<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zakiakhmad</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zakiakhmad"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Zakiakhmad"/>
		<updated>2026-05-01T12:49:09Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_PHP_Security_Project&amp;diff=169117</id>
		<title>OWASP PHP Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_PHP_Security_Project&amp;diff=169117"/>
				<updated>2014-02-28T07:41:26Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Major Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
[[File:Small-phpsec.png]]&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP PHP Security Project==&lt;br /&gt;
OWASP PHP Security Project is an effort by a group of PHP developers in securing PHP web applications, using a collection of decoupled flexible secure PHP libraries, as well as a collection of PHP tools.&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owasp/phpsec/ GitHub Repo]&lt;br /&gt;
&lt;br /&gt;
==What is PHPSEC?==&lt;br /&gt;
On top of a collcetion of libraries and tools, PHPSEC contains a sample framework to demonstrate proper usage of the tools and libraries, as well as guidelining new PHP projects. It can also be easily merged with existing PHP code, because it is both decoupled and flexible. Proper usage of PHPSEC will result in the target system being much more secure.&lt;br /&gt;
&lt;br /&gt;
==Why PHPSEC?==&lt;br /&gt;
PHPSEC is suitable for three group of developers:&lt;br /&gt;
&lt;br /&gt;
* Framework Developers can use the libraries and tools to strengthen their framework security&lt;br /&gt;
* PHP Application Developers can use the library and tools to enhance their application security&lt;br /&gt;
* New PHP Developers can use the tools and libraries to create secure applications from scratch&lt;br /&gt;
&lt;br /&gt;
==Project leader==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Abbas_Naderi Abbas Naderi]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Major Contributors==&lt;br /&gt;
*Rahul Chaudhary&lt;br /&gt;
*Abhishek Das&lt;br /&gt;
*Shivam Dixit&lt;br /&gt;
*Achim&lt;br /&gt;
*[[User:Zakiakhmad|Zaki Akhmad]]&lt;br /&gt;
*Minhaz&lt;br /&gt;
*Paulo Guerreiro&lt;br /&gt;
&lt;br /&gt;
==Libraries Offered==&lt;br /&gt;
* Basic Password Library&lt;br /&gt;
* Advance Password Library&lt;br /&gt;
* User Library and Management&lt;br /&gt;
* Crypto Library&lt;br /&gt;
* Password Library&lt;br /&gt;
* Database Library&lt;br /&gt;
* Download Manager Library&lt;br /&gt;
* HTTP Library&lt;br /&gt;
* Tainted Library&lt;br /&gt;
* Logs Library&lt;br /&gt;
* Session Library&lt;br /&gt;
* Core Library&lt;br /&gt;
* Scanner Tool&lt;br /&gt;
&lt;br /&gt;
==Tools Offered==&lt;br /&gt;
* XSS Resolver&lt;br /&gt;
* SQL Injection Detector&lt;br /&gt;
* Taint Tracker&lt;br /&gt;
&lt;br /&gt;
==Damages Mitigated==&lt;br /&gt;
* Brute Force Attacks&lt;br /&gt;
* Cross-site Scripting(XSS) Attacks&lt;br /&gt;
* SQL Injection Attacks&lt;br /&gt;
* Session Fixation, Session Hijacking, Session Guessing&lt;br /&gt;
* Encrypting sensitive information in configuration files&lt;br /&gt;
* Replacement of native PHP's faulty functions&lt;br /&gt;
* A secure PRNG (Pseudorandom number generator)&lt;br /&gt;
* Secure implementation of &amp;quot;remember-me&amp;quot; and &amp;quot;temporary password&amp;quot; features&lt;br /&gt;
* Capability to mark/disallow suspicious strings&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://github.com/OWASP/phpsec/archive/master.zip OWASP PHPSec project] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Website ==&lt;br /&gt;
&lt;br /&gt;
http://phpsec.owasp.org/&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[http://appsecusa2013.sched.org/event/4a0421d19aad48a7fbe35ec97899936c#.UoI2Jfmfhv8 Visit us at OWASP APPSEC conference November 2013]&lt;br /&gt;
==Classifications==&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_PHP_Security_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&amp;diff=161172</id>
		<title>OWASP Vulnerable Web Applications Directory Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&amp;diff=161172"/>
				<updated>2013-10-21T08:00:12Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Others */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vulnerable Web Applications Directory Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Select from the above tabs to view all of the:&lt;br /&gt;
* On-Line applications&lt;br /&gt;
* Off-Line applications&lt;br /&gt;
* Virtual Machines and ISO images&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Vulnerable Web Applications Directory (VWAD) Project is a comprehensive and well maintained registry of all known vulnerable web applications currently available. These vulnerable web applications can be used by web developers, security auditors and penetration testers to put in practice their knowledge and skills during training sessions (and especially afterwards), as well as to test at any time the multiple hacking tools and offensive techniques available, in preparation for their next real-world engagement.&lt;br /&gt;
&lt;br /&gt;
The main goal of VWAD is to provide a list of vulnerable web applications available to security professionals for hacking and offensive activities, so that they can attack realistic web environments... without going to jail :)&lt;br /&gt;
&lt;br /&gt;
The vulnerable web applications have been classified in three categories: On-Line, Off-Line, and VMs/ISOs. Each list has been ordered alphabetically.&lt;br /&gt;
&lt;br /&gt;
An initial list that inspired this project was maintained till the end on 2013 at: http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vulnerable Web Applications Directory Projects is free to use. It is licensed under the Apache 2.0 License, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is VWAD? ==&lt;br /&gt;
&lt;br /&gt;
OWASP VWAD provides:&lt;br /&gt;
&lt;br /&gt;
* A list of all known vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Interview with [http://trustedsoftwarealliance.com/2013/10/18/simon-bennetts-the-owasp-web-applications-vulnerability-project/ Simon Bennetts – The OWASP Web Applications Vulnerability Project ].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:raul@raulsiles.com Raul Siles]&lt;br /&gt;
*[[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* N/A - The project is self contained on the wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [16 Oct 2013] Project created.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=On-Line apps=&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://testphp.vulnweb.com Acuart]&lt;br /&gt;
| PHP&lt;br /&gt;
| Acunetix&lt;br /&gt;
| Art shopping&lt;br /&gt;
|-&lt;br /&gt;
| [http://testaspnet.vulnweb.com/ Acublog]&lt;br /&gt;
| .NET&lt;br /&gt;
| Acunetix&lt;br /&gt;
| Blog&lt;br /&gt;
|-&lt;br /&gt;
| [http://testasp.vulnweb.com/ Acuforum]&lt;br /&gt;
| ASP&lt;br /&gt;
| Acunetix&lt;br /&gt;
| Forum&lt;br /&gt;
|-&lt;br /&gt;
| [http://demo.testfire.net/ Altoro Mutual]&lt;br /&gt;
|&lt;br /&gt;
| IBM/Watchfire&lt;br /&gt;
| (jsmith/Demo1234)&lt;br /&gt;
|-&lt;br /&gt;
| [http://crackme.cenzic.com/ Crack Me Bank] &lt;br /&gt;
|&lt;br /&gt;
| Cenzic&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://enigmagroup.org/ Enigma Group]&lt;br /&gt;
|&lt;br /&gt;
| Enigma Group&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere]&lt;br /&gt;
| Python&lt;br /&gt;
| Google&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://hackademic1.teilar.gr Hackademic Challenges Project]&lt;br /&gt;
| PHP - Joomla&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://pctechtips.org/hacker-challenge-pwn3d-the-login-form/ Hacker Challenge]&lt;br /&gt;
|&lt;br /&gt;
| PCTechtips&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.hacking-lab.com/events/registerform.html?eventid=245 Hacking Lab]&lt;br /&gt;
|&lt;br /&gt;
| Hacking Lab&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://hack.me Hack.me]&lt;br /&gt;
|&lt;br /&gt;
| eLearnSecurity&lt;br /&gt;
| Beta&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.hackthissite.org HackThisSite]&lt;br /&gt;
| &lt;br /&gt;
| HackThisSite&lt;br /&gt;
| Basic &amp;amp; Realistic (web) Missions&lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| First 2 levels online (algo/smurf), rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [http://pentesteracademylab.appspot.com Pentester Academy]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://vicnum.ciphertechs.com Vicnum Project]&lt;br /&gt;
| Perl &amp;amp; PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.webscantest.com Web Scanner Test Site]&lt;br /&gt;
|&lt;br /&gt;
| NTOSpider&lt;br /&gt;
| (testuser/testpass)&lt;br /&gt;
|-&lt;br /&gt;
| [http://blasze.com/xsstestsuite/ XSS Test Suite]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://zero.webappsecurity.com/ Zero Bank]&lt;br /&gt;
|&lt;br /&gt;
| HP/SpiDynamics&lt;br /&gt;
| (admin/admin)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
= Off-Line apps =&lt;br /&gt;
&lt;br /&gt;
Vulnerable applications that have to be downloaded and used locally:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download] &lt;br /&gt;
|&lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
|  &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download] &lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download] &lt;br /&gt;
| Secure Ideas&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download] &lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://code.google.com/p/owasp-hackademic-challenges/ download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download] &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://owasp.codeplex.com/ .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://owasp.codeplex.com/SourceControl/list/changesets# download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
|&lt;br /&gt;
| Stanford&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download] &lt;br /&gt;
| Stanford&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository] &lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wavsep/ Wavsep - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/wavsep/downloads/list download] [https://code.google.com/p/wavsep/downloads/list docs] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://owasp.codeplex.com/ WebGoat.NET]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://owasp.codeplex.com/SourceControl/list/changesets# download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests] &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following apps are quite old and appear not to be maintained - as such they are probably less useful.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mavensecurity.com/webmaven WebMaven/Buggy Bank]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project Insecure Web App Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://sourceforge.net/projects/insecurewebapp/files/ download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Owasp_SiteGenerator SiteGenerator]&lt;br /&gt;
| ASP.NET&lt;br /&gt;
|&lt;br /&gt;
| OWASP&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Virtual Machines or ISOs =&lt;br /&gt;
&lt;br /&gt;
VMs which contain multiple vulnerable applications:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore ]&lt;br /&gt;
| ISO&lt;br /&gt;
| [http://www.badstore.net/register.htm download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/bee-box/ Bee-Box ]&lt;br /&gt;
| bWAPP VMware&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/owaspbwa/wiki/ProjectSummary Broken Web Applications Project (BWA) ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://code.google.com/p/owaspbwa/wiki/Downloads download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://bechtsoudis.com/work-stuff/challenges/drunk-admin-web-hacking-challenge/ Drunk Admin Web Hacking Challenge ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://bechtsoudis.com/data/challenges/drunk_admin_hacking_challenge.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/projects/vuln-web-app/ Exploit.co.il Vuln Web App ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/exploitcoilvuln/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/ GameOver ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl Hackxor ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/hackxor/files/ download] [http://hackxor.sourceforge.net/cgi-bin/hints.pl hints&amp;amp;amp;tips] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://ninja-sec.com/index.php/hacme-bank-prebuilt-vmware-image-ninja-sec-com/ Hacme Bank Prebuilt&amp;amp;nbsp;VM ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://dc121.4shared.com/download/wwPhUxMQ/hackme_bank_vm_Ninja-Sec.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.kioptrix.com/blog/?p=604 Kioptrix4 ]&lt;br /&gt;
| VMware &amp;amp;amp; Hyper-V&lt;br /&gt;
| [http://www.kioptrix.com/dlvm/Kioptrix4_vmware.rar download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LAMPSecurity ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/files/ download] [http://sourceforge.net/projects/lampsecurity/files/Documentation/ doc] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://blog.metasploit.com/2010/05/introducing-metasploitable.html Metasploitable ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://updates.metasploit.com/data/Metasploitable.zip.torrent download] [http://www.metasploit.com/learn-more/how-do-i-use-it/test-lab.jsp doc] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://community.rapid7.com/docs/DOC-1875 Metasploitable 2 ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [https://sourceforge.net/projects/metasploitable/files/Metasploitable2/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bonsai-sec.com/en/research/moth.php Moth ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/w3af/files/moth/moth/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.pentesterlab.com/exercises/ PentesterLab&amp;amp;nbsp;- The Exercises ]&lt;br /&gt;
| ISO &amp;amp;amp; PDF&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://phdays.blogspot.com.es/2012/05/once-again-about-remote-banking.html PHDays I-Bank ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://downloads.phdays.com/phdays_ibank_vm.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.samurai-wtf.org/ Samurai WTF ]&lt;br /&gt;
| ISO - list&lt;br /&gt;
| [http://sourceforge.net/projects/samurai/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sg6-labs.blogspot.com/2007/12/secgame-1-sauron.html Sauron&amp;amp;nbsp;]&lt;br /&gt;
| Quemu&lt;br /&gt;
| [http://sg6-labs.blogspot.com/search/label/SecGame solutions] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/ Virtual Hacking Lab ]&lt;br /&gt;
| ZIP&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mavensecurity.com/web_security_dojo/ Web Security Dojo ]&lt;br /&gt;
| VMware, VirtualBox&lt;br /&gt;
| [http://sourceforge.net/projects/websecuritydojo/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
The following apps are quite old and appear not to be maintained - as such they are probably less useful.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.metasploit.com/learn-more/how-do-i-use-it/test-lab.jsp UltimateLAMP ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://ronaldbradford.com/tmp/UltimateLAMP-0.2.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
VWAD is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
*[mailto:raul@raulsiles.com Raul Siles]&lt;br /&gt;
*[[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* [[User:Zakiakhmad|Zaki Akhmad]]&lt;br /&gt;
&lt;br /&gt;
==On-line resources used==&lt;br /&gt;
* [http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html Hacking Vulnerable Web Applications Without Going To Jail]&lt;br /&gt;
* [http://securitythoughts.wordpress.com/2010/03/22/vulnerable-web-applications-for-learning/ Vulnerable Web Applications for learning]&lt;br /&gt;
* [http://code.google.com/p/owaspbwa/wiki/UserGuide OWASP BWA User Guide]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of October 15, 2013, the priorities are:&lt;br /&gt;
* Document all known Vulnerable Web Applications &lt;br /&gt;
* Publicise&lt;br /&gt;
* Keep up to date &lt;br /&gt;
* Please add a more robust/descriptive roadmap. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Vulnerable Web Applications Directory Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Update the wiki with any missing apps&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vulnerable_Web_Applications_Directory_Project}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&amp;diff=161171</id>
		<title>OWASP Vulnerable Web Applications Directory Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&amp;diff=161171"/>
				<updated>2013-10-21T07:47:25Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Others */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vulnerable Web Applications Directory Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Select from the above tabs to view all of the:&lt;br /&gt;
* On-Line applications&lt;br /&gt;
* Off-Line applications&lt;br /&gt;
* Virtual Machines and ISO images&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Vulnerable Web Applications Directory (VWAD) Project is a comprehensive and well maintained registry of all known vulnerable web applications currently available. These vulnerable web applications can be used by web developers, security auditors and penetration testers to put in practice their knowledge and skills during training sessions (and especially afterwards), as well as to test at any time the multiple hacking tools and offensive techniques available, in preparation for their next real-world engagement.&lt;br /&gt;
&lt;br /&gt;
The main goal of VWAD is to provide a list of vulnerable web applications available to security professionals for hacking and offensive activities, so that they can attack realistic web environments... without going to jail :)&lt;br /&gt;
&lt;br /&gt;
The vulnerable web applications have been classified in three categories: On-Line, Off-Line, and VMs/ISOs. Each list has been ordered alphabetically.&lt;br /&gt;
&lt;br /&gt;
An initial list that inspired this project was maintained till the end on 2013 at: http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vulnerable Web Applications Directory Projects is free to use. It is licensed under the Apache 2.0 License, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is VWAD? ==&lt;br /&gt;
&lt;br /&gt;
OWASP VWAD provides:&lt;br /&gt;
&lt;br /&gt;
* A list of all known vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Interview with [http://trustedsoftwarealliance.com/2013/10/18/simon-bennetts-the-owasp-web-applications-vulnerability-project/ Simon Bennetts – The OWASP Web Applications Vulnerability Project ].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:raul@raulsiles.com Raul Siles]&lt;br /&gt;
*[[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* N/A - The project is self contained on the wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [16 Oct 2013] Project created.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=On-Line apps=&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://testphp.vulnweb.com Acuart]&lt;br /&gt;
| PHP&lt;br /&gt;
| Acunetix&lt;br /&gt;
| Art shopping&lt;br /&gt;
|-&lt;br /&gt;
| [http://testaspnet.vulnweb.com/ Acublog]&lt;br /&gt;
| .NET&lt;br /&gt;
| Acunetix&lt;br /&gt;
| Blog&lt;br /&gt;
|-&lt;br /&gt;
| [http://testasp.vulnweb.com/ Acuforum]&lt;br /&gt;
| ASP&lt;br /&gt;
| Acunetix&lt;br /&gt;
| Forum&lt;br /&gt;
|-&lt;br /&gt;
| [http://demo.testfire.net/ Altoro Mutual]&lt;br /&gt;
|&lt;br /&gt;
| IBM/Watchfire&lt;br /&gt;
| (jsmith/Demo1234)&lt;br /&gt;
|-&lt;br /&gt;
| [http://crackme.cenzic.com/ Crack Me Bank] &lt;br /&gt;
|&lt;br /&gt;
| Cenzic&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://enigmagroup.org/ Enigma Group]&lt;br /&gt;
