosti u sustavu nisu neočekivane ali u procesu razvoja i u ranim fazama životnog ciklusa sustava treba pokušati identificirati sigurnosne manjkavosti. &lt;br /&gt;
&lt;br /&gt;
7.	Informacije o sigurnosti, rizicima i ranjivostima potrebno je otvoreno razmjenjivati između strane koja razvija sustav i koja je korisnik sustava, čim se navedene informacije otkrije jedna strana, mora obavijestiti drugu stranu u cijelosti i bez ustručavanja.&lt;br /&gt;
&lt;br /&gt;
===Aktivnosti životnog ciklusa:===&lt;br /&gt;
&lt;br /&gt;
1.	Rizici moraju biti identificirani u odnosu na imovinu ili elemente sustava, dokumentirani i obje strane moraju razumjeti rizike koji su u kontekstu sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Razvoj detaljnih sigurnosnih zahtjeva za sustav mora se temeljiti na identificiranim rizicima, gdje su sigurnosni zahtjevi dio specifikacije sustava koji se razvija. Sigurnosne zahtjeve moguće je realizirati dodatnim prilagođenim razvojem ili dodatnim sigurnosnim elementima u sustavu. &lt;br /&gt;
&lt;br /&gt;
3.	Svaki sigurnosni zahtjev mora biti razmotren i odluka mora biti donesena o načinu obrade rizika. Izvođač i naručitelj sustava moraju biti suglasni oko svih opisanih sigurnosnih zahtjeva i kontrola. Odluke moraju dokumentirane, te dokumentacija mora sadržavati informaciju zašto je konkretna kontrola prikladna i na koji način odgovara u cjelokupnom sustavu uz sva njegova ograničenja. Bitno je navesti da li se kontrola temelji na ugrađenom elementu koji je dio sustava ili je kontrola element koji razvija treća strana. Svaki sigurnosni zahtjev mora biti formiran na način da je moguće provjeriti da li je ispunjen. &lt;br /&gt;
&lt;br /&gt;
4.	Razvoj sustava mora se temeljiti na elementima koji su sigurni i odgovaraju zahtjevima sigurnosti.&lt;br /&gt;
 &lt;br /&gt;
5.	Svi elementi sustava moraju proći provjeru od druge strane koja nije razvijala konkretni element sustava. Cijeli sustav mora odgovarati dogovorenoj normi verifikacije mjera sigurnosti kao što je OWASP ASVS ili nekoj drugoj. Rezultati verifikacije moraju biti dokumentirani prema zahtjevima norme za verifikaciju.&lt;br /&gt;
&lt;br /&gt;
6.	Sustav mora sadržavati opis postavki i njihove implikacije za sigurnost sustava. Opis mora sadržavati i opis zavisnosti kao što je potrebna inačica operacijskog sustava, web poslužitelja, sustava za upravljanje bazom podataka i način na koji isti moraju biti podešeni da odgovaraju zahtjevima sigurnosti cijelog sustava. Početna konfiguracija sustava u trenutku isporuke mora biti sigurna. &lt;br /&gt;
&lt;br /&gt;
===Zahtjevi sigurnosti:===&lt;br /&gt;
&lt;br /&gt;
Prilikom procjene rizika i definiranja sigurnosnih zahtjeva potrebno je uzeti u obzir sljedeće zahtjeve sigurnosti koji moraju uključivati:&lt;br /&gt;
&lt;br /&gt;
1.	Pravila za provjeru unosa i kodiranje svakog ulaza u aplikaciju, bez obzira da li je unos od korisnika, baze podataka ili vanjskih sustava. Početna pretpostavka je da su svi unosi nevaljani osim ako ne odgovaraju specifikaciji točnog unosa. Zahtjevi moraju sadržavati postupak što uraditi sa unosom koji nije valjan. Sustavi ne bi smjeli biti podložni napadima umetanja znakova, prelijevanja spremnika, neovlaštenom promjenom i ostale napade koji mijenjaju stanje sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Mjere kako će se štiti sesija korisnika te podatci kojima se identificira sesija i prijavljeni korisnik. Zahtjevi moraju uključivati mjere za sve povezane funkcije kao što su: vraćanje zaboravljene lozinke, promjene lozinke, odjave, višestruke prijave i druge. &lt;br /&gt;
&lt;br /&gt;
3.	Detaljan opis načina realizacije kontrole pristupa te uloge, grupe, privilegije i autorizacije koje se koriste u aplikaciji vezane uz imovinu i funkcije koje su unutar sustava, gdje se povezuju specifična prava pristupa za svaku imovinu ili funkciju po svakoj ulozi. Predlaže se uporaba matrice kontrole pristupa za opis uloga i razine prava pristupa. &lt;br /&gt;
&lt;br /&gt;
4.	Način ponašanja sustava prilikom greške u radu. U nekim slučajevima najbolje je pružiti korisniku najbolji pokušaj u slučaju greške a nekada je najbolje prekinuti izvršavanje odmah. Navedene situacije i način baratanja greškama mora biti definiran prije izgradnje sustava. &lt;br /&gt;
&lt;br /&gt;
5.	Način bilježenja događaja u sustavu kao što su uspješne i neuspješne prijave, uočeni napadi ili pokušaji zaobilaženja autorizacije. Zahtjevi moraju sadržavati i podatke koji se moraju bilježiti kao što je vrijeme, datum, detalji aplikacije i sve ostale podatke koji omogućavaju forenzičku analizu. &lt;br /&gt;
&lt;br /&gt;
6.	Oblik autentikacije i zaštite komunikacije kao što je kriptiranje komunikacije i veze sa drugim elementima sustava kao što su baze podataka ili drugi web servisi. Vjerodajnice za uspostavu komunikacije moraju biti također zaštićene na primjeren način. &lt;br /&gt;
&lt;br /&gt;
7.	Odluku koje podatke treba kriptirati, na koji način kriptirati te kako će se postupati sa certifikatima i vjerodajnicama. Sustav mora koristiti standardne preporučene algoritme i biblioteke koje su sigurnosno provjerene. &lt;br /&gt;
&lt;br /&gt;
8.	Način zaštite sustava od napada uskraćenjem usluge (DoS ili DDoS), u obzir treba uzeti razne vrste napada kao što je zaključavanje autentikacije nakon većeg broja neuspješnih pokušaja, iscrpljivanja broja konekcija i ostale napade iscrpljivanjem resursa.&lt;br /&gt;
&lt;br /&gt;
9.	Početne vrijednosti konfiguracije moraju biti fokusirane prema sigurnim postavkama. Sustav mora omogućiti lagani pregled svih relevantnih opcija i postavljene vrijednosti za provjeru sigurnosti.&lt;br /&gt;
&lt;br /&gt;
10.	Popis ranjivosti koje su uklonjene tijekom razvoja i kontrole koje su postavljene.&lt;br /&gt;
&lt;br /&gt;
===Osoblje i organizacija:===&lt;br /&gt;
&lt;br /&gt;
1.	Uz razvoj, dodatna verifikacija sigurnosti trebala bi se provoditi kroz arhitekte sigurnosti koji razumiju problematiku razvoja sigurnih elemenata sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Članovi tima za razvoj moraju biti obučeni i educirani u najboljoj praksi izgradnje sigurnih sustava vezanih uz njihove uloge.&lt;br /&gt;
&lt;br /&gt;
3.	 U slučaju razvoja povjerljivih sustava treba razmotriti primjerenost provjere sigurnosti i prijašnje iskustvo razvojnog tima uz dodatne ugovore o povjerljivosti. &lt;br /&gt;
&lt;br /&gt;
===Razvojno okruženje:===&lt;br /&gt;
&lt;br /&gt;
1.	Razvojni tim mora koristiti sustav za upravljanje izvornim tj. programskim kodom sa označivanjem promjena koje je napravio koji član razvojnog tima nad konfiguracijskim datotekama, datotekama izvornog koda i postavkama sigurnosti.&lt;br /&gt;
&lt;br /&gt;
2.	Razvojni tim mora koristiti način izgradnje softvera iz izvornog koda koji omogućuje provjeru integriteta softvera koji je isporučen klijentu. &lt;br /&gt;
&lt;br /&gt;
===Biblioteke, okviri i proizvodi:===&lt;br /&gt;
&lt;br /&gt;
1.	Svi elementi sustava koji nisu razvijeni u sklopu projekta, već ih je razvila treća strana moraju biti poznati klijentu uz navođenje da li su komercijalni, besplatni, otvorenog koda ili zatvorenog koda. &lt;br /&gt;
&lt;br /&gt;
2.	Izvođač mora uložiti razuman trud da osigura da elementi koje je razvila treća strana odgovaraju zahtjevima sigurnosti projekta.&lt;br /&gt;
&lt;br /&gt;
===Provjera sigurnosti:===&lt;br /&gt;
&lt;br /&gt;
1.	Klijent ima pravo provjeriti sigurnost sustava u svojem trošku u roku 60 dana od isporuke. Razvojni tim mora omogućiti razumnu podršku timu koji provodi provjeru sigurnosti davajući uvid u izvorni kod i testne okoline. &lt;br /&gt;
&lt;br /&gt;
2.	Provjera sigurnosti mora uključivati i pokrivati sve elemente sustava uključujući i prilagođene elemente sustava, komponente, proizvode i konfiguraciju.&lt;br /&gt;
&lt;br /&gt;
3.	Provjera sigurnosti mora minimalno uključivati provjeru za poznatim, čestim ranjivostima. Provjera može uključivati kombinaciju provjere ranjivosti, penetracijskog testa, statičke analize izvornog koda i pregled elemenata sustava od strane eksperta.&lt;br /&gt;
&lt;br /&gt;
4.	Sigurnosni nedostatci koji se otkriju u sklopu provjere moraju biti preneseni i klijentu i razvojnom timu. &lt;br /&gt;