|&lt;br /&gt;
| Enigma Group&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere]&lt;br /&gt;
| Python&lt;br /&gt;
| Google&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://hackademic1.teilar.gr Hackademic Challenges Project]&lt;br /&gt;
| PHP - Joomla&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://pctechtips.org/hacker-challenge-pwn3d-the-login-form/ Hacker Challenge]&lt;br /&gt;
|&lt;br /&gt;
| PCTechtips&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.hacking-lab.com/events/registerform.html?eventid=245 Hacking Lab]&lt;br /&gt;
|&lt;br /&gt;
| Hacking Lab&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://hack.me Hack.me]&lt;br /&gt;
|&lt;br /&gt;
| eLearnSecurity&lt;br /&gt;
| Beta&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.hackthissite.org HackThisSite]&lt;br /&gt;
| &lt;br /&gt;
| HackThisSite&lt;br /&gt;
| Basic &amp;amp; Realistic (web) Missions&lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| First 2 levels online (algo/smurf), rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [http://pentesteracademylab.appspot.com Pentester Academy]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://vicnum.ciphertechs.com Vicnum Project]&lt;br /&gt;
| Perl &amp;amp; PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.webscantest.com Web Scanner Test Site]&lt;br /&gt;
|&lt;br /&gt;
| NTOSpider&lt;br /&gt;
| (testuser/testpass)&lt;br /&gt;
|-&lt;br /&gt;
| [http://blasze.com/xsstestsuite/ XSS Test Suite]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://zero.webappsecurity.com/ Zero Bank]&lt;br /&gt;
|&lt;br /&gt;
| HP/SpiDynamics&lt;br /&gt;
| (admin/admin)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
= Off-Line apps =&lt;br /&gt;
&lt;br /&gt;
Vulnerable applications that have to be downloaded and used locally:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download] &lt;br /&gt;
|&lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
|  &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download] &lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download] &lt;br /&gt;
| Secure Ideas&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download] &lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://code.google.com/p/owasp-hackademic-challenges/ download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download] &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://owasp.codeplex.com/ .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://owasp.codeplex.com/SourceControl/list/changesets# download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
|&lt;br /&gt;
| Stanford&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download] &lt;br /&gt;
| Stanford&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository] &lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wavsep/ Wavsep - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/wavsep/downloads/list download] [https://code.google.com/p/wavsep/downloads/list docs] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://owasp.codeplex.com/ WebGoat.NET]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://owasp.codeplex.com/SourceControl/list/changesets# download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests] &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following apps are quite old and appear not to be maintained - as such they are probably less useful.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mavensecurity.com/webmaven WebMaven/Buggy Bank]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project Insecure Web App Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://sourceforge.net/projects/insecurewebapp/files/ download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Owasp_SiteGenerator SiteGenerator]&lt;br /&gt;
| ASP.NET&lt;br /&gt;
|&lt;br /&gt;
| OWASP&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Virtual Machines or ISOs =&lt;br /&gt;
&lt;br /&gt;
VMs which contain multiple vulnerable applications:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore ]&lt;br /&gt;
| ISO&lt;br /&gt;
| [http://www.badstore.net/register.htm download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/bee-box/ Bee-Box ]&lt;br /&gt;
| bWAPP VMware&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/owaspbwa/wiki/ProjectSummary Broken Web Applications Project (BWA) ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://code.google.com/p/owaspbwa/wiki/Downloads download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://bechtsoudis.com/work-stuff/challenges/drunk-admin-web-hacking-challenge/ Drunk Admin Web Hacking Challenge ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://bechtsoudis.com/data/challenges/drunk_admin_hacking_challenge.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/projects/vuln-web-app/ Exploit.co.il Vuln Web App ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/exploitcoilvuln/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/ GameOver ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl Hackxor ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/hackxor/files/ download] [http://hackxor.sourceforge.net/cgi-bin/hints.pl hints&amp;amp;amp;tips] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://ninja-sec.com/index.php/hacme-bank-prebuilt-vmware-image-ninja-sec-com/ Hacme Bank Prebuilt&amp;amp;nbsp;VM ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://dc121.4shared.com/download/wwPhUxMQ/hackme_bank_vm_Ninja-Sec.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.kioptrix.com/blog/?p=604 Kioptrix4 ]&lt;br /&gt;
| VMware &amp;amp;amp; Hyper-V&lt;br /&gt;
| [http://www.kioptrix.com/dlvm/Kioptrix4_vmware.rar download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LAMPSecurity ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/files/ download] [http://sourceforge.net/projects/lampsecurity/files/Documentation/ doc] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://blog.metasploit.com/2010/05/introducing-metasploitable.html Metasploitable ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://updates.metasploit.com/data/Metasploitable.zip.torrent download] [http://www.metasploit.com/learn-more/how-do-i-use-it/test-lab.jsp doc] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://community.rapid7.com/docs/DOC-1875 Metasploitable 2 ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [https://sourceforge.net/projects/metasploitable/files/Metasploitable2/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bonsai-sec.com/en/research/moth.php Moth ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/w3af/files/moth/moth/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.pentesterlab.com/exercises/ PentesterLab&amp;amp;nbsp;- The Exercises ]&lt;br /&gt;
| ISO &amp;amp;amp; PDF&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://phdays.blogspot.com.es/2012/05/once-again-about-remote-banking.html PHDays I-Bank ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://downloads.phdays.com/phdays_ibank_vm.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.samurai-wtf.org/ Samurai WTF ]&lt;br /&gt;
| ISO - list&lt;br /&gt;
| [http://sourceforge.net/projects/samurai/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sg6-labs.blogspot.com/2007/12/secgame-1-sauron.html Sauron&amp;amp;nbsp;]&lt;br /&gt;
| Quemu&lt;br /&gt;
| [http://sg6-labs.blogspot.com/search/label/SecGame solutions] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/ Virtual Hacking Lab ]&lt;br /&gt;
| ZIP&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mavensecurity.com/web_security_dojo/ Web Security Dojo ]&lt;br /&gt;
| VMware, VirtualBox&lt;br /&gt;
| [http://sourceforge.net/projects/websecuritydojo/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
The following apps are quite old and appear not to be maintained - as such they are probably less useful.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.metasploit.com/learn-more/how-do-i-use-it/test-lab.jsp UltimateLAMP ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://ronaldbradford.com/tmp/UltimateLAMP-0.2.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
VWAD is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
*[mailto:raul@raulsiles.com Raul Siles]&lt;br /&gt;
*[[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* [[User:Zakiakhmad]]&lt;br /&gt;
&lt;br /&gt;
==On-line resources used==&lt;br /&gt;
* [http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html Hacking Vulnerable Web Applications Without Going To Jail]&lt;br /&gt;
* [http://securitythoughts.wordpress.com/2010/03/22/vulnerable-web-applications-for-learning/ Vulnerable Web Applications for learning]&lt;br /&gt;
* [http://code.google.com/p/owaspbwa/wiki/UserGuide OWASP BWA User Guide]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of October 15, 2013, the priorities are:&lt;br /&gt;
* Document all known Vulnerable Web Applications &lt;br /&gt;
* Publicise&lt;br /&gt;
* Keep up to date &lt;br /&gt;
* Please add a more robust/descriptive roadmap. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Vulnerable Web Applications Directory Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Update the wiki with any missing apps&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vulnerable_Web_Applications_Directory_Project}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&amp;diff=161170</id>
		<title>OWASP Vulnerable Web Applications Directory Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&amp;diff=161170"/>
				<updated>2013-10-21T07:46:00Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Off-Line apps */ add twitterlike application which has sqli vulnerability&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vulnerable Web Applications Directory Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Select from the above tabs to view all of the:&lt;br /&gt;
* On-Line applications&lt;br /&gt;
* Off-Line applications&lt;br /&gt;
* Virtual Machines and ISO images&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Vulnerable Web Applications Directory (VWAD) Project is a comprehensive and well maintained registry of all known vulnerable web applications currently available. These vulnerable web applications can be used by web developers, security auditors and penetration testers to put in practice their knowledge and skills during training sessions (and especially afterwards), as well as to test at any time the multiple hacking tools and offensive techniques available, in preparation for their next real-world engagement.&lt;br /&gt;
&lt;br /&gt;
The main goal of VWAD is to provide a list of vulnerable web applications available to security professionals for hacking and offensive activities, so that they can attack realistic web environments... without going to jail :)&lt;br /&gt;
&lt;br /&gt;
The vulnerable web applications have been classified in three categories: On-Line, Off-Line, and VMs/ISOs. Each list has been ordered alphabetically.&lt;br /&gt;
&lt;br /&gt;
An initial list that inspired this project was maintained till the end on 2013 at: http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vulnerable Web Applications Directory Projects is free to use. It is licensed under the Apache 2.0 License, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is VWAD? ==&lt;br /&gt;
&lt;br /&gt;
OWASP VWAD provides:&lt;br /&gt;
&lt;br /&gt;
* A list of all known vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Interview with [http://trustedsoftwarealliance.com/2013/10/18/simon-bennetts-the-owasp-web-applications-vulnerability-project/ Simon Bennetts – The OWASP Web Applications Vulnerability Project ].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:raul@raulsiles.com Raul Siles]&lt;br /&gt;
*[[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* N/A - The project is self contained on the wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [16 Oct 2013] Project created.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
N/A&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=:Category:OWASP_Project#tab=Terminology]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=Breakers]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=On-Line apps=&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://testphp.vulnweb.com Acuart]&lt;br /&gt;
| PHP&lt;br /&gt;
| Acunetix&lt;br /&gt;
| Art shopping&lt;br /&gt;
|-&lt;br /&gt;
| [http://testaspnet.vulnweb.com/ Acublog]&lt;br /&gt;
| .NET&lt;br /&gt;
| Acunetix&lt;br /&gt;
| Blog&lt;br /&gt;
|-&lt;br /&gt;
| [http://testasp.vulnweb.com/ Acuforum]&lt;br /&gt;
| ASP&lt;br /&gt;
| Acunetix&lt;br /&gt;
| Forum&lt;br /&gt;
|-&lt;br /&gt;
| [http://demo.testfire.net/ Altoro Mutual]&lt;br /&gt;
|&lt;br /&gt;
| IBM/Watchfire&lt;br /&gt;
| (jsmith/Demo1234)&lt;br /&gt;
|-&lt;br /&gt;
| [http://crackme.cenzic.com/ Crack Me Bank] &lt;br /&gt;
|&lt;br /&gt;
| Cenzic&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://enigmagroup.org/ Enigma Group]&lt;br /&gt;
|&lt;br /&gt;
| Enigma Group&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere]&lt;br /&gt;
| Python&lt;br /&gt;
| Google&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://hackademic1.teilar.gr Hackademic Challenges Project]&lt;br /&gt;
| PHP - Joomla&lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://pctechtips.org/hacker-challenge-pwn3d-the-login-form/ Hacker Challenge]&lt;br /&gt;
|&lt;br /&gt;
| PCTechtips&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.hacking-lab.com/events/registerform.html?eventid=245 Hacking Lab]&lt;br /&gt;
|&lt;br /&gt;
| Hacking Lab&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://hack.me Hack.me]&lt;br /&gt;
|&lt;br /&gt;
| eLearnSecurity&lt;br /&gt;
| Beta&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.hackthissite.org HackThisSite]&lt;br /&gt;
| &lt;br /&gt;
| HackThisSite&lt;br /&gt;
| Basic &amp;amp; Realistic (web) Missions&lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| First 2 levels online (algo/smurf), rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [http://pentesteracademylab.appspot.com Pentester Academy]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://vicnum.ciphertechs.com Vicnum Project]&lt;br /&gt;
| Perl &amp;amp; PHP&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.webscantest.com Web Scanner Test Site]&lt;br /&gt;
|&lt;br /&gt;
| NTOSpider&lt;br /&gt;
| (testuser/testpass)&lt;br /&gt;
|-&lt;br /&gt;
| [http://blasze.com/xsstestsuite/ XSS Test Suite]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://zero.webappsecurity.com/ Zero Bank]&lt;br /&gt;
|&lt;br /&gt;
| HP/SpiDynamics&lt;br /&gt;
| (admin/admin)&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
= Off-Line apps =&lt;br /&gt;
&lt;br /&gt;
Vulnerable applications that have to be downloaded and used locally:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore]&lt;br /&gt;
| Perl(CGI)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/bodgeit/ BodgeIt Store ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/bodgeit/downloads/list download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sechow.com/bricks/index.html Bricks ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sechow.com/bricks/download.html download] [http://sechow.com/bricks/docs/ docs] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ Butterfly Security Project]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/thebutterflytmp/files/ download] &lt;br /&gt;
|&lt;br /&gt;
| Last updated in 2008&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.itsecgames.com/ bWAPP ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/ download] [http://itsecgames.blogspot.be/2013/01/bwapp-installation.html docs] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/fridaygoldsmith/bwa_cyclone_transfers Cyclone Transfers ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
|  &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.dvwa.co.uk/ Damn Vulnerable Web Application - DVWA ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://code.google.com/p/dvwa/downloads/list download] &lt;br /&gt;
| RandomStorm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://dvws.secureideas.net/ Damn Vulnerable Web Services - DVWS ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://dvws.secureideas.net/downloads/files/dvws.tgz download] &lt;br /&gt;
| Secure Ideas&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://google-gruyere.appspot.com/ Gruyere ]&lt;br /&gt;
| Python&lt;br /&gt;
| [http://google-gruyere.appspot.com/gruyere-code.zip download] &lt;br /&gt;
| Google&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges Project ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://code.google.com/p/owasp-hackademic-challenges/ download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx Hacme Bank - Android]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| McAfee / Foundstone&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx Hacme Bank ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-bank.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx Hacme Books ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmebooks.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx Hacme Casino ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacme-casino.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx Hacme Shipping ]&lt;br /&gt;
| ColdFusion&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmeshipping.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx Hacme Travel ]&lt;br /&gt;
| C++&lt;br /&gt;
| [http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-tools/hacmetravel.aspx download] &lt;br /&gt;
| McAfee / Foundstone &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl hackxor]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| First 2 levels online, rest offline&lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LampSecurity]&lt;br /&gt;
| PHP&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10 Mutillidae ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://www.irongeek.com/mutillidae/ download] &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://owasp.codeplex.com/ .NET Goat ]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://owasp.codeplex.com/SourceControl/list/changesets# download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://peruggia.sourceforge.net/ Peruggia ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [http://sourceforge.net/projects/peruggia/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/ Puzzlemall ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/puzzlemall/downloads/list download] [https://code.google.com/p/puzzlemall/downloads/list docs] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/OWASP_Rails_Goat_Project Rails Goat ]&lt;br /&gt;
| Ruby on Rails&lt;br /&gt;
| [https://github.com/OWASP/railsgoat/archive/master.zip download] [http://railsgoat.cktricky.com/getting_started.html docs] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/securibench/ SecuriBench]&lt;br /&gt;
| Java&lt;br /&gt;
|&lt;br /&gt;
| Stanford&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://suif.stanford.edu/%7Elivshits/work/securibench-micro/ SecuriBench Micro]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://suif.stanford.edu/~livshits/securibench/download.html download] &lt;br /&gt;
| Stanford&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs SQLI-labs]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/Audi-1/sqli-labs/archive/master.zip download] [http://dummy2dummies.blogspot.com/ blog] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol SQLol ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/SpiderLabs/SQLol/archive/master.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/sakti/twitterlike twitterlike ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/sakti/twitterlike git repository] &lt;br /&gt;
| Sakti Dwi Cahyono&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.nth-dimension.org.uk/blog.php?id=88 VulnApp ]&lt;br /&gt;
| .NET&lt;br /&gt;