&lt;br /&gt;
===Upravljanje sigurnosnim nedostacima:===&lt;br /&gt;
&lt;br /&gt;
1.	Sigurnosne nedostatke treba pratiti i uklanjati kroz cijeli životni ciklus sustava, bilo da su dio sigurnosnih zahtjeva, dizajna, implementacije, testiranja, isporuke ili da su operativni problem. Rizik vezan uz svaki sigurnosni nedostatak mora biti evaluiran, dokumentiran i klijent mora biti izviješten o nedostatku i riziku čim se isti otkrije. &lt;br /&gt;
&lt;br /&gt;
2.	Razvojni tim će primijeniti razumne mjere zaštite informacija veznih us sigurnosne nedostatke i dokumentaciju o istima zbog zaštite klijenta. &lt;br /&gt;
&lt;br /&gt;
3.	Svi sigurnosni nedostatci koji su pronađeni prije isporuke biti će ispravljeni od strane razvojnog tima. Postupanje sa sigurnosnim nedostatcima otkrivenima nakon isporuke određuje se ugovorom a isti se smatraju kao bilo koja druga manjkavost u softveru. &lt;br /&gt;
&lt;br /&gt;
===Osiguravanje kvalitete:===&lt;br /&gt;
&lt;br /&gt;
1.	Razvojni tim će uz dokumentaciju projekta predati i sigurnosnu dokumentaciju koja uključuje sve sigurnosne zahtjeve, dizajn sustava sigurnosti, implementaciju kontrola, rezultate testiranja te potvrdu da su svi sigurnosni nedostatci uklonjeni prije isporuke softvera.  &lt;br /&gt;
&lt;br /&gt;
2.	Arhitekt sigurnost mora potvrditi da sustav zadovoljava zahtjeve sigurnosti i da su sve aktivnosti u pogledu obrade rizika provedene. Sve iznimke moraju biti dokumentirane i evidentne u isporuci i dokumentaciji.  &lt;br /&gt;
&lt;br /&gt;
3.	Razvojni tim jamči da sustav nema elemenata koji oslabljuju sigurnost a nisu dio zahtjeva klijenta kao što su virusi, crvi, zaobilaženja autentikacije tj. “stražnja vrata”, trojanski konji i ostali oblici malicioznog koda&lt;br /&gt;
&lt;br /&gt;
===Održavanje sustava i prihvaćanje:===&lt;br /&gt;
&lt;br /&gt;
1.	Sustav ne može biti prihvaćen prije nego što su uklonjeni svi sigurnosni nedostatci i rezultati provjere sigurnosti prihvaćeni od strane klijenta.&lt;br /&gt;
&lt;br /&gt;
2.	Nakon prihvaćanja sustava, ukoliko se pronađu ili se sumnja na dodatne sigurnosne manjkavosti, Izvođač će pomoći klijentu u istraživanju manjkavosti. Ukoliko klasa manjkavosti nije pokrivena sigurnosnim zahtjevima i nalazi se izvan opsega sigurnosnog testiranja, manjkavost se smatra dodatnim razvojnim zahtjevom. Takvi dodani zahtjevi biti će obrađivani dogovorom i odlukom između izvođača i klijenta. &lt;br /&gt;
&lt;br /&gt;
3.	Izvođač mora primijeniti razumne mjere, koje uključuju razvoj sustava prema najboljim praksama koje uključuju način uklanjanja sigurnosnih manjkavosti prema razini rizika u cilju čim prije obrade rizika u suglasnosti sa klijentom. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Legal Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Contract_Annex/hr&amp;diff=184555</id>
		<title>OWASP Secure Software Contract Annex/hr</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Contract_Annex/hr&amp;diff=184555"/>
				<updated>2014-11-02T16:37:00Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Prijevod: [Tonimir Kišasondi https://www.owasp.org/index.php/User:Tonimir_Kisasondi], Laboratorij za otvorene sustave i sigurnost, Fakultet organizacije i informatike, Varaždin&lt;br /&gt;
&lt;br /&gt;
===Temeljne pretpostavke:===&lt;br /&gt;
&lt;br /&gt;
1.	Odluke o potrebnoj razini sigurnosti temelje se na razumijevanju rizika koji su vezani uz sustav koji se razvija.&lt;br /&gt;
&lt;br /&gt;
2.	Pristup osiguravanju sigurnosti mora se temeljiti na pristupu analize i implementacije potrebne razine sigurnosti kroz cijeli životni ciklus proizvoda ili sustava.&lt;br /&gt;
&lt;br /&gt;
3.	Kontrole tj. mjere zaštite nisu poseban, dodatni dio sustava već integrirani dio u svim elementima sustava. Kontrole ne smiju biti poseban ili dodatan dio razvoja sustava.&lt;br /&gt;
&lt;br /&gt;
4.	Dokumentacija sustava mora sadržavati opise svih primijenjenih kontrola u sustavu.&lt;br /&gt;
&lt;br /&gt;
5.	Dokumentacija mora biti jasna, korisna i transparentna te mora opisivati dizajn integriranog, cjelovitog sustava sigurnosti, procjenu rizika koja je provedena u sklopu razvoja i moguće probleme. &lt;br /&gt;
&lt;br /&gt;
6.	Ranjivosti u sustavu nisu neočekivane ali u procesu razvoja i u ranim fazama životnog ciklusa sustava treba pokušati identificirati sigurnosne manjkavosti. &lt;br /&gt;
&lt;br /&gt;
7.	Informacije o sigurnosti, rizicima i ranjivostima potrebno je otvoreno razmjenjivati između strane koja razvija sustav i koja je korisnik sustava, čim se navedene informacije otkrije jedna strana, mora obavijestiti drugu stranu u cijelosti i bez ustručavanja.&lt;br /&gt;
&lt;br /&gt;
===Aktivnosti životnog ciklusa:===&lt;br /&gt;
&lt;br /&gt;
1.	Rizici moraju biti identificirani u odnosu na imovinu ili elemente sustava, dokumentirani i obje strane moraju razumjeti rizike koji su u kontekstu sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Razvoj detaljnih sigurnosnih zahtjeva za sustav mora se temeljiti na identificiranim rizicima, gdje su sigurnosni zahtjevi dio specifikacije sustava koji se razvija. Sigurnosne zahtjeve moguće je realizirati dodatnim prilagođenim razvojem ili dodatnim sigurnosnim elementima u sustavu. &lt;br /&gt;
&lt;br /&gt;
3.	Svaki sigurnosni zahtjev mora biti razmotren i odluka mora biti donesena o načinu obrade rizika. Izvođač i naručitelj sustava moraju biti suglasni oko svih opisanih sigurnosnih zahtjeva i kontrola. Odluke moraju dokumentirane, te dokumentacija mora sadržavati informaciju zašto je konkretna kontrola prikladna i na koji način odgovara u cjelokupnom sustavu uz sva njegova ograničenja. Bitno je navesti da li se kontrola temelji na ugrađenom elementu koji je dio sustava ili je kontrola element koji razvija treća strana. Svaki sigurnosni zahtjev mora biti formiran na način da je moguće provjeriti da li je ispunjen. &lt;br /&gt;
&lt;br /&gt;
4.	Razvoj sustava mora se temeljiti na elementima koji su sigurni i odgovaraju zahtjevima sigurnosti.&lt;br /&gt;
 &lt;br /&gt;
5.	Svi elementi sustava moraju proći provjeru od druge strane koja nije razvijala konkretni element sustava. Cijeli sustav mora odgovarati dogovorenoj normi verifikacije mjera sigurnosti kao što je OWASP ASVS ili nekoj drugoj. Rezultati verifikacije moraju biti dokumentirani prema zahtjevima norme za verifikaciju.&lt;br /&gt;
&lt;br /&gt;
6.	Sustav mora sadržavati opis postavki i njihove implikacije za sigurnost sustava. Opis mora sadržavati i opis zavisnosti kao što je potrebna inačica operacijskog sustava, web poslužitelja, sustava za upravljanje bazom podataka i način na koji isti moraju biti podešeni da odgovaraju zahtjevima sigurnosti cijelog sustava. Početna konfiguracija sustava u trenutku isporuke mora biti sigurna. &lt;br /&gt;
&lt;br /&gt;
===Zahtjevi sigurnosti:===&lt;br /&gt;
&lt;br /&gt;
Prilikom procjene rizika i definiranja sigurnosnih zahtjeva potrebno je uzeti u obzir sljedeće zahtjeve sigurnosti koji moraju uključivati:&lt;br /&gt;
&lt;br /&gt;
1.	Pravila za provjeru unosa i kodiranje svakog ulaza u aplikaciju, bez obzira da li je unos od korisnika, baze podataka ili vanjskih sustava. Početna pretpostavka je da su svi unosi nevaljani osim ako ne odgovaraju specifikaciji točnog unosa. Zahtjevi moraju sadržavati postupak što uraditi sa unosom koji nije valjan. Sustavi ne bi smjeli biti podložni napadima umetanja znakova, prelijevanja spremnika, neovlaštenom promjenom i ostale napade koji mijenjaju stanje sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Mjere kako će se štiti sesija korisnika te podatci kojima se identificira sesija i prijavljeni korisnik. Zahtjevi moraju uključivati mjere za sve povezane funkcije kao što su: vraćanje zaboravljene lozinke, promjene lozinke, odjave, višestruke prijave i druge. &lt;br /&gt;
&lt;br /&gt;
3.	Detaljan opis načina realizacije kontrole pristupa te uloge, grupe, privilegije i autorizacije koje se koriste u aplikaciji vezane uz imovinu i funkcije koje su unutar sustava, gdje se povezuju specifična prava pristupa za svaku imovinu ili funkciju po svakoj ulozi. Predlaže se uporaba matrice kontrole pristupa za opis uloga i razine prava pristupa. &lt;br /&gt;
&lt;br /&gt;