| [http://projects.nth-dimension.org.uk/dir?d=VulnApp CVS download] [http://projects.nth-dimension.org.uk/rptview?rn=6 vulns] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/hacking/exploit-kb-vulnerable-web-app/ Vulnerable Web App]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| Exploit.co.il&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko WackoPicko ]&lt;br /&gt;
| PHP&lt;br /&gt;
| [https://github.com/adamdoupe/WackoPicko/zipball/master download] [http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf whitepaper] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wavsep/ Wavsep - Web Application Vulnerability Scanner Evaluation Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [https://code.google.com/p/wavsep/downloads/list download] [https://code.google.com/p/wavsep/downloads/list docs] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://code.google.com/p/webgoat/downloads/list download] [https://www.owasp.org/index.php/WebGoat_User_and_Install_Guide_Table_of_Contents guide] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://owasp.codeplex.com/ WebGoat.NET]&lt;br /&gt;
| C#&lt;br /&gt;
| [https://owasp.codeplex.com/SourceControl/list/changesets# download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://code.google.com/p/wivet/ WIVET&amp;amp;nbsp;- Web Input Vector Extractor Teaser]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.webguvenligi.org/projeler/wivet download] [https://code.google.com/p/wivet/downloads/list?can=1&amp;amp;amp;q= tests] &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following apps are quite old and appear not to be maintained - as such they are probably less useful.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mavensecurity.com/webmaven WebMaven/Buggy Bank]&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project Insecure Web App Project ]&lt;br /&gt;
| Java&lt;br /&gt;
| [http://sourceforge.net/projects/insecurewebapp/files/ download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Owasp_SiteGenerator SiteGenerator]&lt;br /&gt;
| ASP.NET&lt;br /&gt;
|&lt;br /&gt;
| OWASP&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Virtual Machines or ISOs =&lt;br /&gt;
&lt;br /&gt;
VMs which contain multiple vulnerable applications:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.badstore.net/ BadStore ]&lt;br /&gt;
| ISO&lt;br /&gt;
| [http://www.badstore.net/register.htm download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/bwapp/files/bee-box/ Bee-Box ]&lt;br /&gt;
| bWAPP VMware&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://code.google.com/p/owaspbwa/wiki/ProjectSummary Broken Web Applications Project (BWA) ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://code.google.com/p/owaspbwa/wiki/Downloads download] &lt;br /&gt;
| OWASP&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://bechtsoudis.com/work-stuff/challenges/drunk-admin-web-hacking-challenge/ Drunk Admin Web Hacking Challenge ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://bechtsoudis.com/data/challenges/drunk_admin_hacking_challenge.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://exploit.co.il/projects/vuln-web-app/ Exploit.co.il Vuln Web App ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/exploitcoilvuln/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/ GameOver ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/null-gameover/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://hackxor.sourceforge.net/cgi-bin/index.pl Hackxor ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/hackxor/files/ download] [http://hackxor.sourceforge.net/cgi-bin/hints.pl hints&amp;amp;amp;tips] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://ninja-sec.com/index.php/hacme-bank-prebuilt-vmware-image-ninja-sec-com/ Hacme Bank Prebuilt&amp;amp;nbsp;VM ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://dc121.4shared.com/download/wwPhUxMQ/hackme_bank_vm_Ninja-Sec.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.kioptrix.com/blog/?p=604 Kioptrix4 ]&lt;br /&gt;
| VMware &amp;amp;amp; Hyper-V&lt;br /&gt;
| [http://www.kioptrix.com/dlvm/Kioptrix4_vmware.rar download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/ LAMPSecurity ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/lampsecurity/files/ download] [http://sourceforge.net/projects/lampsecurity/files/Documentation/ doc] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://blog.metasploit.com/2010/05/introducing-metasploitable.html Metasploitable ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://updates.metasploit.com/data/Metasploitable.zip.torrent download] [http://www.metasploit.com/learn-more/how-do-i-use-it/test-lab.jsp doc] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://community.rapid7.com/docs/DOC-1875 Metasploitable 2 ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [https://sourceforge.net/projects/metasploitable/files/Metasploitable2/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bonsai-sec.com/en/research/moth.php Moth ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://sourceforge.net/projects/w3af/files/moth/moth/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [https://www.pentesterlab.com/exercises/ PentesterLab&amp;amp;nbsp;- The Exercises ]&lt;br /&gt;
| ISO &amp;amp;amp; PDF&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://phdays.blogspot.com.es/2012/05/once-again-about-remote-banking.html PHDays I-Bank ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://downloads.phdays.com/phdays_ibank_vm.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.samurai-wtf.org/ Samurai WTF ]&lt;br /&gt;
| ISO - list&lt;br /&gt;
| [http://sourceforge.net/projects/samurai/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sg6-labs.blogspot.com/2007/12/secgame-1-sauron.html Sauron&amp;amp;nbsp;]&lt;br /&gt;
| Quemu&lt;br /&gt;
| [http://sg6-labs.blogspot.com/search/label/SecGame solutions] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/ Virtual Hacking Lab ]&lt;br /&gt;
| ZIP&lt;br /&gt;
| [http://sourceforge.net/projects/virtualhacking/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.mavensecurity.com/web_security_dojo/ Web Security Dojo ]&lt;br /&gt;
| VMware, VirtualBox&lt;br /&gt;
| [http://sourceforge.net/projects/websecuritydojo/files/ download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.&lt;br /&gt;
&lt;br /&gt;
The following apps are quite old and appear not to be maintained - as such they are probably less useful.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | App Name / Link&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Technology&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Other links&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Author&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.metasploit.com/learn-more/how-do-i-use-it/test-lab.jsp UltimateLAMP ]&lt;br /&gt;
| VMware&lt;br /&gt;
| [http://ronaldbradford.com/tmp/UltimateLAMP-0.2.zip download] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
VWAD is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
*[mailto:raul@raulsiles.com Raul Siles]&lt;br /&gt;
*[[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
==On-line resources used==&lt;br /&gt;
* [http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html Hacking Vulnerable Web Applications Without Going To Jail]&lt;br /&gt;
* [http://securitythoughts.wordpress.com/2010/03/22/vulnerable-web-applications-for-learning/ Vulnerable Web Applications for learning]&lt;br /&gt;
* [http://code.google.com/p/owaspbwa/wiki/UserGuide OWASP BWA User Guide]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of October 15, 2013, the priorities are:&lt;br /&gt;
* Document all known Vulnerable Web Applications &lt;br /&gt;
* Publicise&lt;br /&gt;
* Keep up to date &lt;br /&gt;
* Please add a more robust/descriptive roadmap. &lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Vulnerable Web Applications Directory Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Update the wiki with any missing apps&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vulnerable_Web_Applications_Directory_Project}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156881</id>
		<title>OWASP Code Review V2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156881"/>
				<updated>2013-08-16T08:25:26Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* CodeIgniter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= '''OWASP Code Review Guide v2.0:''' =&lt;br /&gt;
&lt;br /&gt;
==Forward==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Guide_History]]&lt;br /&gt;
'''[[CRV2_Forward|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
== Code Review Guide Introduction==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Introduction]]&lt;br /&gt;
'''[[CRV2_Introduction|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== What is source code review and Static Analysis ===&lt;br /&gt;
=== What is Code Review ===&lt;br /&gt;
# Author - Zyad Mghazli&lt;br /&gt;
# New Section&lt;br /&gt;
''' [[CRV2_WhatIsCodeReview|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== Manual Review - Pros and Cons ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# Suggestion: Benchmark of different Stataic Analysis Tools  Zyad Mghazli&lt;br /&gt;
# [[CRV2_ManualReviewProsCons|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Advantages of Code Review to Development Practices ===&lt;br /&gt;
# Author - Gary David Robinson&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_AdvantagesToDevPractices|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Why code review ===&lt;br /&gt;
==== Scope and Objective of secure code review ====&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# [[CRV2_WhyCodeReview|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== We can't hack ourselves secure ===&lt;br /&gt;
# Author - Prathamesh Mhatre&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CantHackSecure|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== 360 Review: Coupling source code review and Testing / Hybrid Reviews===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_360Review|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Can static code analyzers do it all? ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CanStaticAnalyzersDoAll|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Methodology=&lt;br /&gt;
===The code review approach===&lt;br /&gt;
#Author -  Prathamesh Mhatre&lt;br /&gt;
# [[CRV2_CodeReviewApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
==== Preparation and context ====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Preparation]]&lt;br /&gt;
# [[CRV2_PrepContext|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Application Threat Modeling====&lt;br /&gt;
#Author - Andy, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/OCRG1.1:Application_Threat_Modeling]]&lt;br /&gt;
# [[CRV2_AppThreatModeling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Understanding Code layout/Design/Architecture====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_CodeLayoutDesignArch|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===SDLC Integration===&lt;br /&gt;
#Author - Andy, Ashish Rao&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Security_Code_Review_in_the_SDLC]]&lt;br /&gt;
# [[CRV2_SDLCInt|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Deployment Models====&lt;br /&gt;
=====Secure deployment configurations=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_SecDepConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
# New Section&lt;br /&gt;
=====Metrics and code review=====&lt;br /&gt;
#Author - Andy&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Metrics]]&lt;br /&gt;
# [[CRV2_MetricsCodeRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Source and sink reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SourceSinkRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review Coverage=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
#Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Coverage]]&lt;br /&gt;
# [[CRV2_CodeRevCoverage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Design Reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
*Why to review design?&lt;br /&gt;
**Building security in design - secure by design principle&lt;br /&gt;
**Design Areas to be reviewed&lt;br /&gt;
**Common Design Flaws&lt;br /&gt;
# [[CRV2_DesignRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====A Risk based approach to code review=====&lt;br /&gt;
#Author - Renchie Joan&lt;br /&gt;
#New Section&lt;br /&gt;
*&amp;quot;Doing things right or doing the right things...&amp;quot;&lt;br /&gt;
**&amp;quot;Not all bugs are equal&lt;br /&gt;
# [[CRV2_RiskBasedApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Crawling code====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Crawling_Code]]&lt;br /&gt;
*API of Interest:&lt;br /&gt;
**Java&lt;br /&gt;
**.NET&lt;br /&gt;
**PHP&lt;br /&gt;
**RUBY&lt;br /&gt;
*Frameworks:&lt;br /&gt;
**Spring&lt;br /&gt;
**.NET MVC&lt;br /&gt;
**Structs&lt;br /&gt;
**Zend&lt;br /&gt;
#New Section&lt;br /&gt;
*Searching for code in C/C++&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
&lt;br /&gt;
# [[CRV2_CrawlingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Code reviews and Compliance====&lt;br /&gt;
#Author -Manual Harti&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Reviews_and_Compliance]]&lt;br /&gt;
# [[CRV2_CodeRevCompliance|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Technical Control=&lt;br /&gt;
===Reviewing code for Authentication controls===&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_AuthControls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Forgot password====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ForgotPassword|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Authentication====&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_Authentication|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CAPTCHA====&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
'''[[CRV2_CAPTCHA|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
====Out of Band considerations====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authentication]]&lt;br /&gt;
# [[CRV2_OutofBand|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code Authorization weakness===&lt;br /&gt;
#Author Ashish Rao (Eoin Keary .NET MVC added)&lt;br /&gt;
# [[CRV2_AuthorizationWeaknesses|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Checking authz upon every request====&lt;br /&gt;
#Author - Abbas Naderi, Joan Renchie&lt;br /&gt;
# [[CRV2_CheckAuthzEachRequest|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reducing the attack surface====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authorization]]&lt;br /&gt;
# [[CRV2_ReducingAttSurf|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====SSL/TLS Implementations====&lt;br /&gt;
#Author - Eoin Keary&lt;br /&gt;
# [[CRV2_SSL-TLS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for Session handling====&lt;br /&gt;
#Author - Palak Gohil, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Session-Management]]&lt;br /&gt;
# [[CRV2_SessionHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing client side code====&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_ClientSideCodeIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJScript|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JSON=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeJSon|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Content Security Policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeContSecPolicy|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====&amp;quot;Jacking&amp;quot;/Framing=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJackingFraming|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML 5?=====&lt;br /&gt;
#Author - Sebastien Gioria&lt;br /&gt;
# [[CRV2_ClientSideCodeHTML5|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Browser Defenses policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeBrowserDefPol|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====etc...=====&lt;br /&gt;
&lt;br /&gt;
====Review code for input validation====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_InputValIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Regex Gotchas=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_InputValRegexGotchas|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====ESAPI=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# Internal Link: [[https://www.owasp.org/index.php/Codereview-Input_Validation]]&lt;br /&gt;
# [[CRV2_InputValESAPI|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for contextual encoding====&lt;br /&gt;
=====HTML Attribute=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLAttribute|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML Entity=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLEntity|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript Parameters=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ContextEncJscriptParams|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JQuery=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ContextEncJQuery|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing file and resource handling code====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FileResourceHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Resource Exhaustion - error handling====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionErrHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====native calls=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionNativeCalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Logging code - Detective Security====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
* Where to Log&lt;br /&gt;
* What to log&lt;br /&gt;
* What not to log&lt;br /&gt;
* How to log&lt;br /&gt;
# Internal link: [[https://www.owasp.org/index.php/Logging_Cheat_Sheet]]&lt;br /&gt;
# [[CRV2_LoggingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Error handling and Error messages====&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Error-Handling]]&lt;br /&gt;
# [[CRV2_ErrorHandlingMessages|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Security alerts====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecurityAlerts|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Review for active defense====&lt;br /&gt;
#Author - Colin Watson&lt;br /&gt;
# [[CRV2_ActiveDefense|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Secure Storage====&lt;br /&gt;
#Author - Azzeddine Ramrami&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SecureStorage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Salting - When, How and Where====&lt;br /&gt;
=====Encrpyption=====&lt;br /&gt;
======.NET======&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Cryptographic_Controls]]&lt;br /&gt;
*''Can we talk about key storage as well i.e. key management for encryption techniques used in the application? - Ashish Rao''&lt;br /&gt;
'''[[CRV2_HashingandSaltingdotNet|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Vulnerability=&lt;br /&gt;
===Review Code for XSS===&lt;br /&gt;
#Author Palak Gohil, Anand Prakash (Examples added by Eoin Keary)&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Scripting]]&lt;br /&gt;
# In reviewing code for XSS - we can give more patterns on &amp;quot;source to sink&amp;quot; patterns for ASP.NET wrf to difference versions and mechanisms to display data in a page - Ashish Rao&lt;br /&gt;
# [[CRV2_RevCodeXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Persistent - The Anti pattern===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan, Larry Conklin&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reflected - The Anti pattern===&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Stored - The Anti pattern===&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatterndotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===DOM XSS ===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
# [[CRV2_DOMXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===JQuery mistakes===&lt;br /&gt;
#Author Shenal Silva&lt;br /&gt;