4.	Način ponašanja sustava prilikom greške u radu. U nekim slučajevima najbolje je pružiti korisniku najbolji pokušaj u slučaju greške a nekada je najbolje prekinuti izvršavanje odmah. Navedene situacije i način baratanja greškama mora biti definiran prije izgradnje sustava. &lt;br /&gt;
&lt;br /&gt;
5.	Način bilježenja događaja u sustavu kao što su uspješne i neuspješne prijave, uočeni napadi ili pokušaji zaobilaženja autorizacije. Zahtjevi moraju sadržavati i podatke koji se moraju bilježiti kao što je vrijeme, datum, detalji aplikacije i sve ostale podatke koji omogućavaju forenzičku analizu. &lt;br /&gt;
&lt;br /&gt;
6.	Oblik autentikacije i zaštite komunikacije kao što je kriptiranje komunikacije i veze sa drugim elementima sustava kao što su baze podataka ili drugi web servisi. Vjerodajnice za uspostavu komunikacije moraju biti također zaštićene na primjeren način. &lt;br /&gt;
&lt;br /&gt;
7.	Odluku koje podatke treba kriptirati, na koji način kriptirati te kako će se postupati sa certifikatima i vjerodajnicama. Sustav mora koristiti standardne preporučene algoritme i biblioteke koje su sigurnosno provjerene. &lt;br /&gt;
&lt;br /&gt;
8.	Način zaštite sustava od napada uskraćenjem usluge (DoS ili DDoS), u obzir treba uzeti razne vrste napada kao što je zaključavanje autentikacije nakon većeg broja neuspješnih pokušaja, iscrpljivanja broja konekcija i ostale napade iscrpljivanjem resursa.&lt;br /&gt;
&lt;br /&gt;
9.	Početne vrijednosti konfiguracije moraju biti fokusirane prema sigurnim postavkama. Sustav mora omogućiti lagani pregled svih relevantnih opcija i postavljene vrijednosti za provjeru sigurnosti.&lt;br /&gt;
&lt;br /&gt;
10.	Popis ranjivosti koje su uklonjene tijekom razvoja i kontrole koje su postavljene.&lt;br /&gt;
&lt;br /&gt;
===Osoblje i organizacija:===&lt;br /&gt;
&lt;br /&gt;
1.	Uz razvoj, dodatna verifikacija sigurnosti trebala bi se provoditi kroz arhitekte sigurnosti koji razumiju problematiku razvoja sigurnih elemenata sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Članovi tima za razvoj moraju biti obučeni i educirani u najboljoj praksi izgradnje sigurnih sustava vezanih uz njihove uloge.&lt;br /&gt;
&lt;br /&gt;
3.	 U slučaju razvoja povjerljivih sustava treba razmotriti primjerenost provjere sigurnosti i prijašnje iskustvo razvojnog tima uz dodatne ugovore o povjerljivosti. &lt;br /&gt;
&lt;br /&gt;
===Razvojno okruženje:===&lt;br /&gt;
&lt;br /&gt;
1.	Razvojni tim mora koristiti sustav za upravljanje izvornim tj. programskim kodom sa označivanjem promjena koje je napravio koji član razvojnog tima nad konfiguracijskim datotekama, datotekama izvornog koda i postavkama sigurnosti.&lt;br /&gt;
&lt;br /&gt;
2.	Razvojni tim mora koristiti način izgradnje softvera iz izvornog koda koji omogućuje provjeru integriteta softvera koji je isporučen klijentu. &lt;br /&gt;
&lt;br /&gt;
===Biblioteke, okviri i proizvodi:===&lt;br /&gt;
&lt;br /&gt;
1.	Svi elementi sustava koji nisu razvijeni u sklopu projekta, već ih je razvila treća strana moraju biti poznati klijentu uz navođenje da li su komercijalni, besplatni, otvorenog koda ili zatvorenog koda. &lt;br /&gt;
&lt;br /&gt;
2.	Izvođač mora uložiti razuman trud da osigura da elementi koje je razvila treća strana odgovaraju zahtjevima sigurnosti projekta.&lt;br /&gt;
&lt;br /&gt;
===Provjera sigurnosti:===&lt;br /&gt;
&lt;br /&gt;
1.	Klijent ima pravo provjeriti sigurnost sustava u svojem trošku u roku 60 dana od isporuke. Razvojni tim mora omogućiti razumnu podršku timu koji provodi provjeru sigurnosti davajući uvid u izvorni kod i testne okoline. &lt;br /&gt;
&lt;br /&gt;
2.	Provjera sigurnosti mora uključivati i pokrivati sve elemente sustava uključujući i prilagođene elemente sustava, komponente, proizvode i konfiguraciju.&lt;br /&gt;
&lt;br /&gt;
3.	Provjera sigurnosti mora minimalno uključivati provjeru za poznatim, čestim ranjivostima. Provjera može uključivati kombinaciju provjere ranjivosti, penetracijskog testa, statičke analize izvornog koda i pregled elemenata sustava od strane eksperta.&lt;br /&gt;
&lt;br /&gt;
4.	Sigurnosni nedostatci koji se otkriju u sklopu provjere moraju biti preneseni i klijentu i razvojnom timu. &lt;br /&gt;
&lt;br /&gt;
===Upravljanje sigurnosnim nedostacima:===&lt;br /&gt;
&lt;br /&gt;
1.	Sigurnosne nedostatke treba pratiti i uklanjati kroz cijeli životni ciklus sustava, bilo da su dio sigurnosnih zahtjeva, dizajna, implementacije, testiranja, isporuke ili da su operativni problem. Rizik vezan uz svaki sigurnosni nedostatak mora biti evaluiran, dokumentiran i klijent mora biti izviješten o nedostatku i riziku čim se isti otkrije. &lt;br /&gt;
&lt;br /&gt;
2.	Razvojni tim će primijeniti razumne mjere zaštite informacija veznih us sigurnosne nedostatke i dokumentaciju o istima zbog zaštite klijenta. &lt;br /&gt;
&lt;br /&gt;
3.	Svi sigurnosni nedostatci koji su pronađeni prije isporuke biti će ispravljeni od strane razvojnog tima. Postupanje sa sigurnosnim nedostatcima otkrivenima nakon isporuke određuje se ugovorom a isti se smatraju kao bilo koja druga manjkavost u softveru. &lt;br /&gt;
&lt;br /&gt;
===Osiguravanje kvalitete:===&lt;br /&gt;
&lt;br /&gt;
1.	Razvojni tim će uz dokumentaciju projekta predati i sigurnosnu dokumentaciju koja uključuje sve sigurnosne zahtjeve, dizajn sustava sigurnosti, implementaciju kontrola, rezultate testiranja te potvrdu da su svi sigurnosni nedostatci uklonjeni prije isporuke softvera.  &lt;br /&gt;
&lt;br /&gt;
2.	Arhitekt sigurnost mora potvrditi da sustav zadovoljava zahtjeve sigurnosti i da su sve aktivnosti u pogledu obrade rizika provedene. Sve iznimke moraju biti dokumentirane i evidentne u isporuci i dokumentaciji.  &lt;br /&gt;
&lt;br /&gt;
3.	Razvojni tim jamči da sustav nema elemenata koji oslabljuju sigurnost a nisu dio zahtjeva klijenta kao što su virusi, crvi, zaobilaženja autentikacije tj. “stražnja vrata”, trojanski konji i ostali oblici malicioznog koda&lt;br /&gt;
&lt;br /&gt;
===Održavanje sustava i prihvaćanje:===&lt;br /&gt;
&lt;br /&gt;
1.	Sustav ne može biti prihvaćen prije nego što su uklonjeni svi sigurnosni nedostatci i rezultati provjere sigurnosti prihvaćeni od strane klijenta.&lt;br /&gt;
&lt;br /&gt;
2.	Nakon prihvaćanja sustava, ukoliko se pronađu ili se sumnja na dodatne sigurnosne manjkavosti, Izvođač će pomoći klijentu u istraživanju manjkavosti. Ukoliko klasa manjkavosti nije pokrivena sigurnosnim zahtjevima i nalazi se izvan opsega sigurnosnog testiranja, manjkavost se smatra dodatnim razvojnim zahtjevom. Takvi dodani zahtjevi biti će obrađivani dogovorom i odlukom između izvođača i klijenta. &lt;br /&gt;
&lt;br /&gt;
3.	Izvođač mora primijeniti razumne mjere, koje uključuju razvoj sustava prema najboljim praksama koje uključuju način uklanjanja sigurnosnih manjkavosti prema razini rizika u cilju čim prije obrade rizika u suglasnosti sa klijentom. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Legal Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Contract_Annex/hr&amp;diff=184554</id>
		<title>OWASP Secure Software Contract Annex/hr</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Contract_Annex/hr&amp;diff=184554"/>
				<updated>2014-11-02T16:35:45Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Prijevod: [Tonimir Kišasondi https://www.owasp.org/index.php/User:Tonimir_Kisasondi], Laboratorij za otvorene sustave i sigurnost, Fakultet organizacije i informatike, Varaždin&lt;br /&gt;
&lt;br /&gt;
===Temeljne pretpostavke:===&lt;br /&gt;
&lt;br /&gt;
1.	Odluke o potrebnoj razini sigurnosti temelje se na razumijevanju rizika koji su vezani uz sustav koji se razvija.&lt;br /&gt;
&lt;br /&gt;
2.	Pristup osiguravanju sigurnosti mora se temeljiti na pristupu analize i implementacije potrebne razine sigurnosti kroz cijeli životni ciklus proizvoda ili sustava.&lt;br /&gt;
&lt;br /&gt;
3.	Kontrole tj. mjere zaštite nisu poseban, dodatni dio sustava već integrirani dio u svim elementima sustava. Kontrole ne smiju biti poseban ili dodatan dio razvoja sustava.&lt;br /&gt;
&lt;br /&gt;
4.	Dokumentacija sustava mora sadržavati opise svih primijenjenih kontrola u sustavu.&lt;br /&gt;
&lt;br /&gt;