# [[CRV2_JQueryMistakes|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for SQL Injection===&lt;br /&gt;
#Author Palak Gohil, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_SQL_Injection]]&lt;br /&gt;
# [[CRV2_RevCodeSQLInjection|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjdotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HQL====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjHQL|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===The Anti pattern===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
#[[CRV2_AntiPattern| Content here]]&lt;br /&gt;
https://www.owasp.org/index.php/CRV2_AntiPattern&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_AntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
#=&amp;gt; Searching for traditional SQL,JPA,JPSQL,Criteria,...&lt;br /&gt;
# [[CRV2_AntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan,Larry Conklin&lt;br /&gt;
# [[CRV2_AntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Cold Fusion====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternColdFusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for CSRF Issues===&lt;br /&gt;
#Author Palak Gohil,Anand Prakash, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Request_Forgery]]&lt;br /&gt;
# [[CRV2_CSRFIssues|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Transactional logic / Non idempotent functions / State Changing Functions===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_TransLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for poor logic /Business logic/Complex authorization===&lt;br /&gt;
#Author - Sam Denard&lt;br /&gt;
# [[CRV2_PoorLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing Secure Communications===&lt;br /&gt;
====.NET Config====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_SecCommsdotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Spring Config====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecCommsSpringConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HTTP Headers====&lt;br /&gt;
#Author Gregory Disney, Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====CSP=====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrsCSP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HSTS=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHSTS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Tech-Stack pitfalls===&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_TechStackPitfalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Framework specific Issues===&lt;br /&gt;
====Spring====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesSpring|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Structs====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesStructs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Drupal====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDurpal|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby on Rails====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesROR|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Django====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDjango|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET Security / MVC====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesdotNetMVC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Security in ASP.NET applications====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Strongly Named Assemblies=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetStrongAssembiles|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======Round Tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRT|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======How to prevent Round tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRTPrevention|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Setting the right Configurations=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetConfigs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Authentication Options=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetAuth|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code Review for Managed Code - .Net 1.0 and up=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetManagedCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Using OWASP Top 10 as your guideline=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPTop10|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review for Unsafe Code (C#)=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetUnsafeCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP Specific Issues====&lt;br /&gt;
#Author Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Classic ASP====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPClassic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C#====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCsharp|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C/C++====&lt;br /&gt;
#Author Gary David Robinson&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCplusplus|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Objective C====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesObectiveC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Android====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesAndroid|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Coldfusion====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesColdfusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CodeIgniter====&lt;br /&gt;
&lt;br /&gt;
# Author [[User:Zakiakhmad]]&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCodeIgniter|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Security code review for Agile development=&lt;br /&gt;
#Author Carlos Pantelides&lt;br /&gt;
# [[CRV2_CodeReviewAgile|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Willing to review drafts=&lt;br /&gt;
#Terry Nerpester&lt;br /&gt;
#Larry Conklin&lt;br /&gt;
#Gary David Robinson&lt;br /&gt;
#Simon Whittaker&lt;br /&gt;
#Jason Johnson&lt;br /&gt;
#Carlos Pantelides&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156880</id>
		<title>OWASP Code Review V2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156880"/>
				<updated>2013-08-16T08:24:57Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* CodeIgniter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= '''OWASP Code Review Guide v2.0:''' =&lt;br /&gt;
&lt;br /&gt;
==Forward==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Guide_History]]&lt;br /&gt;
'''[[CRV2_Forward|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
== Code Review Guide Introduction==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Introduction]]&lt;br /&gt;
'''[[CRV2_Introduction|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== What is source code review and Static Analysis ===&lt;br /&gt;
=== What is Code Review ===&lt;br /&gt;
# Author - Zyad Mghazli&lt;br /&gt;
# New Section&lt;br /&gt;
''' [[CRV2_WhatIsCodeReview|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== Manual Review - Pros and Cons ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# Suggestion: Benchmark of different Stataic Analysis Tools  Zyad Mghazli&lt;br /&gt;
# [[CRV2_ManualReviewProsCons|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Advantages of Code Review to Development Practices ===&lt;br /&gt;
# Author - Gary David Robinson&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_AdvantagesToDevPractices|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Why code review ===&lt;br /&gt;
==== Scope and Objective of secure code review ====&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# [[CRV2_WhyCodeReview|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== We can't hack ourselves secure ===&lt;br /&gt;
# Author - Prathamesh Mhatre&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CantHackSecure|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== 360 Review: Coupling source code review and Testing / Hybrid Reviews===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_360Review|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Can static code analyzers do it all? ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CanStaticAnalyzersDoAll|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Methodology=&lt;br /&gt;
===The code review approach===&lt;br /&gt;
#Author -  Prathamesh Mhatre&lt;br /&gt;
# [[CRV2_CodeReviewApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
==== Preparation and context ====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Preparation]]&lt;br /&gt;
# [[CRV2_PrepContext|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Application Threat Modeling====&lt;br /&gt;
#Author - Andy, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/OCRG1.1:Application_Threat_Modeling]]&lt;br /&gt;
# [[CRV2_AppThreatModeling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Understanding Code layout/Design/Architecture====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_CodeLayoutDesignArch|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===SDLC Integration===&lt;br /&gt;
#Author - Andy, Ashish Rao&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Security_Code_Review_in_the_SDLC]]&lt;br /&gt;
# [[CRV2_SDLCInt|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Deployment Models====&lt;br /&gt;
=====Secure deployment configurations=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_SecDepConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
# New Section&lt;br /&gt;
=====Metrics and code review=====&lt;br /&gt;
#Author - Andy&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Metrics]]&lt;br /&gt;
# [[CRV2_MetricsCodeRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Source and sink reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SourceSinkRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review Coverage=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
#Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Coverage]]&lt;br /&gt;
# [[CRV2_CodeRevCoverage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Design Reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
*Why to review design?&lt;br /&gt;
**Building security in design - secure by design principle&lt;br /&gt;
**Design Areas to be reviewed&lt;br /&gt;
**Common Design Flaws&lt;br /&gt;
# [[CRV2_DesignRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====A Risk based approach to code review=====&lt;br /&gt;
#Author - Renchie Joan&lt;br /&gt;
#New Section&lt;br /&gt;
*&amp;quot;Doing things right or doing the right things...&amp;quot;&lt;br /&gt;
**&amp;quot;Not all bugs are equal&lt;br /&gt;
# [[CRV2_RiskBasedApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Crawling code====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Crawling_Code]]&lt;br /&gt;
*API of Interest:&lt;br /&gt;
**Java&lt;br /&gt;
**.NET&lt;br /&gt;
**PHP&lt;br /&gt;
**RUBY&lt;br /&gt;
*Frameworks:&lt;br /&gt;
**Spring&lt;br /&gt;
**.NET MVC&lt;br /&gt;
**Structs&lt;br /&gt;
**Zend&lt;br /&gt;
#New Section&lt;br /&gt;
*Searching for code in C/C++&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
&lt;br /&gt;
# [[CRV2_CrawlingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Code reviews and Compliance====&lt;br /&gt;
#Author -Manual Harti&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Reviews_and_Compliance]]&lt;br /&gt;
# [[CRV2_CodeRevCompliance|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Technical Control=&lt;br /&gt;
===Reviewing code for Authentication controls===&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_AuthControls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Forgot password====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ForgotPassword|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Authentication====&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_Authentication|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CAPTCHA====&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
'''[[CRV2_CAPTCHA|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
====Out of Band considerations====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authentication]]&lt;br /&gt;
# [[CRV2_OutofBand|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code Authorization weakness===&lt;br /&gt;
#Author Ashish Rao (Eoin Keary .NET MVC added)&lt;br /&gt;
# [[CRV2_AuthorizationWeaknesses|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Checking authz upon every request====&lt;br /&gt;
#Author - Abbas Naderi, Joan Renchie&lt;br /&gt;
# [[CRV2_CheckAuthzEachRequest|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reducing the attack surface====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authorization]]&lt;br /&gt;
# [[CRV2_ReducingAttSurf|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====SSL/TLS Implementations====&lt;br /&gt;
#Author - Eoin Keary&lt;br /&gt;
# [[CRV2_SSL-TLS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for Session handling====&lt;br /&gt;
#Author - Palak Gohil, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Session-Management]]&lt;br /&gt;
# [[CRV2_SessionHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing client side code====&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_ClientSideCodeIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJScript|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JSON=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeJSon|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Content Security Policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeContSecPolicy|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====&amp;quot;Jacking&amp;quot;/Framing=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJackingFraming|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML 5?=====&lt;br /&gt;
#Author - Sebastien Gioria&lt;br /&gt;
# [[CRV2_ClientSideCodeHTML5|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Browser Defenses policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeBrowserDefPol|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====etc...=====&lt;br /&gt;
&lt;br /&gt;
====Review code for input validation====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_InputValIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Regex Gotchas=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_InputValRegexGotchas|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====ESAPI=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# Internal Link: [[https://www.owasp.org/index.php/Codereview-Input_Validation]]&lt;br /&gt;
# [[CRV2_InputValESAPI|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for contextual encoding====&lt;br /&gt;
=====HTML Attribute=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLAttribute|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML Entity=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLEntity|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript Parameters=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ContextEncJscriptParams|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JQuery=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ContextEncJQuery|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing file and resource handling code====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FileResourceHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Resource Exhaustion - error handling====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionErrHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====native calls=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionNativeCalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Logging code - Detective Security====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
* Where to Log&lt;br /&gt;
* What to log&lt;br /&gt;
* What not to log&lt;br /&gt;
* How to log&lt;br /&gt;
# Internal link: [[https://www.owasp.org/index.php/Logging_Cheat_Sheet]]&lt;br /&gt;
# [[CRV2_LoggingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Error handling and Error messages====&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Error-Handling]]&lt;br /&gt;
# [[CRV2_ErrorHandlingMessages|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Security alerts====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecurityAlerts|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Review for active defense====&lt;br /&gt;
#Author - Colin Watson&lt;br /&gt;
# [[CRV2_ActiveDefense|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Secure Storage====&lt;br /&gt;
#Author - Azzeddine Ramrami&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SecureStorage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Salting - When, How and Where====&lt;br /&gt;
=====Encrpyption=====&lt;br /&gt;
======.NET======&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Cryptographic_Controls]]&lt;br /&gt;
*''Can we talk about key storage as well i.e. key management for encryption techniques used in the application? - Ashish Rao''&lt;br /&gt;
'''[[CRV2_HashingandSaltingdotNet|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Vulnerability=&lt;br /&gt;
===Review Code for XSS===&lt;br /&gt;
#Author Palak Gohil, Anand Prakash (Examples added by Eoin Keary)&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Scripting]]&lt;br /&gt;
# In reviewing code for XSS - we can give more patterns on &amp;quot;source to sink&amp;quot; patterns for ASP.NET wrf to difference versions and mechanisms to display data in a page - Ashish Rao&lt;br /&gt;
# [[CRV2_RevCodeXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Persistent - The Anti pattern===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan, Larry Conklin&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reflected - The Anti pattern===&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Stored - The Anti pattern===&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatterndotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===DOM XSS ===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
# [[CRV2_DOMXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===JQuery mistakes===&lt;br /&gt;
#Author Shenal Silva&lt;br /&gt;
# [[CRV2_JQueryMistakes|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for SQL Injection===&lt;br /&gt;
#Author Palak Gohil, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_SQL_Injection]]&lt;br /&gt;
# [[CRV2_RevCodeSQLInjection|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjdotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HQL====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjHQL|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===The Anti pattern===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
#[[CRV2_AntiPattern| Content here]]&lt;br /&gt;
https://www.owasp.org/index.php/CRV2_AntiPattern&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_AntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
#=&amp;gt; Searching for traditional SQL,JPA,JPSQL,Criteria,...&lt;br /&gt;
# [[CRV2_AntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan,Larry Conklin&lt;br /&gt;
# [[CRV2_AntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Cold Fusion====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternColdFusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for CSRF Issues===&lt;br /&gt;
#Author Palak Gohil,Anand Prakash, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Request_Forgery]]&lt;br /&gt;
# [[CRV2_CSRFIssues|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Transactional logic / Non idempotent functions / State Changing Functions===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_TransLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for poor logic /Business logic/Complex authorization===&lt;br /&gt;
#Author - Sam Denard&lt;br /&gt;
# [[CRV2_PoorLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing Secure Communications===&lt;br /&gt;
====.NET Config====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_SecCommsdotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Spring Config====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecCommsSpringConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HTTP Headers====&lt;br /&gt;
#Author Gregory Disney, Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====CSP=====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrsCSP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HSTS=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHSTS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Tech-Stack pitfalls===&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_TechStackPitfalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Framework specific Issues===&lt;br /&gt;
====Spring====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesSpring|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Structs====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesStructs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Drupal====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDurpal|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby on Rails====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesROR|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Django====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDjango|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET Security / MVC====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesdotNetMVC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Security in ASP.NET applications====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Strongly Named Assemblies=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetStrongAssembiles|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======Round Tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRT|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======How to prevent Round tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRTPrevention|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Setting the right Configurations=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetConfigs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Authentication Options=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetAuth|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code Review for Managed Code - .Net 1.0 and up=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetManagedCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Using OWASP Top 10 as your guideline=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPTop10|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review for Unsafe Code (C#)=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetUnsafeCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP Specific Issues====&lt;br /&gt;
#Author Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Classic ASP====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPClassic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C#====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCsharp|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C/C++====&lt;br /&gt;
#Author Gary David Robinson&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCplusplus|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Objective C====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesObectiveC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Android====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesAndroid|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Coldfusion====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesColdfusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CodeIgniter====&lt;br /&gt;
&lt;br /&gt;
# Author [[User:Zakiakhmad]]&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCodeIgniter]]|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Security code review for Agile development=&lt;br /&gt;
#Author Carlos Pantelides&lt;br /&gt;
# [[CRV2_CodeReviewAgile|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Willing to review drafts=&lt;br /&gt;
#Terry Nerpester&lt;br /&gt;
#Larry Conklin&lt;br /&gt;
#Gary David Robinson&lt;br /&gt;
#Simon Whittaker&lt;br /&gt;
#Jason Johnson&lt;br /&gt;
#Carlos Pantelides&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156879</id>
		<title>OWASP Code Review V2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156879"/>
				<updated>2013-08-16T08:24:31Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* CodeIgniter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= '''OWASP Code Review Guide v2.0:''' =&lt;br /&gt;
&lt;br /&gt;
==Forward==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Guide_History]]&lt;br /&gt;
'''[[CRV2_Forward|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
== Code Review Guide Introduction==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Introduction]]&lt;br /&gt;
'''[[CRV2_Introduction|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== What is source code review and Static Analysis ===&lt;br /&gt;
=== What is Code Review ===&lt;br /&gt;
# Author - Zyad Mghazli&lt;br /&gt;
# New Section&lt;br /&gt;
''' [[CRV2_WhatIsCodeReview|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== Manual Review - Pros and Cons ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# Suggestion: Benchmark of different Stataic Analysis Tools  Zyad Mghazli&lt;br /&gt;
# [[CRV2_ManualReviewProsCons|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Advantages of Code Review to Development Practices ===&lt;br /&gt;
# Author - Gary David Robinson&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_AdvantagesToDevPractices|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Why code review ===&lt;br /&gt;
==== Scope and Objective of secure code review ====&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# [[CRV2_WhyCodeReview|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== We can't hack ourselves secure ===&lt;br /&gt;
# Author - Prathamesh Mhatre&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CantHackSecure|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== 360 Review: Coupling source code review and Testing / Hybrid Reviews===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_360Review|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Can static code analyzers do it all? ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CanStaticAnalyzersDoAll|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Methodology=&lt;br /&gt;
===The code review approach===&lt;br /&gt;
#Author -  Prathamesh Mhatre&lt;br /&gt;
# [[CRV2_CodeReviewApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
==== Preparation and context ====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Preparation]]&lt;br /&gt;
# [[CRV2_PrepContext|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Application Threat Modeling====&lt;br /&gt;
#Author - Andy, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/OCRG1.1:Application_Threat_Modeling]]&lt;br /&gt;
# [[CRV2_AppThreatModeling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Understanding Code layout/Design/Architecture====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_CodeLayoutDesignArch|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===SDLC Integration===&lt;br /&gt;
#Author - Andy, Ashish Rao&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Security_Code_Review_in_the_SDLC]]&lt;br /&gt;
# [[CRV2_SDLCInt|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Deployment Models====&lt;br /&gt;
=====Secure deployment configurations=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_SecDepConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
# New Section&lt;br /&gt;
=====Metrics and code review=====&lt;br /&gt;
#Author - Andy&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Metrics]]&lt;br /&gt;
# [[CRV2_MetricsCodeRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Source and sink reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SourceSinkRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review Coverage=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
#Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Coverage]]&lt;br /&gt;
# [[CRV2_CodeRevCoverage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Design Reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
*Why to review design?&lt;br /&gt;
**Building security in design - secure by design principle&lt;br /&gt;
**Design Areas to be reviewed&lt;br /&gt;
**Common Design Flaws&lt;br /&gt;
# [[CRV2_DesignRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====A Risk based approach to code review=====&lt;br /&gt;
#Author - Renchie Joan&lt;br /&gt;
#New Section&lt;br /&gt;
*&amp;quot;Doing things right or doing the right things...&amp;quot;&lt;br /&gt;
**&amp;quot;Not all bugs are equal&lt;br /&gt;
# [[CRV2_RiskBasedApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Crawling code====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Crawling_Code]]&lt;br /&gt;
*API of Interest:&lt;br /&gt;
**Java&lt;br /&gt;
**.NET&lt;br /&gt;
**PHP&lt;br /&gt;
**RUBY&lt;br /&gt;
*Frameworks:&lt;br /&gt;
**Spring&lt;br /&gt;
**.NET MVC&lt;br /&gt;
**Structs&lt;br /&gt;
**Zend&lt;br /&gt;
#New Section&lt;br /&gt;
*Searching for code in C/C++&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
&lt;br /&gt;
# [[CRV2_CrawlingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Code reviews and Compliance====&lt;br /&gt;
#Author -Manual Harti&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Reviews_and_Compliance]]&lt;br /&gt;
# [[CRV2_CodeRevCompliance|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Technical Control=&lt;br /&gt;
===Reviewing code for Authentication controls===&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_AuthControls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Forgot password====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ForgotPassword|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Authentication====&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_Authentication|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CAPTCHA====&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
'''[[CRV2_CAPTCHA|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
====Out of Band considerations====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authentication]]&lt;br /&gt;
# [[CRV2_OutofBand|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code Authorization weakness===&lt;br /&gt;
#Author Ashish Rao (Eoin Keary .NET MVC added)&lt;br /&gt;
# [[CRV2_AuthorizationWeaknesses|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Checking authz upon every request====&lt;br /&gt;
#Author - Abbas Naderi, Joan Renchie&lt;br /&gt;
# [[CRV2_CheckAuthzEachRequest|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reducing the attack surface====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authorization]]&lt;br /&gt;
# [[CRV2_ReducingAttSurf|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====SSL/TLS Implementations====&lt;br /&gt;
#Author - Eoin Keary&lt;br /&gt;
# [[CRV2_SSL-TLS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for Session handling====&lt;br /&gt;
#Author - Palak Gohil, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Session-Management]]&lt;br /&gt;
# [[CRV2_SessionHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing client side code====&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_ClientSideCodeIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJScript|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JSON=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeJSon|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Content Security Policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeContSecPolicy|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====&amp;quot;Jacking&amp;quot;/Framing=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJackingFraming|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML 5?=====&lt;br /&gt;
#Author - Sebastien Gioria&lt;br /&gt;
# [[CRV2_ClientSideCodeHTML5|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Browser Defenses policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeBrowserDefPol|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====etc...=====&lt;br /&gt;
&lt;br /&gt;
====Review code for input validation====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_InputValIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Regex Gotchas=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_InputValRegexGotchas|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====ESAPI=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# Internal Link: [[https://www.owasp.org/index.php/Codereview-Input_Validation]]&lt;br /&gt;
# [[CRV2_InputValESAPI|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for contextual encoding====&lt;br /&gt;
=====HTML Attribute=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLAttribute|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML Entity=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLEntity|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript Parameters=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ContextEncJscriptParams|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JQuery=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ContextEncJQuery|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing file and resource handling code====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FileResourceHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Resource Exhaustion - error handling====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionErrHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====native calls=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionNativeCalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Logging code - Detective Security====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
* Where to Log&lt;br /&gt;
* What to log&lt;br /&gt;
* What not to log&lt;br /&gt;
* How to log&lt;br /&gt;
# Internal link: [[https://www.owasp.org/index.php/Logging_Cheat_Sheet]]&lt;br /&gt;
# [[CRV2_LoggingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Error handling and Error messages====&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Error-Handling]]&lt;br /&gt;
# [[CRV2_ErrorHandlingMessages|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Security alerts====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecurityAlerts|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Review for active defense====&lt;br /&gt;
#Author - Colin Watson&lt;br /&gt;
# [[CRV2_ActiveDefense|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Secure Storage====&lt;br /&gt;
#Author - Azzeddine Ramrami&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SecureStorage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Salting - When, How and Where====&lt;br /&gt;
=====Encrpyption=====&lt;br /&gt;
======.NET======&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Cryptographic_Controls]]&lt;br /&gt;
*''Can we talk about key storage as well i.e. key management for encryption techniques used in the application? - Ashish Rao''&lt;br /&gt;
'''[[CRV2_HashingandSaltingdotNet|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Vulnerability=&lt;br /&gt;
===Review Code for XSS===&lt;br /&gt;
#Author Palak Gohil, Anand Prakash (Examples added by Eoin Keary)&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Scripting]]&lt;br /&gt;
# In reviewing code for XSS - we can give more patterns on &amp;quot;source to sink&amp;quot; patterns for ASP.NET wrf to difference versions and mechanisms to display data in a page - Ashish Rao&lt;br /&gt;
# [[CRV2_RevCodeXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Persistent - The Anti pattern===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan, Larry Conklin&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reflected - The Anti pattern===&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Stored - The Anti pattern===&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatterndotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===DOM XSS ===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
# [[CRV2_DOMXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===JQuery mistakes===&lt;br /&gt;
#Author Shenal Silva&lt;br /&gt;
# [[CRV2_JQueryMistakes|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for SQL Injection===&lt;br /&gt;
#Author Palak Gohil, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_SQL_Injection]]&lt;br /&gt;
# [[CRV2_RevCodeSQLInjection|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjdotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HQL====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjHQL|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===The Anti pattern===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
#[[CRV2_AntiPattern| Content here]]&lt;br /&gt;
https://www.owasp.org/index.php/CRV2_AntiPattern&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_AntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
#=&amp;gt; Searching for traditional SQL,JPA,JPSQL,Criteria,...&lt;br /&gt;
# [[CRV2_AntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan,Larry Conklin&lt;br /&gt;
# [[CRV2_AntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Cold Fusion====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternColdFusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for CSRF Issues===&lt;br /&gt;
#Author Palak Gohil,Anand Prakash, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Request_Forgery]]&lt;br /&gt;
# [[CRV2_CSRFIssues|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Transactional logic / Non idempotent functions / State Changing Functions===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_TransLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for poor logic /Business logic/Complex authorization===&lt;br /&gt;
#Author - Sam Denard&lt;br /&gt;
# [[CRV2_PoorLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing Secure Communications===&lt;br /&gt;
====.NET Config====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_SecCommsdotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Spring Config====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecCommsSpringConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HTTP Headers====&lt;br /&gt;
#Author Gregory Disney, Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====CSP=====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrsCSP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HSTS=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHSTS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Tech-Stack pitfalls===&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_TechStackPitfalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Framework specific Issues===&lt;br /&gt;