5.	Dokumentacija mora biti jasna, korisna i transparentna te mora opisivati dizajn integriranog, cjelovitog sustava sigurnosti, procjenu rizika koja je provedena u sklopu razvoja i moguće probleme. &lt;br /&gt;
&lt;br /&gt;
6.	Ranjivosti u sustavu nisu neočekivane ali u procesu razvoja i u ranim fazama životnog ciklusa sustava treba pokušati identificirati sigurnosne manjkavosti. &lt;br /&gt;
&lt;br /&gt;
7.	Informacije o sigurnosti, rizicima i ranjivostima potrebno je otvoreno razmjenjivati između strane koja razvija sustav i koja je korisnik sustava, čim se navedene informacije otkrije jedna strana, mora obavijestiti drugu stranu u cijelosti i bez ustručavanja.&lt;br /&gt;
&lt;br /&gt;
===Aktivnosti životnog ciklusa:===&lt;br /&gt;
&lt;br /&gt;
1.	Rizici moraju biti identificirani u odnosu na imovinu ili elemente sustava, dokumentirani i obje strane moraju razumjeti rizike koji su u kontekstu sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Razvoj detaljnih sigurnosnih zahtjeva za sustav mora se temeljiti na identificiranim rizicima, gdje su sigurnosni zahtjevi dio specifikacije sustava koji se razvija. Sigurnosne zahtjeve moguće je realizirati dodatnim prilagođenim razvojem ili dodatnim sigurnosnim elementima u sustavu. &lt;br /&gt;
&lt;br /&gt;
3.	Svaki sigurnosni zahtjev mora biti razmotren i odluka mora biti donesena o načinu obrade rizika. Izvođač i naručitelj sustava moraju biti suglasni oko svih opisanih sigurnosnih zahtjeva i kontrola. Odluke moraju dokumentirane, te dokumentacija mora sadržavati informaciju zašto je konkretna kontrola prikladna i na koji način odgovara u cjelokupnom sustavu uz sva njegova ograničenja. Bitno je navesti da li se kontrola temelji na ugrađenom elementu koji je dio sustava ili je kontrola element koji razvija treća strana. Svaki sigurnosni zahtjev mora biti formiran na način da je moguće provjeriti da li je ispunjen. &lt;br /&gt;
&lt;br /&gt;
4.	Razvoj sustava mora se temeljiti na elementima koji su sigurni i odgovaraju zahtjevima sigurnosti.&lt;br /&gt;
 &lt;br /&gt;
5.	Svi elementi sustava moraju proći provjeru od druge strane koja nije razvijala konkretni element sustava. Cijeli sustav mora odgovarati dogovorenoj normi verifikacije mjera sigurnosti kao što je OWASP ASVS ili nekoj drugoj. Rezultati verifikacije moraju biti dokumentirani prema zahtjevima norme za verifikaciju.&lt;br /&gt;
&lt;br /&gt;
6.	Sustav mora sadržavati opis postavki i njihove implikacije za sigurnost sustava. Opis mora sadržavati i opis zavisnosti kao što je potrebna inačica operacijskog sustava, web poslužitelja, sustava za upravljanje bazom podataka i način na koji isti moraju biti podešeni da odgovaraju zahtjevima sigurnosti cijelog sustava. Početna konfiguracija sustava u trenutku isporuke mora biti sigurna. &lt;br /&gt;
&lt;br /&gt;
===Zahtjevi sigurnosti:===&lt;br /&gt;
&lt;br /&gt;
Prilikom procjene rizika i definiranja sigurnosnih zahtjeva potrebno je uzeti u obzir sljedeće zahtjeve sigurnosti koji moraju uključivati:&lt;br /&gt;
&lt;br /&gt;
1.	Pravila za provjeru unosa i kodiranje svakog ulaza u aplikaciju, bez obzira da li je unos od korisnika, baze podataka ili vanjskih sustava. Početna pretpostavka je da su svi unosi nevaljani osim ako ne odgovaraju specifikaciji točnog unosa. Zahtjevi moraju sadržavati postupak što uraditi sa unosom koji nije valjan. Sustavi ne bi smjeli biti podložni napadima umetanja znakova, prelijevanja spremnika, neovlaštenom promjenom i ostale napade koji mijenjaju stanje sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Mjere kako će se štiti sesija korisnika te podatci kojima se identificira sesija i prijavljeni korisnik. Zahtjevi moraju uključivati mjere za sve povezane funkcije kao što su: vraćanje zaboravljene lozinke, promjene lozinke, odjave, višestruke prijave i druge. &lt;br /&gt;
&lt;br /&gt;
3.	Detaljan opis načina realizacije kontrole pristupa te uloge, grupe, privilegije i autorizacije koje se koriste u aplikaciji vezane uz imovinu i funkcije koje su unutar sustava, gdje se povezuju specifična prava pristupa za svaku imovinu ili funkciju po svakoj ulozi. Predlaže se uporaba matrice kontrole pristupa za opis uloga i razine prava pristupa. &lt;br /&gt;
&lt;br /&gt;
4.	Način ponašanja sustava prilikom greške u radu. U nekim slučajevima najbolje je pružiti korisniku najbolji pokušaj u slučaju greške a nekada je najbolje prekinuti izvršavanje odmah. Navedene situacije i način baratanja greškama mora biti definiran prije izgradnje sustava. &lt;br /&gt;
&lt;br /&gt;
5.	Način bilježenja događaja u sustavu kao što su uspješne i neuspješne prijave, uočeni napadi ili pokušaji zaobilaženja autorizacije. Zahtjevi moraju sadržavati i podatke koji se moraju bilježiti kao što je vrijeme, datum, detalji aplikacije i sve ostale podatke koji omogućavaju forenzičku analizu. &lt;br /&gt;
&lt;br /&gt;
6.	Oblik autentikacije i zaštite komunikacije kao što je kriptiranje komunikacije i veze sa drugim elementima sustava kao što su baze podataka ili drugi web servisi. Vjerodajnice za uspostavu komunikacije moraju biti također zaštićene na primjeren način. &lt;br /&gt;
&lt;br /&gt;
7.	Odluku koje podatke treba kriptirati, na koji način kriptirati te kako će se postupati sa certifikatima i vjerodajnicama. Sustav mora koristiti standardne preporučene algoritme i biblioteke koje su sigurnosno provjerene. &lt;br /&gt;
&lt;br /&gt;
8.	Način zaštite sustava od napada uskraćenjem usluge (DoS ili DDoS), u obzir treba uzeti razne vrste napada kao što je zaključavanje autentikacije nakon većeg broja neuspješnih pokušaja, iscrpljivanja broja konekcija i ostale napade iscrpljivanjem resursa.&lt;br /&gt;
&lt;br /&gt;
9.	Početne vrijednosti konfiguracije moraju biti fokusirane prema sigurnim postavkama. Sustav mora omogućiti lagani pregled svih relevantnih opcija i postavljene vrijednosti za provjeru sigurnosti.&lt;br /&gt;
&lt;br /&gt;
10.	Popis ranjivosti koje su uklonjene tijekom razvoja i kontrole koje su postavljene.&lt;br /&gt;
&lt;br /&gt;
===Osoblje i organizacija:===&lt;br /&gt;
&lt;br /&gt;
1.	Uz razvoj, dodatna verifikacija sigurnosti trebala bi se provoditi kroz arhitekte sigurnosti koji razumiju problematiku razvoja sigurnih elemenata sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Članovi tima za razvoj moraju biti obučeni i educirani u najboljoj praksi izgradnje sigurnih sustava vezanih uz njihove uloge.&lt;br /&gt;
&lt;br /&gt;
3.	 U slučaju razvoja povjerljivih sustava treba razmotriti primjerenost provjere sigurnosti i prijašnje iskustvo razvojnog tima uz dodatne ugovore o povjerljivosti. &lt;br /&gt;
&lt;br /&gt;
===Razvojno okruženje:===&lt;br /&gt;
&lt;br /&gt;
1.	Razvojni tim mora koristiti sustav za upravljanje izvornim tj. programskim kodom sa označivanjem promjena koje je napravio koji član razvojnog tima nad konfiguracijskim datotekama, datotekama izvornog koda i postavkama sigurnosti.&lt;br /&gt;
&lt;br /&gt;
2.	Razvojni tim mora koristiti način izgradnje softvera iz izvornog koda koji omogućuje provjeru integriteta softvera koji je isporučen klijentu. &lt;br /&gt;
&lt;br /&gt;
===Biblioteke, okviri i proizvodi:===&lt;br /&gt;
&lt;br /&gt;
1.	Svi elementi sustava koji nisu razvijeni u sklopu projekta, već ih je razvila treća strana moraju biti poznati klijentu uz navođenje da li su komercijalni, besplatni, otvorenog koda ili zatvorenog koda. &lt;br /&gt;
&lt;br /&gt;
2.	Izvođač mora uložiti razuman trud da osigura da elementi koje je razvila treća strana odgovaraju zahtjevima sigurnosti projekta.&lt;br /&gt;
&lt;br /&gt;
===Provjera sigurnosti:===&lt;br /&gt;
&lt;br /&gt;
1.	Klijent ima pravo provjeriti sigurnost sustava u svojem trošku u roku 60 dana od isporuke. Razvojni tim mora omogućiti razumnu podršku timu koji provodi provjeru sigurnosti davajući uvid u izvorni kod i testne okoline. &lt;br /&gt;
&lt;br /&gt;
2.	Provjera sigurnosti mora uključivati i pokrivati sve elemente sustava uključujući i prilagođene elemente sustava, komponente, proizvode i konfiguraciju.&lt;br /&gt;
&lt;br /&gt;
3.	Provjera sigurnosti mora minimalno uključivati provjeru za poznatim, čestim ranjivostima. Provjera može uključivati kombinaciju provjere ranjivosti, penetracijskog testa, statičke analize izvornog koda i pregled elemenata sustava od strane eksperta.&lt;br /&gt;