====Spring====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesSpring|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Structs====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesStructs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Drupal====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDurpal|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby on Rails====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesROR|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Django====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDjango|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET Security / MVC====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesdotNetMVC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Security in ASP.NET applications====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Strongly Named Assemblies=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetStrongAssembiles|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======Round Tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRT|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======How to prevent Round tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRTPrevention|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Setting the right Configurations=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetConfigs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Authentication Options=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetAuth|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code Review for Managed Code - .Net 1.0 and up=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetManagedCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Using OWASP Top 10 as your guideline=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPTop10|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review for Unsafe Code (C#)=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetUnsafeCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP Specific Issues====&lt;br /&gt;
#Author Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Classic ASP====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPClassic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C#====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCsharp|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C/C++====&lt;br /&gt;
#Author Gary David Robinson&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCplusplus|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Objective C====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesObectiveC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Android====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesAndroid|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Coldfusion====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesColdfusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CodeIgniter====&lt;br /&gt;
&lt;br /&gt;
# [[User:Zakiakhmad]]&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCodeIgniter]]|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Security code review for Agile development=&lt;br /&gt;
#Author Carlos Pantelides&lt;br /&gt;
# [[CRV2_CodeReviewAgile|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Willing to review drafts=&lt;br /&gt;
#Terry Nerpester&lt;br /&gt;
#Larry Conklin&lt;br /&gt;
#Gary David Robinson&lt;br /&gt;
#Simon Whittaker&lt;br /&gt;
#Jason Johnson&lt;br /&gt;
#Carlos Pantelides&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156878</id>
		<title>OWASP Code Review V2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156878"/>
				<updated>2013-08-16T08:23:59Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Coldfusion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= '''OWASP Code Review Guide v2.0:''' =&lt;br /&gt;
&lt;br /&gt;
==Forward==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Guide_History]]&lt;br /&gt;
'''[[CRV2_Forward|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
== Code Review Guide Introduction==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Introduction]]&lt;br /&gt;
'''[[CRV2_Introduction|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== What is source code review and Static Analysis ===&lt;br /&gt;
=== What is Code Review ===&lt;br /&gt;
# Author - Zyad Mghazli&lt;br /&gt;
# New Section&lt;br /&gt;
''' [[CRV2_WhatIsCodeReview|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== Manual Review - Pros and Cons ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# Suggestion: Benchmark of different Stataic Analysis Tools  Zyad Mghazli&lt;br /&gt;
# [[CRV2_ManualReviewProsCons|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Advantages of Code Review to Development Practices ===&lt;br /&gt;
# Author - Gary David Robinson&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_AdvantagesToDevPractices|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Why code review ===&lt;br /&gt;
==== Scope and Objective of secure code review ====&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# [[CRV2_WhyCodeReview|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== We can't hack ourselves secure ===&lt;br /&gt;
# Author - Prathamesh Mhatre&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CantHackSecure|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== 360 Review: Coupling source code review and Testing / Hybrid Reviews===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_360Review|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Can static code analyzers do it all? ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CanStaticAnalyzersDoAll|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Methodology=&lt;br /&gt;
===The code review approach===&lt;br /&gt;
#Author -  Prathamesh Mhatre&lt;br /&gt;
# [[CRV2_CodeReviewApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
==== Preparation and context ====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Preparation]]&lt;br /&gt;
# [[CRV2_PrepContext|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Application Threat Modeling====&lt;br /&gt;
#Author - Andy, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/OCRG1.1:Application_Threat_Modeling]]&lt;br /&gt;
# [[CRV2_AppThreatModeling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Understanding Code layout/Design/Architecture====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_CodeLayoutDesignArch|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===SDLC Integration===&lt;br /&gt;
#Author - Andy, Ashish Rao&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Security_Code_Review_in_the_SDLC]]&lt;br /&gt;
# [[CRV2_SDLCInt|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Deployment Models====&lt;br /&gt;
=====Secure deployment configurations=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_SecDepConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
# New Section&lt;br /&gt;
=====Metrics and code review=====&lt;br /&gt;
#Author - Andy&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Metrics]]&lt;br /&gt;
# [[CRV2_MetricsCodeRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Source and sink reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SourceSinkRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review Coverage=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
#Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Coverage]]&lt;br /&gt;
# [[CRV2_CodeRevCoverage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Design Reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
*Why to review design?&lt;br /&gt;
**Building security in design - secure by design principle&lt;br /&gt;
**Design Areas to be reviewed&lt;br /&gt;
**Common Design Flaws&lt;br /&gt;
# [[CRV2_DesignRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====A Risk based approach to code review=====&lt;br /&gt;
#Author - Renchie Joan&lt;br /&gt;
#New Section&lt;br /&gt;
*&amp;quot;Doing things right or doing the right things...&amp;quot;&lt;br /&gt;
**&amp;quot;Not all bugs are equal&lt;br /&gt;
# [[CRV2_RiskBasedApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Crawling code====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Crawling_Code]]&lt;br /&gt;
*API of Interest:&lt;br /&gt;
**Java&lt;br /&gt;
**.NET&lt;br /&gt;
**PHP&lt;br /&gt;
**RUBY&lt;br /&gt;
*Frameworks:&lt;br /&gt;
**Spring&lt;br /&gt;
**.NET MVC&lt;br /&gt;
**Structs&lt;br /&gt;
**Zend&lt;br /&gt;
#New Section&lt;br /&gt;
*Searching for code in C/C++&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
&lt;br /&gt;
# [[CRV2_CrawlingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Code reviews and Compliance====&lt;br /&gt;
#Author -Manual Harti&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Reviews_and_Compliance]]&lt;br /&gt;
# [[CRV2_CodeRevCompliance|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Technical Control=&lt;br /&gt;
===Reviewing code for Authentication controls===&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_AuthControls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Forgot password====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ForgotPassword|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Authentication====&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_Authentication|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CAPTCHA====&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
'''[[CRV2_CAPTCHA|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
====Out of Band considerations====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authentication]]&lt;br /&gt;
# [[CRV2_OutofBand|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code Authorization weakness===&lt;br /&gt;
#Author Ashish Rao (Eoin Keary .NET MVC added)&lt;br /&gt;
# [[CRV2_AuthorizationWeaknesses|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Checking authz upon every request====&lt;br /&gt;
#Author - Abbas Naderi, Joan Renchie&lt;br /&gt;
# [[CRV2_CheckAuthzEachRequest|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reducing the attack surface====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authorization]]&lt;br /&gt;
# [[CRV2_ReducingAttSurf|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====SSL/TLS Implementations====&lt;br /&gt;
#Author - Eoin Keary&lt;br /&gt;
# [[CRV2_SSL-TLS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for Session handling====&lt;br /&gt;
#Author - Palak Gohil, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Session-Management]]&lt;br /&gt;
# [[CRV2_SessionHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing client side code====&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_ClientSideCodeIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJScript|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JSON=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeJSon|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Content Security Policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeContSecPolicy|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====&amp;quot;Jacking&amp;quot;/Framing=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJackingFraming|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML 5?=====&lt;br /&gt;
#Author - Sebastien Gioria&lt;br /&gt;
# [[CRV2_ClientSideCodeHTML5|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Browser Defenses policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeBrowserDefPol|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====etc...=====&lt;br /&gt;
&lt;br /&gt;
====Review code for input validation====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_InputValIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Regex Gotchas=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_InputValRegexGotchas|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====ESAPI=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# Internal Link: [[https://www.owasp.org/index.php/Codereview-Input_Validation]]&lt;br /&gt;
# [[CRV2_InputValESAPI|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for contextual encoding====&lt;br /&gt;
=====HTML Attribute=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLAttribute|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML Entity=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLEntity|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript Parameters=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ContextEncJscriptParams|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JQuery=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ContextEncJQuery|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing file and resource handling code====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FileResourceHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Resource Exhaustion - error handling====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionErrHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====native calls=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionNativeCalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Logging code - Detective Security====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
* Where to Log&lt;br /&gt;
* What to log&lt;br /&gt;
* What not to log&lt;br /&gt;
* How to log&lt;br /&gt;
# Internal link: [[https://www.owasp.org/index.php/Logging_Cheat_Sheet]]&lt;br /&gt;
# [[CRV2_LoggingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Error handling and Error messages====&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Error-Handling]]&lt;br /&gt;
# [[CRV2_ErrorHandlingMessages|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Security alerts====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecurityAlerts|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Review for active defense====&lt;br /&gt;
#Author - Colin Watson&lt;br /&gt;
# [[CRV2_ActiveDefense|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Secure Storage====&lt;br /&gt;
#Author - Azzeddine Ramrami&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SecureStorage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Salting - When, How and Where====&lt;br /&gt;
=====Encrpyption=====&lt;br /&gt;
======.NET======&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Cryptographic_Controls]]&lt;br /&gt;
*''Can we talk about key storage as well i.e. key management for encryption techniques used in the application? - Ashish Rao''&lt;br /&gt;
'''[[CRV2_HashingandSaltingdotNet|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Vulnerability=&lt;br /&gt;
===Review Code for XSS===&lt;br /&gt;
#Author Palak Gohil, Anand Prakash (Examples added by Eoin Keary)&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Scripting]]&lt;br /&gt;
# In reviewing code for XSS - we can give more patterns on &amp;quot;source to sink&amp;quot; patterns for ASP.NET wrf to difference versions and mechanisms to display data in a page - Ashish Rao&lt;br /&gt;
# [[CRV2_RevCodeXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Persistent - The Anti pattern===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan, Larry Conklin&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reflected - The Anti pattern===&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Stored - The Anti pattern===&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatterndotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===DOM XSS ===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
# [[CRV2_DOMXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===JQuery mistakes===&lt;br /&gt;
#Author Shenal Silva&lt;br /&gt;
# [[CRV2_JQueryMistakes|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for SQL Injection===&lt;br /&gt;
#Author Palak Gohil, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_SQL_Injection]]&lt;br /&gt;
# [[CRV2_RevCodeSQLInjection|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjdotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HQL====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjHQL|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===The Anti pattern===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
#[[CRV2_AntiPattern| Content here]]&lt;br /&gt;
https://www.owasp.org/index.php/CRV2_AntiPattern&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_AntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
#=&amp;gt; Searching for traditional SQL,JPA,JPSQL,Criteria,...&lt;br /&gt;
# [[CRV2_AntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan,Larry Conklin&lt;br /&gt;
# [[CRV2_AntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Cold Fusion====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternColdFusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for CSRF Issues===&lt;br /&gt;
#Author Palak Gohil,Anand Prakash, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Request_Forgery]]&lt;br /&gt;
# [[CRV2_CSRFIssues|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Transactional logic / Non idempotent functions / State Changing Functions===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_TransLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for poor logic /Business logic/Complex authorization===&lt;br /&gt;
#Author - Sam Denard&lt;br /&gt;
# [[CRV2_PoorLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing Secure Communications===&lt;br /&gt;
====.NET Config====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_SecCommsdotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Spring Config====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecCommsSpringConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HTTP Headers====&lt;br /&gt;
#Author Gregory Disney, Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====CSP=====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrsCSP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HSTS=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHSTS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Tech-Stack pitfalls===&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_TechStackPitfalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Framework specific Issues===&lt;br /&gt;
====Spring====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesSpring|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Structs====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesStructs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Drupal====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDurpal|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby on Rails====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesROR|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Django====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDjango|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET Security / MVC====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesdotNetMVC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Security in ASP.NET applications====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Strongly Named Assemblies=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetStrongAssembiles|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======Round Tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRT|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======How to prevent Round tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRTPrevention|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Setting the right Configurations=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetConfigs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Authentication Options=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetAuth|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code Review for Managed Code - .Net 1.0 and up=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetManagedCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Using OWASP Top 10 as your guideline=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPTop10|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review for Unsafe Code (C#)=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetUnsafeCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP Specific Issues====&lt;br /&gt;
#Author Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Classic ASP====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPClassic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C#====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCsharp|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C/C++====&lt;br /&gt;
#Author Gary David Robinson&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCplusplus|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Objective C====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesObectiveC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Android====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesAndroid|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Coldfusion====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesColdfusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CodeIgniter====&lt;br /&gt;
&lt;br /&gt;
# [[Zakiakhmad]]&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCodeIgniter]]|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Security code review for Agile development=&lt;br /&gt;
#Author Carlos Pantelides&lt;br /&gt;
# [[CRV2_CodeReviewAgile|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Willing to review drafts=&lt;br /&gt;
#Terry Nerpester&lt;br /&gt;
#Larry Conklin&lt;br /&gt;
#Gary David Robinson&lt;br /&gt;
#Simon Whittaker&lt;br /&gt;
#Jason Johnson&lt;br /&gt;
#Carlos Pantelides&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156877</id>
		<title>OWASP Code Review V2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=156877"/>
				<updated>2013-08-16T08:06:46Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Reviewing by Techincal Control */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= '''OWASP Code Review Guide v2.0:''' =&lt;br /&gt;
&lt;br /&gt;
==Forward==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Guide_History]]&lt;br /&gt;
'''[[CRV2_Forward|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
== Code Review Guide Introduction==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Introduction]]&lt;br /&gt;
'''[[CRV2_Introduction|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== What is source code review and Static Analysis ===&lt;br /&gt;
=== What is Code Review ===&lt;br /&gt;
# Author - Zyad Mghazli&lt;br /&gt;
# New Section&lt;br /&gt;
''' [[CRV2_WhatIsCodeReview|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== Manual Review - Pros and Cons ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# Suggestion: Benchmark of different Stataic Analysis Tools  Zyad Mghazli&lt;br /&gt;
# [[CRV2_ManualReviewProsCons|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Advantages of Code Review to Development Practices ===&lt;br /&gt;
# Author - Gary David Robinson&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_AdvantagesToDevPractices|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Why code review ===&lt;br /&gt;
==== Scope and Objective of secure code review ====&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# [[CRV2_WhyCodeReview|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== We can't hack ourselves secure ===&lt;br /&gt;
# Author - Prathamesh Mhatre&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CantHackSecure|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== 360 Review: Coupling source code review and Testing / Hybrid Reviews===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_360Review|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Can static code analyzers do it all? ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CanStaticAnalyzersDoAll|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Methodology=&lt;br /&gt;
===The code review approach===&lt;br /&gt;
#Author -  Prathamesh Mhatre&lt;br /&gt;
# [[CRV2_CodeReviewApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
==== Preparation and context ====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Preparation]]&lt;br /&gt;
# [[CRV2_PrepContext|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Application Threat Modeling====&lt;br /&gt;
#Author - Andy, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/OCRG1.1:Application_Threat_Modeling]]&lt;br /&gt;
# [[CRV2_AppThreatModeling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Understanding Code layout/Design/Architecture====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_CodeLayoutDesignArch|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===SDLC Integration===&lt;br /&gt;
#Author - Andy, Ashish Rao&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Security_Code_Review_in_the_SDLC]]&lt;br /&gt;
# [[CRV2_SDLCInt|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Deployment Models====&lt;br /&gt;
=====Secure deployment configurations=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# [[CRV2_SecDepConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
# New Section&lt;br /&gt;
=====Metrics and code review=====&lt;br /&gt;
#Author - Andy&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Metrics]]&lt;br /&gt;
# [[CRV2_MetricsCodeRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Source and sink reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SourceSinkRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review Coverage=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
#Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Coverage]]&lt;br /&gt;
# [[CRV2_CodeRevCoverage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Design Reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
*Why to review design?&lt;br /&gt;
**Building security in design - secure by design principle&lt;br /&gt;
**Design Areas to be reviewed&lt;br /&gt;
**Common Design Flaws&lt;br /&gt;
# [[CRV2_DesignRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====A Risk based approach to code review=====&lt;br /&gt;
#Author - Renchie Joan&lt;br /&gt;
#New Section&lt;br /&gt;
*&amp;quot;Doing things right or doing the right things...&amp;quot;&lt;br /&gt;
**&amp;quot;Not all bugs are equal&lt;br /&gt;
# [[CRV2_RiskBasedApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Crawling code====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Crawling_Code]]&lt;br /&gt;
*API of Interest:&lt;br /&gt;
**Java&lt;br /&gt;
**.NET&lt;br /&gt;
**PHP&lt;br /&gt;
**RUBY&lt;br /&gt;
*Frameworks:&lt;br /&gt;
**Spring&lt;br /&gt;
**.NET MVC&lt;br /&gt;
**Structs&lt;br /&gt;
**Zend&lt;br /&gt;
#New Section&lt;br /&gt;
*Searching for code in C/C++&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
&lt;br /&gt;
# [[CRV2_CrawlingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Code reviews and Compliance====&lt;br /&gt;
#Author -Manual Harti&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Reviews_and_Compliance]]&lt;br /&gt;
# [[CRV2_CodeRevCompliance|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Technical Control=&lt;br /&gt;
===Reviewing code for Authentication controls===&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_AuthControls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Forgot password====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ForgotPassword|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Authentication====&lt;br /&gt;
#Author - Anand Prakash, Joan Renchie&lt;br /&gt;
# [[CRV2_Authentication|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CAPTCHA====&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
'''[[CRV2_CAPTCHA|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
====Out of Band considerations====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authentication]]&lt;br /&gt;
# [[CRV2_OutofBand|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code Authorization weakness===&lt;br /&gt;
#Author Ashish Rao (Eoin Keary .NET MVC added)&lt;br /&gt;
# [[CRV2_AuthorizationWeaknesses|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Checking authz upon every request====&lt;br /&gt;
#Author - Abbas Naderi, Joan Renchie&lt;br /&gt;
# [[CRV2_CheckAuthzEachRequest|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reducing the attack surface====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authorization]]&lt;br /&gt;
# [[CRV2_ReducingAttSurf|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====SSL/TLS Implementations====&lt;br /&gt;
#Author - Eoin Keary&lt;br /&gt;
# [[CRV2_SSL-TLS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for Session handling====&lt;br /&gt;
#Author - Palak Gohil, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Session-Management]]&lt;br /&gt;
# [[CRV2_SessionHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing client side code====&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_ClientSideCodeIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJScript|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JSON=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeJSon|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Content Security Policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeContSecPolicy|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====&amp;quot;Jacking&amp;quot;/Framing=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJackingFraming|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML 5?=====&lt;br /&gt;
#Author - Sebastien Gioria&lt;br /&gt;
# [[CRV2_ClientSideCodeHTML5|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Browser Defenses policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeBrowserDefPol|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====etc...=====&lt;br /&gt;
&lt;br /&gt;
====Review code for input validation====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_InputValIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Regex Gotchas=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_InputValRegexGotchas|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====ESAPI=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
#New Section&lt;br /&gt;
# Internal Link: [[https://www.owasp.org/index.php/Codereview-Input_Validation]]&lt;br /&gt;
# [[CRV2_InputValESAPI|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for contextual encoding====&lt;br /&gt;
=====HTML Attribute=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLAttribute|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML Entity=====&lt;br /&gt;
#Author - Shenai Silva&lt;br /&gt;
# [[CRV2_ContextEncHTMLEntity|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript Parameters=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ContextEncJscriptParams|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JQuery=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ContextEncJQuery|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing file and resource handling code====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FileResourceHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Resource Exhaustion - error handling====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionErrHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====native calls=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_ResourceExhaustionNativeCalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Logging code - Detective Security====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
* Where to Log&lt;br /&gt;
* What to log&lt;br /&gt;
* What not to log&lt;br /&gt;
* How to log&lt;br /&gt;
# Internal link: [[https://www.owasp.org/index.php/Logging_Cheat_Sheet]]&lt;br /&gt;
# [[CRV2_LoggingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Error handling and Error messages====&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Error-Handling]]&lt;br /&gt;
# [[CRV2_ErrorHandlingMessages|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Security alerts====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecurityAlerts|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Review for active defense====&lt;br /&gt;
#Author - Colin Watson&lt;br /&gt;
# [[CRV2_ActiveDefense|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Secure Storage====&lt;br /&gt;
#Author - Azzeddine Ramrami&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SecureStorage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Salting - When, How and Where====&lt;br /&gt;
=====Encrpyption=====&lt;br /&gt;
======.NET======&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Cryptographic_Controls]]&lt;br /&gt;
*''Can we talk about key storage as well i.e. key management for encryption techniques used in the application? - Ashish Rao''&lt;br /&gt;
'''[[CRV2_HashingandSaltingdotNet|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Vulnerability=&lt;br /&gt;
===Review Code for XSS===&lt;br /&gt;
#Author Palak Gohil, Anand Prakash (Examples added by Eoin Keary)&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Scripting]]&lt;br /&gt;
# In reviewing code for XSS - we can give more patterns on &amp;quot;source to sink&amp;quot; patterns for ASP.NET wrf to difference versions and mechanisms to display data in a page - Ashish Rao&lt;br /&gt;
# [[CRV2_RevCodeXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Persistent - The Anti pattern===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan, Larry Conklin&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author Chris Berberich&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reflected - The Anti pattern===&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Stored - The Anti pattern===&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatterndotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Mohammed Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===DOM XSS ===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
# [[CRV2_DOMXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===JQuery mistakes===&lt;br /&gt;
#Author Shenal Silva&lt;br /&gt;
# [[CRV2_JQueryMistakes|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for SQL Injection===&lt;br /&gt;
#Author Palak Gohil, Renchie Joan&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_SQL_Injection]]&lt;br /&gt;
# [[CRV2_RevCodeSQLInjection|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjdotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HQL====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjHQL|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===The Anti pattern===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
#[[CRV2_AntiPattern| Content here]]&lt;br /&gt;
https://www.owasp.org/index.php/CRV2_AntiPattern&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_AntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Palak Gohil&lt;br /&gt;
#=&amp;gt; Searching for traditional SQL,JPA,JPSQL,Criteria,...&lt;br /&gt;
# [[CRV2_AntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan,Larry Conklin&lt;br /&gt;
# [[CRV2_AntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Cold Fusion====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternColdFusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for CSRF Issues===&lt;br /&gt;
#Author Palak Gohil,Anand Prakash, Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Request_Forgery]]&lt;br /&gt;
# [[CRV2_CSRFIssues|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Transactional logic / Non idempotent functions / State Changing Functions===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_TransLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for poor logic /Business logic/Complex authorization===&lt;br /&gt;
#Author - Sam Denard&lt;br /&gt;
# [[CRV2_PoorLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing Secure Communications===&lt;br /&gt;
====.NET Config====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_SecCommsdotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Spring Config====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecCommsSpringConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HTTP Headers====&lt;br /&gt;
#Author Gregory Disney, Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====CSP=====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrsCSP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HSTS=====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_SecCommsHTTPHSTS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Tech-Stack pitfalls===&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_TechStackPitfalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Framework specific Issues===&lt;br /&gt;
====Spring====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesSpring|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Structs====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesStructs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Drupal====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDurpal|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby on Rails====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesROR|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Django====&lt;br /&gt;
#Author Gregory Disney&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDjango|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET Security / MVC====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesdotNetMVC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Security in ASP.NET applications====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Strongly Named Assemblies=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetStrongAssembiles|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======Round Tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRT|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======How to prevent Round tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRTPrevention|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Setting the right Configurations=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetConfigs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Authentication Options=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetAuth|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code Review for Managed Code - .Net 1.0 and up=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetManagedCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Using OWASP Top 10 as your guideline=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPTop10|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review for Unsafe Code (C#)=====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetUnsafeCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP Specific Issues====&lt;br /&gt;
#Author Mohammad Damavandi, Abbas Naderi&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Classic ASP====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPClassic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C#====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCsharp|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C/C++====&lt;br /&gt;
#Author Gary David Robinson&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCplusplus|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Objective C====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesObectiveC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author Palak Gohil&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Android====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesAndroid|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Coldfusion====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesColdfusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Security code review for Agile development=&lt;br /&gt;
#Author Carlos Pantelides&lt;br /&gt;
# [[CRV2_CodeReviewAgile|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Willing to review drafts=&lt;br /&gt;
#Terry Nerpester&lt;br /&gt;
#Larry Conklin&lt;br /&gt;
#Gary David Robinson&lt;br /&gt;
#Simon Whittaker&lt;br /&gt;
#Jason Johnson&lt;br /&gt;
#Carlos Pantelides&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Blind_SQL_Injection&amp;diff=155665</id>
		<title>Blind SQL Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Blind_SQL_Injection&amp;diff=155665"/>
				<updated>2013-07-19T04:33:21Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Security Focus Area]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Blind SQL (Structured Query Language) injection is a type of [[SQL Injection]] attack that asks the database true or false questions and determines the answer based on the applications response. This attack is often used when the web application is configured to show generic error messages, but has not mitigated the code that is vulnerable to SQL injection.&lt;br /&gt;
&lt;br /&gt;