&lt;br /&gt;
4.	Sigurnosni nedostatci koji se otkriju u sklopu provjere moraju biti preneseni i klijentu i razvojnom timu. &lt;br /&gt;
&lt;br /&gt;
===Upravljanje sigurnosnim nedostacima:===&lt;br /&gt;
&lt;br /&gt;
1.	Sigurnosne nedostatke treba pratiti i uklanjati kroz cijeli životni ciklus sustava, bilo da su dio sigurnosnih zahtjeva, dizajna, implementacije, testiranja, isporuke ili da su operativni problem. Rizik vezan uz svaki sigurnosni nedostatak mora biti evaluiran, dokumentiran i klijent mora biti izviješten o nedostatku i riziku čim se isti otkrije. &lt;br /&gt;
&lt;br /&gt;
2.	Razvojni tim će primijeniti razumne mjere zaštite informacija veznih us sigurnosne nedostatke i dokumentaciju o istima zbog zaštite klijenta. &lt;br /&gt;
&lt;br /&gt;
3.	Svi sigurnosni nedostatci koji su pronađeni prije isporuke biti će ispravljeni od strane razvojnog tima. Postupanje sa sigurnosnim nedostatcima otkrivenima nakon isporuke određuje se ugovorom a isti se smatraju kao bilo koja druga manjkavost u softveru. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Osiguravanje kvalitete:===&lt;br /&gt;
&lt;br /&gt;
1.	Razvojni tim će uz dokumentaciju projekta predati i sigurnosnu dokumentaciju koja uključuje sve sigurnosne zahtjeve, dizajn sustava sigurnosti, implementaciju kontrola, rezultate testiranja te potvrdu da su svi sigurnosni nedostatci uklonjeni prije isporuke softvera.  &lt;br /&gt;
&lt;br /&gt;
2.	Arhitekt sigurnost mora potvrditi da sustav zadovoljava zahtjeve sigurnosti i da su sve aktivnosti u pogledu obrade rizika provedene. Sve iznimke moraju biti dokumentirane i evidentne u isporuci i dokumentaciji.  &lt;br /&gt;
&lt;br /&gt;
3.	Razvojni tim jamči da sustav nema elemenata koji oslabljuju sigurnost a nisu dio zahtjeva klijenta kao što su virusi, crvi, zaobilaženja autentikacije tj. “stražnja vrata”, trojanski konji i ostali oblici malicioznog koda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Održavanje sustava i prihvaćanje:===&lt;br /&gt;
&lt;br /&gt;
1.	Sustav ne može biti prihvaćen prije nego što su uklonjeni svi sigurnosni nedostatci i rezultati provjere sigurnosti prihvaćeni od strane klijenta.&lt;br /&gt;
&lt;br /&gt;
2.	Nakon prihvaćanja sustava, ukoliko se pronađu ili se sumnja na dodatne sigurnosne manjkavosti, Izvođač će pomoći klijentu u istraživanju manjkavosti. Ukoliko klasa manjkavosti nije pokrivena sigurnosnim zahtjevima i nalazi se izvan opsega sigurnosnog testiranja, manjkavost se smatra dodatnim razvojnim zahtjevom. Takvi dodani zahtjevi biti će obrađivani dogovorom i odlukom između izvođača i klijenta. &lt;br /&gt;
&lt;br /&gt;
3.	Izvođač mora primijeniti razumne mjere, koje uključuju razvoj sustava prema najboljim praksama koje uključuju način uklanjanja sigurnosnih manjkavosti prema razini rizika u cilju čim prije obrade rizika u suglasnosti sa klijentom. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Legal Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Contract_Annex/hr&amp;diff=184553</id>
		<title>OWASP Secure Software Contract Annex/hr</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Contract_Annex/hr&amp;diff=184553"/>
				<updated>2014-11-02T16:34:10Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: Created page with &amp;quot;  ===Temeljne pretpostavke:===  1.	Odluke o potrebnoj razini sigurnosti temelje se na razumijevanju rizika koji su vezani uz sustav koji se razvija.  2.	Pristup osiguravanju s...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
===Temeljne pretpostavke:===&lt;br /&gt;
&lt;br /&gt;
1.	Odluke o potrebnoj razini sigurnosti temelje se na razumijevanju rizika koji su vezani uz sustav koji se razvija.&lt;br /&gt;
&lt;br /&gt;
2.	Pristup osiguravanju sigurnosti mora se temeljiti na pristupu analize i implementacije potrebne razine sigurnosti kroz cijeli životni ciklus proizvoda ili sustava.&lt;br /&gt;
&lt;br /&gt;
3.	Kontrole tj. mjere zaštite nisu poseban, dodatni dio sustava već integrirani dio u svim elementima sustava. Kontrole ne smiju biti poseban ili dodatan dio razvoja sustava.&lt;br /&gt;
&lt;br /&gt;
4.	Dokumentacija sustava mora sadržavati opise svih primijenjenih kontrola u sustavu.&lt;br /&gt;
&lt;br /&gt;
5.	Dokumentacija mora biti jasna, korisna i transparentna te mora opisivati dizajn integriranog, cjelovitog sustava sigurnosti, procjenu rizika koja je provedena u sklopu razvoja i moguće probleme. &lt;br /&gt;
&lt;br /&gt;
6.	Ranjivosti u sustavu nisu neočekivane ali u procesu razvoja i u ranim fazama životnog ciklusa sustava treba pokušati identificirati sigurnosne manjkavosti. &lt;br /&gt;
&lt;br /&gt;
7.	Informacije o sigurnosti, rizicima i ranjivostima potrebno je otvoreno razmjenjivati između strane koja razvija sustav i koja je korisnik sustava, čim se navedene informacije otkrije jedna strana, mora obavijestiti drugu stranu u cijelosti i bez ustručavanja.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Aktivnosti životnog ciklusa===&lt;br /&gt;
&lt;br /&gt;
1.	Rizici moraju biti identificirani u odnosu na imovinu ili elemente sustava, dokumentirani i obje strane moraju razumjeti rizike koji su u kontekstu sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Razvoj detaljnih sigurnosnih zahtjeva za sustav mora se temeljiti na identificiranim rizicima, gdje su sigurnosni zahtjevi dio specifikacije sustava koji se razvija. Sigurnosne zahtjeve moguće je realizirati dodatnim prilagođenim razvojem ili dodatnim sigurnosnim elementima u sustavu. &lt;br /&gt;
&lt;br /&gt;
3.	Svaki sigurnosni zahtjev mora biti razmotren i odluka mora biti donesena o načinu obrade rizika. Izvođač i naručitelj sustava moraju biti suglasni oko svih opisanih sigurnosnih zahtjeva i kontrola. Odluke moraju dokumentirane, te dokumentacija mora sadržavati informaciju zašto je konkretna kontrola prikladna i na koji način odgovara u cjelokupnom sustavu uz sva njegova ograničenja. Bitno je navesti da li se kontrola temelji na ugrađenom elementu koji je dio sustava ili je kontrola element koji razvija treća strana. Svaki sigurnosni zahtjev mora biti formiran na način da je moguće provjeriti da li je ispunjen. &lt;br /&gt;
&lt;br /&gt;
4.	Razvoj sustava mora se temeljiti na elementima koji su sigurni i odgovaraju zahtjevima sigurnosti.&lt;br /&gt;
 &lt;br /&gt;
5.	Svi elementi sustava moraju proći provjeru od druge strane koja nije razvijala konkretni element sustava. Cijeli sustav mora odgovarati dogovorenoj normi verifikacije mjera sigurnosti kao što je OWASP ASVS ili nekoj drugoj. Rezultati verifikacije moraju biti dokumentirani prema zahtjevima norme za verifikaciju.&lt;br /&gt;
&lt;br /&gt;
6.	Sustav mora sadržavati opis postavki i njihove implikacije za sigurnost sustava. Opis mora sadržavati i opis zavisnosti kao što je potrebna inačica operacijskog sustava, web poslužitelja, sustava za upravljanje bazom podataka i način na koji isti moraju biti podešeni da odgovaraju zahtjevima sigurnosti cijelog sustava. Početna konfiguracija sustava u trenutku isporuke mora biti sigurna. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Zahtjevi sigurnosti:===&lt;br /&gt;
&lt;br /&gt;
Prilikom procjene rizika i definiranja sigurnosnih zahtjeva potrebno je uzeti u obzir sljedeće zahtjeve sigurnosti koji moraju uključivati:&lt;br /&gt;
&lt;br /&gt;
1.	Pravila za provjeru unosa i kodiranje svakog ulaza u aplikaciju, bez obzira da li je unos od korisnika, baze podataka ili vanjskih sustava. Početna pretpostavka je da su svi unosi nevaljani osim ako ne odgovaraju specifikaciji točnog unosa. Zahtjevi moraju sadržavati postupak što uraditi sa unosom koji nije valjan. Sustavi ne bi smjeli biti podložni napadima umetanja znakova, prelijevanja spremnika, neovlaštenom promjenom i ostale napade koji mijenjaju stanje sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Mjere kako će se štiti sesija korisnika te podatci kojima se identificira sesija i prijavljeni korisnik. Zahtjevi moraju uključivati mjere za sve povezane funkcije kao što su: vraćanje zaboravljene lozinke, promjene lozinke, odjave, višestruke prijave i druge. &lt;br /&gt;
&lt;br /&gt;
3.	Detaljan opis načina realizacije kontrole pristupa te uloge, grupe, privilegije i autorizacije koje se koriste u aplikaciji vezane uz imovinu i funkcije koje su unutar sustava, gdje se povezuju specifična prava pristupa za svaku imovinu ili funkciju po svakoj ulozi. Predlaže se uporaba matrice kontrole pristupa za opis uloga i razine prava pristupa. &lt;br /&gt;
&lt;br /&gt;
4.	Način ponašanja sustava prilikom greške u radu. U nekim slučajevima najbolje je pružiti korisniku najbolji pokušaj u slučaju greške a nekada je najbolje prekinuti izvršavanje odmah. Navedene situacije i način baratanja greškama mora biti definiran prije izgradnje sustava. &lt;br /&gt;
&lt;br /&gt;
5.	Način bilježenja događaja u sustavu kao što su uspješne i neuspješne prijave, uočeni napadi ili pokušaji zaobilaženja autorizacije. Zahtjevi moraju sadržavati i podatke koji se moraju bilježiti kao što je vrijeme, datum, detalji aplikacije i sve ostale podatke koji omogućavaju forenzičku analizu. &lt;br /&gt;
&lt;br /&gt;
6.	Oblik autentikacije i zaštite komunikacije kao što je kriptiranje komunikacije i veze sa drugim elementima sustava kao što su baze podataka ili drugi web servisi. Vjerodajnice za uspostavu komunikacije moraju biti također zaštićene na primjeren način. &lt;br /&gt;
&lt;br /&gt;
7.	Odluku koje podatke treba kriptirati, na koji način kriptirati te kako će se postupati sa certifikatima i vjerodajnicama. Sustav mora koristiti standardne preporučene algoritme i biblioteke koje su sigurnosno provjerene. &lt;br /&gt;
&lt;br /&gt;
8.	Način zaštite sustava od napada uskraćenjem usluge (DoS ili DDoS), u obzir treba uzeti razne vrste napada kao što je zaključavanje autentikacije nakon većeg broja neuspješnih pokušaja, iscrpljivanja broja konekcija i ostale napade iscrpljivanjem resursa.&lt;br /&gt;
&lt;br /&gt;
9.	Početne vrijednosti konfiguracije moraju biti fokusirane prema sigurnim postavkama. Sustav mora omogućiti lagani pregled svih relevantnih opcija i postavljene vrijednosti za provjeru sigurnosti.&lt;br /&gt;
&lt;br /&gt;
10.	Popis ranjivosti koje su uklonjene tijekom razvoja i kontrole koje su postavljene.&lt;br /&gt;
&lt;br /&gt;
===Osoblje i organizacija:===&lt;br /&gt;
&lt;br /&gt;
1.	Uz razvoj, dodatna verifikacija sigurnosti trebala bi se provoditi kroz arhitekte sigurnosti koji razumiju problematiku razvoja sigurnih elemenata sustava.&lt;br /&gt;
&lt;br /&gt;
2.	Članovi tima za razvoj moraju biti obučeni i educirani u najboljoj praksi izgradnje sigurnih sustava vezanih uz njihove uloge.&lt;br /&gt;
&lt;br /&gt;
3.	 U slučaju razvoja povjerljivih sustava treba razmotriti primjerenost provjere sigurnosti i prijašnje iskustvo razvojnog tima uz dodatne ugovore o povjerljivosti. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Razvojno okruženje:===&lt;br /&gt;
&lt;br /&gt;
1.	Razvojni tim mora koristiti sustav za upravljanje izvornim tj. programskim kodom sa označivanjem promjena koje je napravio koji član razvojnog tima nad konfiguracijskim datotekama, datotekama izvornog koda i postavkama sigurnosti.&lt;br /&gt;
&lt;br /&gt;
2.	Razvojni tim mora koristiti način izgradnje softvera iz izvornog koda koji omogućuje provjeru integriteta softvera koji je isporučen klijentu. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Biblioteke, okviri i proizvodi:===&lt;br /&gt;
&lt;br /&gt;
1.	Svi elementi sustava koji nisu razvijeni u sklopu projekta, već ih je razvila treća strana moraju biti poznati klijentu uz navođenje da li su komercijalni, besplatni, otvorenog koda ili zatvorenog koda. &lt;br /&gt;
&lt;br /&gt;
2.	Izvođač mora uložiti razuman trud da osigura da elementi koje je razvila treća strana odgovaraju zahtjevima sigurnosti projekta.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Provjera sigurnosti:===&lt;br /&gt;
&lt;br /&gt;
1.	Klijent ima pravo provjeriti sigurnost sustava u svojem trošku u roku 60 dana od isporuke. Razvojni tim mora omogućiti razumnu podršku timu koji provodi provjeru sigurnosti davajući uvid u izvorni kod i testne okoline. &lt;br /&gt;
&lt;br /&gt;
2.	Provjera sigurnosti mora uključivati i pokrivati sve elemente sustava uključujući i prilagođene elemente sustava, komponente, proizvode i konfiguraciju.&lt;br /&gt;
&lt;br /&gt;
3.	Provjera sigurnosti mora minimalno uključivati provjeru za poznatim, čestim ranjivostima. Provjera može uključivati kombinaciju provjere ranjivosti, penetracijskog testa, statičke analize izvornog koda i pregled elemenata sustava od strane eksperta.&lt;br /&gt;
&lt;br /&gt;
4.	Sigurnosni nedostatci koji se otkriju u sklopu provjere moraju biti preneseni i klijentu i razvojnom timu. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Upravljanje sigurnosnim nedostacima:===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.	Sigurnosne nedostatke treba pratiti i uklanjati kroz cijeli životni ciklus sustava, bilo da su dio sigurnosnih zahtjeva, dizajna, implementacije, testiranja, isporuke ili da su operativni problem. Rizik vezan uz svaki sigurnosni nedostatak mora biti evaluiran, dokumentiran i klijent mora biti izviješten o nedostatku i riziku čim se isti otkrije. &lt;br /&gt;
&lt;br /&gt;
2.	Razvojni tim će primijeniti razumne mjere zaštite informacija veznih us sigurnosne nedostatke i dokumentaciju o istima zbog zaštite klijenta. &lt;br /&gt;
&lt;br /&gt;
3.	Svi sigurnosni nedostatci koji su pronađeni prije isporuke biti će ispravljeni od strane razvojnog tima. Postupanje sa sigurnosnim nedostatcima otkrivenima nakon isporuke određuje se ugovorom a isti se smatraju kao bilo koja druga manjkavost u softveru. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Osiguravanje kvalitete:===&lt;br /&gt;
&lt;br /&gt;
1.	Razvojni tim će uz dokumentaciju projekta predati i sigurnosnu dokumentaciju koja uključuje sve sigurnosne zahtjeve, dizajn sustava sigurnosti, implementaciju kontrola, rezultate testiranja te potvrdu da su svi sigurnosni nedostatci uklonjeni prije isporuke softvera.  &lt;br /&gt;
&lt;br /&gt;
2.	Arhitekt sigurnost mora potvrditi da sustav zadovoljava zahtjeve sigurnosti i da su sve aktivnosti u pogledu obrade rizika provedene. Sve iznimke moraju biti dokumentirane i evidentne u isporuci i dokumentaciji.  &lt;br /&gt;
&lt;br /&gt;
3.	Razvojni tim jamči da sustav nema elemenata koji oslabljuju sigurnost a nisu dio zahtjeva klijenta kao što su virusi, crvi, zaobilaženja autentikacije tj. “stražnja vrata”, trojanski konji i ostali oblici malicioznog koda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Održavanje sustava i prihvaćanje:===&lt;br /&gt;
&lt;br /&gt;
1.	Sustav ne može biti prihvaćen prije nego što su uklonjeni svi sigurnosni nedostatci i rezultati provjere sigurnosti prihvaćeni od strane klijenta.&lt;br /&gt;
&lt;br /&gt;
2.	Nakon prihvaćanja sustava, ukoliko se pronađu ili se sumnja na dodatne sigurnosne manjkavosti, Izvođač će pomoći klijentu u istraživanju manjkavosti. Ukoliko klasa manjkavosti nije pokrivena sigurnosnim zahtjevima i nalazi se izvan opsega sigurnosnog testiranja, manjkavost se smatra dodatnim razvojnim zahtjevom. Takvi dodani zahtjevi biti će obrađivani dogovorom i odlukom između izvođača i klijenta. &lt;br /&gt;
&lt;br /&gt;
3.	Izvođač mora primijeniti razumne mjere, koje uključuju razvoj sustava prema najboljim praksama koje uključuju način uklanjanja sigurnosnih manjkavosti prema razini rizika u cilju čim prije obrade rizika u suglasnosti sa klijentom. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Legal Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=182925</id>
		<title>OWASP Security Shepherd</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Shepherd&amp;diff=182925"/>
				<updated>2014-09-26T19:14:39Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Shepherd-Injection-Lesson.JPG|thumb|300px|right|Detailed vulnerability explainations]][[Image:Shepherd-Scoreboard.JPG|thumb|300px|right|Competitive Learning Environment]]&lt;br /&gt;
'''Security Shepherd''' is a computer based training application for web and mobile application security vulnerabilities. This project strives to herd the lost sheep of the technological world back to the safe and sound ways of secure practices. Security Shepherd can be deployed as a CTF (Capture the Flag) game or as an open floor educational server.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Shepherd-CTF-Level-One.JPG|thumb|300px|right|Easy configuration to suit every use]]&lt;br /&gt;
Security Shepherd has been implemented with the aim of fostering and improving security awareness among a varied skill-set demographic. This project enables users to learn or to improve upon existing manual penetration testing skills. This is accomplished through lesson and challenge techniques. A lesson provides a user with a lot of help in completing that module, where a challenge puts what the user learned in the lesson to use. Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd's vulnerabilities are not simulated, and are instead delivered through hardened real security vulnerabilities that can not be abused to compromise the application or its environment. Many of these levels include insufficient protections to these vulnerabilities, such as black list filters and poor security configuration.&lt;br /&gt;
&lt;br /&gt;
===CTF Mode===&lt;br /&gt;
Security Shepherd can be morphed into a CTF server by an administrator with the click of a button. This presents users with one module at a time. They must complete their current level before they can continue. Administrators can also set a &amp;quot;Module Block&amp;quot; that prevents users from progressing past a certain level. It is also possible to run a CTF in a Tournament mode where a user can complete any module in any order they wish. When either of these modes are enabled, the scoreboard is then available. The scoreboard updates automatically and reflects the bonus points users achieve by completing a module first, second or third.&lt;br /&gt;
&lt;br /&gt;
===User Management===&lt;br /&gt;
Security Shepherd includes a user friendly method of creating many users at a time for administrators, as well as an optional open registry system. Users' activities are logged allowing an administrator to gather real time data on who is connected to Security Shepherd and what their module progress is. This data can be mined to gather information on who was online, at what time and how much time has been actively spent on a challenge.&lt;br /&gt;
&lt;br /&gt;
===Topic Coverage===&lt;br /&gt;
The Security Shepherd project covers the following web application security topics;&lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|SQL Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|Cross Site Scripting]]&lt;br /&gt;
*[[Top_10_2010-A3|Broken Authetication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A5|Cross Site Rrequest Forgery]]&lt;br /&gt;
*[[Top_10_2010-A4|Insecure Direct Object Reference]]&lt;br /&gt;
*[[Top_10_2010-A7|Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A10|Unvalidated Redirects and Forwards]]&lt;br /&gt;
*[[Top_10_2010-A9|Insufficient Transport Layer Security]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M2|Insecure Data Storage]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|Client Side Injection]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|Lack Of Binary Protections]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|Unintended Data Leakage]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M6|Broken crypto]]&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download the Security Shepherd VM or Manual Installation Pack from [https://sourceforge.net/projects/owaspshepherd/files/ Source Forge].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
Security Shepherd has been designed with expansion in mind. The application's underlying architecture is composed of a secure core application and database server that depicts how the application runs. There is also an exposed application and database service that runs all of the server side vulnerability examples. If these services are compromised, the core service can continue to run unaffected.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd is written in Java and is compiled in a web application archive (WAR) and therefore can be run on any platform with a Java virtual machine and a web application server like Tomcat. To eliminate tedious environment configuration; there is a Security Shepherd Virtual Machine. This environment includes Tomcat/MySQL servers pre-loaded with Security Shepherd. For those that prefer the path of higher resistance or want to build a dedicated Security Shepherd server, a manual pack is available for download as well.&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.0 VM Setup:===&lt;br /&gt;
To get a Security Shepherd VM ready to rock, follow these steps;&lt;br /&gt;
&lt;br /&gt;
Setting up your instance of Security Shepherd with the VM: In Steps!&lt;br /&gt;
&lt;br /&gt;
* Import the VM to your hyper visor (Eg: Virtual Box)&lt;br /&gt;
* Make sure the VM has a bridged adapter&lt;br /&gt;
* Boot the VM&lt;br /&gt;
* Sign in with securityshepherd / owaspSecurityShepherd&lt;br /&gt;
* Change the user password with the passwd command&lt;br /&gt;
* In the VM, run &amp;quot;ifconfig&amp;quot; to find the IP address. Make note of this&lt;br /&gt;
* On your host machine, open http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Sign in with admin / password&lt;br /&gt;
* Change the admin password (cannot be password again)&lt;br /&gt;
* Use the configuration menu in the home page to change the application address from http://127.0.0.1/ to http://&amp;lt;VM IP Address&amp;gt;/&lt;br /&gt;
* Time to play!&lt;br /&gt;
&lt;br /&gt;
===Security Shepherd v2.0 Manual Pack:===&lt;br /&gt;
The manual release is a single download, unrar, and follow the steps release. &lt;br /&gt;
* Download the Security Shepherd Manual Pack&lt;br /&gt;
* Install Apache Tomcat 7&lt;br /&gt;
* Install MySql, using the default password (Contained in readme.txt) to skip future steps, if you prefer your own password go ahead and set-up MySql with that instead!&lt;br /&gt;
* Extract the Security Shepherd Manual Pack&lt;br /&gt;
* Copy the sql files extracted from the pack to the bin directory of MySql&lt;br /&gt;
* Open MySql from the command line (eg: mySqlBinDirectory/mysql -u root -p ) &lt;br /&gt;
* Type the following commands to execute the Shepherd Manual Pack SQL files;&lt;br /&gt;
&lt;br /&gt;
source core.sql&lt;br /&gt;
source exposedSchema.sql&lt;br /&gt;
&lt;br /&gt;
* Open the webapps directory of your Tomcat instance&lt;br /&gt;
* Delete any directories that are there already&lt;br /&gt;
* Move the WAR files from the Shepherd Manual Pack into the webapps folder of Tomcat&lt;br /&gt;
* Start Tomcat&lt;br /&gt;
* Open the temp directory of Tomcat&lt;br /&gt;
* If you chose the default when configuring MySql as your DB password, you are running MySql on the same machine as Tomcat and you are using port 3306 for MySql, you can skip this step. Otherwise, in the temp directory, in both the ROOT and Exposed directories in the temp folder, modify the /WEB-INF/site.properties to point at your local DB with your MySql settings. Leave the Driver alone!&lt;br /&gt;
* If you have more than one ROOT or Exposed folder in your temp folder, visit your Tomcat instance with your browser and then check the Tomcat logs for a line that reads &amp;quot;Servlet root =&amp;quot; to find which directory is the correct one to modify the MySql settings of.&lt;br /&gt;
* Open your the root context of your Tomcat server (eg: http://127.0.0.1:8080/ )&lt;br /&gt;
* Sign into Security Shepherd with the default admin credentials (admin / password)&lt;br /&gt;
* Change the admin password&lt;br /&gt;
* Follow in application prompts for further configuration&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
New levels or level ideas are wanted in the highest degree and there is development is in progress to fork the Security Shepherd platform into a CTF framework. If you wish to contribute a level or even an idea; contact Mark Denihan on mark.denihan@owasp.org.&lt;br /&gt;
&lt;br /&gt;
The aim of Security Shepherd's future development is to create a comprehensive platform for web and mobile application pen testing training / security risk education.&lt;br /&gt;
Check out the project [https://www.owasp.org/index.php/Projects/OWASP_Security_Shepherd/Roadmap roadmap] and find some tasks that you can help with right away..&lt;br /&gt;
&lt;br /&gt;
To contribute right away, pull the source from [http://bit.ly/securityShepherdGithub GitHub]&lt;br /&gt;
&lt;br /&gt;
== Events with Security Shepherd ==&lt;br /&gt;
[[Image:Shepherd-CTF-In-Play.JPG|thumb|300px|right|Over 60 people playing the CTF at [[HackDub2012]]]]&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd application has been tried and tested across a number of Beta runs in venues like Facebook and the IRISScon CTF. Since these events Security Shepherd has been knocking on security doors trying to be recognized as the new platform for web application security training. &lt;br /&gt;
&lt;br /&gt;
* Security Shepherd was used as the [[HackDub2012|OWASP Dublin Hackathon 2012]]&lt;br /&gt;
* Security Shepherd's platform was used be used to manage the [[AppSecIreland2012| OWASP Ireland AppSec 2012]] CTF in September 2012&lt;br /&gt;
* Security Shepherd's platform was used to administer the Traditional Style CTF at the IRISS security conference in October 2012 and 2013&lt;br /&gt;
* Security Shepherd's platform was used to deliver the Traditional Style CTF at the 2013 SOURCE Conference CTF in Facebook&lt;br /&gt;
* Security Shepherd's platform was used to govern the EU Tour 2013 and LATAM Tour 2013 Online CTF's&lt;br /&gt;
* Security Shepherd's platform was used to conduct the 2013 OWASP Global CTF&lt;br /&gt;
* Security Shepherd was used as the 2014 OWASP application security summer school CTF at the Faculty of Organization and Informatics in Varaždin&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Security Shepherd project was founded and is ran by Mark Denihan. The mobile wing of Security Shepherd is lead by Sean Duggan. If you wish to contribute to the OWASP Security Shepherd project please contact at mark.denihan@owasp.org, as help in any regard of the application is very much appreciated.  Security Shepherd distributions are currently maintained on [http://bit.ly/shepherdSourceForge SourceForge]. The Security Shepherd template makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the Security Shepherd [https://lists.owasp.org/mailman/listinfo/owasp_security_shepherd mailing list].&lt;br /&gt;
&lt;br /&gt;
Both the Security Shepherd Platform and the Mobile Shepherd aspects of this project were initially created as part of BSc degrees in the Dublin Institute of Technology. Thanks to [http://www.dit.ie DIT] for allowing those projects to be donated to the OWASP community.&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project would like to acknowledge and thank the generous support of our sponsors. Please be certain to visit their stall at the [http://bit.ly/AppSecEu2014|OWASP AppSec EU 2014] conference as well as follow them on [http://bit.ly/bccRiskAdvisory Twitter]. &lt;br /&gt;
[[File:BccRiskAdvisoryLogo.jpg]][[File:EdgescanLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|Security Shepherd Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tonimir_Kisasondi&amp;diff=175136</id>
		<title>User:Tonimir Kisasondi</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tonimir_Kisasondi&amp;diff=175136"/>
				<updated>2014-05-16T12:46:37Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Tonimir Kišasondi, PhD, EUCIP&lt;br /&gt;
&lt;br /&gt;
Researcher @ Faculty of organization and informatics, Varazdin ([http://www.foi.hr http://www.foi.hr])&lt;br /&gt;
Head of Open Systems and Security Laboratory&lt;br /&gt;
OWASP educational leader, Croatia @ FOI&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Page: [http://www.foi.hr/djelatnici/tonimir.kisasondi/(language)/cro-HR http://www.foi.hr/djelatnici/tonimir.kisasondi/(language)/cro-HR]&lt;br /&gt;
&lt;br /&gt;
Twitter: [http://twitter.com/#!/kisasondi http://twitter.com/#!/kisasondi]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
pgp: 0x00C68442&lt;br /&gt;
&lt;br /&gt;
pgpid: 77FCA8315CE34BCFB1C01B0CF1D9B3A200C68442&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=114079</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=114079"/>
				<updated>2011-07-18T09:38:32Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leader is [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] Educational leader: [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Croatia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Welcome. We're just starting organizing things here. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organizing local chapter. Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': CARNet CERT, Ulica Josipa Marohnića 5, 10000 Zagreb, Hrvatska&lt;br /&gt;
&lt;br /&gt;
 '''Next meeting''': OWASP round table/meetup in 22.9.2011 @ FOI security conference, More information soon &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
&lt;br /&gt;
Educational leader: [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=114078</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=114078"/>
				<updated>2011-07-18T09:37:39Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leader is [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] Educational leader: [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Croatia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Welcome. We're just starting organizing things here. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organizing local chapter. Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': CARNet CERT, Ulica Josipa Marohnića 5, 10000 Zagreb, Hrvatska&lt;br /&gt;
&lt;br /&gt;
 '''Next meeting''': 23th of January, 2009 at Barcamp Zagreb, FER, Unska 3, 10000 Zagreb &lt;br /&gt;
&lt;br /&gt;
OWASP round table/meetup in 22.9.2011 @ FOI security conference, More information soon&lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
&lt;br /&gt;
Educational leader: [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Croatia&amp;diff=114077</id>
		<title>Croatia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Croatia&amp;diff=114077"/>
				<updated>2011-07-18T09:31:16Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Croatia|extra=The chapter leader is [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak] Educational leader: [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Croatia|emailarchives=http://lists.owasp.org/pipermail/owasp-croatia/}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Croatia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Welcome. We're just starting organizing things here. You're invited to subscribe to the mailing list for up2date news and also if you want help in &lt;br /&gt;
organizing local chapter. Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Regular Meeting Location''': CARNet CERT, Ulica Josipa Marohnića 5, 10000 Zagreb, Hrvatska&lt;br /&gt;
&lt;br /&gt;
 '''Next meeting''': 23th of January, 2009 at Barcamp Zagreb, FER, Unska 3, 10000 Zagreb &lt;br /&gt;
&lt;br /&gt;
==== Croatia OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:vlatko.kosturjak@owasp.org Vlatko Kosturjak]&lt;br /&gt;
&lt;br /&gt;
Educational leader: [mailto:tonimir.kisasondi@owasp.org Tonimir Kisasondi]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tonimir_Kisasondi&amp;diff=114076</id>
		<title>User:Tonimir Kisasondi</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tonimir_Kisasondi&amp;diff=114076"/>
				<updated>2011-07-18T08:57:59Z</updated>
		
		<summary type="html">&lt;p&gt;Tonimir Kisasondi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Tonimir Kišasondi, MSc, EUCIP&lt;br /&gt;
&lt;br /&gt;
Junior Researcher @ Faculty of organization and informatics, Varazdin ([http://www.foi.hr http://www.foi.hr])&lt;br /&gt;
&lt;br /&gt;
OWASP educational leader, Croatia @ FOI&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Page: [http://www.foi.hr/djelatnici/tonimir.kisasondi/(language)/cro-HR http://www.foi.hr/djelatnici/tonimir.kisasondi/(language)/cro-HR]&lt;br /&gt;
&lt;br /&gt;
Twitter: [http://twitter.com/#!/kisasondi http://twitter.com/#!/kisasondi]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
pgp: 0x00C68442&lt;br /&gt;
&lt;br /&gt;
pgpid: 77FCA8315CE34BCFB1C01B0CF1D9B3A200C68442&lt;/div&gt;</summary>
		<author><name>Tonimir Kisasondi</name></author>	</entry>

	</feed>