When an attacker exploits SQL injection, sometimes the web application displays error messages from the database complaining that the SQL Query's syntax is incorrect. Blind SQL injection is nearly identical to normal [[SQL Injection]], the only difference being the way the data is retrieved from the database. When the database does not output data to the web page, an attacker is forced to steal data by asking the database a series of true or false questions. This makes exploiting the SQL Injection vulnerability more difficult, but not impossible. .&lt;br /&gt;
&lt;br /&gt;
==Threat Modeling==&lt;br /&gt;
Same as for [[SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
Same as for [[SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
An attacker may verify whether a sent request returned true or false in a few ways:&lt;br /&gt;
&lt;br /&gt;
===Content-based===&lt;br /&gt;
Using a simple page, which displays an article with given ID as the parameter, the attacker may perform a couple of simple tests to determine if the page is vulnerable to SQL Injection attacks.&lt;br /&gt;
&lt;br /&gt;
Example URL:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://newspaper.com/items.php?id=2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
sends the following query to the database:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT title, description, body FROM items WHERE ID = 2&lt;br /&gt;
&amp;lt;/prE&amp;gt;&lt;br /&gt;
The attacker may then try to inject a query that returns 'false':&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://newspaper.com/items.php?id=2 and 1=2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Now the SQL query should looks like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT title, description, body FROM items WHERE ID = 2 and 1=2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If the web application is vulnerable to SQL Injection, then it probably will not return anything. To make sure, the attacker will inject a query that will return 'true':&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://newspaper.com/items.php?id=2 and 1=1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If the content of the page that returns 'true' is different than that of the page that returns 'false', then the attacker is able to distinguish when the executed query returns true or false.&lt;br /&gt;
&lt;br /&gt;
Once this has been verified, the only limitations are privileges set up by the database administrator, different SQL syntax, and the attacker's imagination.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Time-based===&lt;br /&gt;
&lt;br /&gt;
This type of blind SQL injection relies on the database pausing for a specified amount of time, then returning the results, indicating successful SQL query executing. Using this method, an attacker enumerates each letter of the desired piece of data using the following logic:&lt;br /&gt;
&lt;br /&gt;
If the first letter of the first database's name is an 'A', wait for 10 seconds.&lt;br /&gt;
&lt;br /&gt;
If the first letter of the first database's name is an 'B', wait for 10 seconds. etc.&lt;br /&gt;
&lt;br /&gt;
'''Microsoft SQL Server'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.site.com/vulnerable.php?id=1' waitfor delay '00:00:10'--&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''MySQL'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT IF(expression, true, false)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Using some time-taking operation e.g. BENCHMARK(), will delay server&lt;br /&gt;
responses if the expression is True.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;BENCHMARK(5000000,ENCODE('MSG','by 5 seconds'))&amp;lt;/pre&amp;gt; - will execute the ENCODE function 5000000 times.&lt;br /&gt;
&lt;br /&gt;
Depending on the database server's performance and load, it should&lt;br /&gt;
take just a moment to finish this operation. The important thing is,&lt;br /&gt;
from the attacker's point of view, to specify a high-enough number of BENCHMARK()&lt;br /&gt;
function repetitions to affect the database&lt;br /&gt;
response time in a noticeable way.&lt;br /&gt;
&lt;br /&gt;
Example combination of both queries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1 UNION SELECT IF(SUBSTRING(user_password,1,1) = CHAR(50),BENCHMARK(5000000,ENCODE('MSG','by 5 seconds')),null) FROM users WHERE user_id = 1;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If the database response took a long time, we may expect that the first user password character with user_id = 1 is character '2'.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
(CHAR(50) == '2')&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Using this method for the rest of characters, it's possible to enumerate entire passwords stored in the database. This method works even when the attacker injects the SQL queries and the content of the vulnerable page doesn't change.&lt;br /&gt;
&lt;br /&gt;
Obviously, in this example, the names of the tables and the number of columns was specified. However, it's possible to guess them or check with a trial and error method.&lt;br /&gt;
&lt;br /&gt;
Databases other than MySQL also have time-based functions which allow them to be used for time-based attacks:&lt;br /&gt;
* MS SQL 'WAIT FOR DELAY '0:0:10''&lt;br /&gt;
* PostgreSQL - pg_sleep()&lt;br /&gt;
&lt;br /&gt;
Conducting Blind_SQL_Injection attacks manually is very time consuming, but there are a lot of tools which automate this process. One of them is SQLMap (http://sqlmap.org/) partly developed within OWASP grant program. On the other hand, tools of this kind are very sensitive to even small deviations from the rule. This includes:&lt;br /&gt;
&lt;br /&gt;
* scanning other website clusters, where clocks are not ideally synchronized,&lt;br /&gt;
* WWW services where argument acquiring method was changed, e.g.  from /index.php?ID=10 to /ID,10&lt;br /&gt;
&lt;br /&gt;
===Remote Database Fingerprinting===&lt;br /&gt;
&lt;br /&gt;
If the attacker is able to determine when his query returns True or False, then he may fingerprint the RDBMS. This will make the whole attack much easier. If the time-based approach is used, this helps determine what type of database is in use. Another popular methods to do this is to call functions which will return the current date. MySQL, MSSQL, and Oracle have different functions for that, respectively ''now()'', ''getdate()'', and ''sysdate()''.&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
Same as for [[SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Blind_XPath_Injection]]&lt;br /&gt;
* [[SQL_Injection]]&lt;br /&gt;
* [[XPATH_Injection]]&lt;br /&gt;
* [[LDAP_injection]]&lt;br /&gt;
* [[Server-Side_Includes_%28SSI%29_Injection]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[Injection_problem]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Development Guide]] article on how to [[Guide to SQL Injection | Avoid SQL Injection]] Vulnerabilities.&lt;br /&gt;
&amp;lt;br&amp;gt;See the OWASP [[SQL Injection Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for SQL Injection|Review Code for SQL Injection]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for SQL Injection    (OWASP-DV-005)|Test for SQL Injection]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* http://www.cgisecurity.com/questions/blindsql.shtml&lt;br /&gt;
* http://www.imperva.com/application_defense_center/white_papers/blind_sql_server_injection.html&lt;br /&gt;
* http://www.securitydocs.com/library/2651&lt;br /&gt;
* http://seclists.org/bugtraq/2005/Feb/0288.html&lt;br /&gt;
* http://ferruh.mavituna.com/makale/sql-injection-cheatsheet/&lt;br /&gt;
&lt;br /&gt;
'''Online Resources'''&lt;br /&gt;
* [http://www.nccgroup.com/Libraries/Document_Downloads/more__Advanced_SQL_Injection.sflb.ashx more Advanced SQL Injection] - by NGS&lt;br /&gt;
* [http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-hotchkies/bh-us-04-hotchkies.pdf Blind SQL Injection Automation Techniques] - Black Hat Pdf&lt;br /&gt;
* [http://seclists.org/lists/bugtraq/2005/Feb/0288.html Blind Sql-Injection in MySQL Databases]&lt;br /&gt;
* [http://www.cgisecurity.com/questions/blindsql.shtml Cgisecurity.com: What is Blind SQL Injection?]&lt;br /&gt;
* Kevin Spett from SPI Dynamics: http://www.net-security.org/dl/articles/Blind_SQLInjection.pdf&lt;br /&gt;
* http://www.imperva.com/resources/whitepapers.asp?t=ADC&lt;br /&gt;
* [https://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection]&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
* [http://www.sqlpowerinjector.com/ SQL Power Injector]&lt;br /&gt;
* [http://www.0x90.org/releases/absinthe/ Absinthe :: Automated Blind SQL Injection] // ver1.3.1&lt;br /&gt;
* [http://www.securiteam.com/tools/5IP0L20I0E.html SQLBrute - Multi Threaded Blind SQL Injection Bruteforcer] in Python&lt;br /&gt;
* [[:Category:OWASP_SQLiX_Project|SQLiX - SQL Injection Scanner]] in Perl&lt;br /&gt;
* [http://sqlmap.org/ sqlmap, automatic SQL injection tool] in Python&lt;br /&gt;
* [https://code.google.com/p/bsqlbf-v2/ bsqlbf, a blind SQL injection tool] in Perl&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Blind_SQL_Injection&amp;diff=155664</id>
		<title>Blind SQL Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Blind_SQL_Injection&amp;diff=155664"/>
				<updated>2013-07-19T04:32:55Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Time-based */ Change sqlmap URL&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Security Focus Area]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Blind SQL (Structured Query Language) injection is a type of [[SQL Injection]] attack that asks the database true or false questions and determines the answer based on the applications response. This attack is often used when the web application is configured to show generic error messages, but has not mitigated the code that is vulnerable to SQL injection.&lt;br /&gt;
&lt;br /&gt;
When an attacker exploits SQL injection, sometimes the web application displays error messages from the database complaining that the SQL Query's syntax is incorrect. Blind SQL injection is nearly identical to normal [[SQL Injection]], the only difference being the way the data is retrieved from the database. When the database does not output data to the web page, an attacker is forced to steal data by asking the database a series of true or false questions. This makes exploiting the SQL Injection vulnerability more difficult, but not impossible. .&lt;br /&gt;
&lt;br /&gt;
==Threat Modeling==&lt;br /&gt;
Same as for [[SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
Same as for [[SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
An attacker may verify whether a sent request returned true or false in a few ways:&lt;br /&gt;
&lt;br /&gt;
===Content-based===&lt;br /&gt;
Using a simple page, which displays an article with given ID as the parameter, the attacker may perform a couple of simple tests to determine if the page is vulnerable to SQL Injection attacks.&lt;br /&gt;
&lt;br /&gt;
Example URL:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://newspaper.com/items.php?id=2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
sends the following query to the database:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT title, description, body FROM items WHERE ID = 2&lt;br /&gt;
&amp;lt;/prE&amp;gt;&lt;br /&gt;
The attacker may then try to inject a query that returns 'false':&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://newspaper.com/items.php?id=2 and 1=2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Now the SQL query should looks like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT title, description, body FROM items WHERE ID = 2 and 1=2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If the web application is vulnerable to SQL Injection, then it probably will not return anything. To make sure, the attacker will inject a query that will return 'true':&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://newspaper.com/items.php?id=2 and 1=1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If the content of the page that returns 'true' is different than that of the page that returns 'false', then the attacker is able to distinguish when the executed query returns true or false.&lt;br /&gt;
&lt;br /&gt;
Once this has been verified, the only limitations are privileges set up by the database administrator, different SQL syntax, and the attacker's imagination.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Time-based===&lt;br /&gt;
&lt;br /&gt;
This type of blind SQL injection relies on the database pausing for a specified amount of time, then returning the results, indicating successful SQL query executing. Using this method, an attacker enumerates each letter of the desired piece of data using the following logic:&lt;br /&gt;
&lt;br /&gt;
If the first letter of the first database's name is an 'A', wait for 10 seconds.&lt;br /&gt;
&lt;br /&gt;
If the first letter of the first database's name is an 'B', wait for 10 seconds. etc.&lt;br /&gt;
&lt;br /&gt;
'''Microsoft SQL Server'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.site.com/vulnerable.php?id=1' waitfor delay '00:00:10'--&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''MySQL'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT IF(expression, true, false)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Using some time-taking operation e.g. BENCHMARK(), will delay server&lt;br /&gt;
responses if the expression is True.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;BENCHMARK(5000000,ENCODE('MSG','by 5 seconds'))&amp;lt;/pre&amp;gt; - will execute the ENCODE function 5000000 times.&lt;br /&gt;
&lt;br /&gt;
Depending on the database server's performance and load, it should&lt;br /&gt;
take just a moment to finish this operation. The important thing is,&lt;br /&gt;
from the attacker's point of view, to specify a high-enough number of BENCHMARK()&lt;br /&gt;
function repetitions to affect the database&lt;br /&gt;
response time in a noticeable way.&lt;br /&gt;
&lt;br /&gt;
Example combination of both queries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1 UNION SELECT IF(SUBSTRING(user_password,1,1) = CHAR(50),BENCHMARK(5000000,ENCODE('MSG','by 5 seconds')),null) FROM users WHERE user_id = 1;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If the database response took a long time, we may expect that the first user password character with user_id = 1 is character '2'.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
(CHAR(50) == '2')&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Using this method for the rest of characters, it's possible to enumerate entire passwords stored in the database. This method works even when the attacker injects the SQL queries and the content of the vulnerable page doesn't change.&lt;br /&gt;
&lt;br /&gt;
Obviously, in this example, the names of the tables and the number of columns was specified. However, it's possible to guess them or check with a trial and error method.&lt;br /&gt;
&lt;br /&gt;
Databases other than MySQL also have time-based functions which allow them to be used for time-based attacks:&lt;br /&gt;
* MS SQL 'WAIT FOR DELAY '0:0:10''&lt;br /&gt;
* PostgreSQL - pg_sleep()&lt;br /&gt;
&lt;br /&gt;
Conducting Blind_SQL_Injection attacks manually is very time consuming, but there are a lot of tools which automate this process. One of them is SQLMap (http://sqlmap.org/) partly developed within OWASP grant program. On the other hand, tools of this kind are very sensitive to even small deviations from the rule. This includes:&lt;br /&gt;
&lt;br /&gt;
* scanning other website clusters, where clocks are not ideally synchronized,&lt;br /&gt;
* WWW services where argument acquiring method was changed, e.g.  from /index.php?ID=10 to /ID,10&lt;br /&gt;
&lt;br /&gt;
===Remote Database Fingerprinting===&lt;br /&gt;
&lt;br /&gt;
If the attacker is able to determine when his query returns True or False, then he may fingerprint the RDBMS. This will make the whole attack much easier. If the time-based approach is used, this helps determine what type of database is in use. Another popular methods to do this is to call functions which will return the current date. MySQL, MSSQL, and Oracle have different functions for that, respectively ''now()'', ''getdate()'', and ''sysdate()''.&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
Same as for [[SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Blind_XPath_Injection]]&lt;br /&gt;
* [[SQL_Injection]]&lt;br /&gt;
* [[XPATH_Injection]]&lt;br /&gt;
* [[LDAP_injection]]&lt;br /&gt;
* [[Server-Side_Includes_%28SSI%29_Injection]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[Injection_problem]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Development Guide]] article on how to [[Guide to SQL Injection | Avoid SQL Injection]] Vulnerabilities.&lt;br /&gt;
&amp;lt;br&amp;gt;See the OWASP [[SQL Injection Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for SQL Injection|Review Code for SQL Injection]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for SQL Injection    (OWASP-DV-005)|Test for SQL Injection]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* http://www.cgisecurity.com/questions/blindsql.shtml&lt;br /&gt;
* http://www.imperva.com/application_defense_center/white_papers/blind_sql_server_injection.html&lt;br /&gt;
* http://www.securitydocs.com/library/2651&lt;br /&gt;
* http://seclists.org/bugtraq/2005/Feb/0288.html&lt;br /&gt;
* http://ferruh.mavituna.com/makale/sql-injection-cheatsheet/&lt;br /&gt;
&lt;br /&gt;
'''Online Resources'''&lt;br /&gt;
* [http://www.nccgroup.com/Libraries/Document_Downloads/more__Advanced_SQL_Injection.sflb.ashx more Advanced SQL Injection] - by NGS&lt;br /&gt;
* [http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-hotchkies/bh-us-04-hotchkies.pdf Blind SQL Injection Automation Techniques] - Black Hat Pdf&lt;br /&gt;
* [http://seclists.org/lists/bugtraq/2005/Feb/0288.html Blind Sql-Injection in MySQL Databases]&lt;br /&gt;
* [http://www.cgisecurity.com/questions/blindsql.shtml Cgisecurity.com: What is Blind SQL Injection?]&lt;br /&gt;
* Kevin Spett from SPI Dynamics: http://www.net-security.org/dl/articles/Blind_SQLInjection.pdf&lt;br /&gt;
* http://www.imperva.com/resources/whitepapers.asp?t=ADC&lt;br /&gt;
* [https://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection]&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
* [http://www.sqlpowerinjector.com/ SQL Power Injector]&lt;br /&gt;
* [http://www.0x90.org/releases/absinthe/ Absinthe :: Automated Blind SQL Injection] // ver1.3.1&lt;br /&gt;
* [http://www.securiteam.com/tools/5IP0L20I0E.html SQLBrute - Multi Threaded Blind SQL Injection Bruteforcer] in Python&lt;br /&gt;
* [[:Category:OWASP_SQLiX_Project|SQLiX - SQL Injection Scanner]] in Perl&lt;br /&gt;
* [http://sqlmap.sourceforge.net sqlmap, automatic SQL injection tool] in Python&lt;br /&gt;
* [https://code.google.com/p/bsqlbf-v2/ bsqlbf, a blind SQL injection tool] in Perl&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
[[Category: Attack]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148631</id>
		<title>Top 10 2013/ProjectMethodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148631"/>
				<updated>2013-03-27T07:33:20Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* FAQ */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Goal=&lt;br /&gt;
'''The goal of this page is to provide the baseline of knowledge to begin a thoughtful conversation of enhancements and changes to continue growing the OWASP top 10.'''&lt;br /&gt;
&lt;br /&gt;
=About=&lt;br /&gt;
&lt;br /&gt;
This page is intended to provide greater clarity on the development methodology of the OWASP Top 10.  This page provides information on the data sources used as input to the top 10, the current development processes, suggestions to improve involvement and participation, and also an FAQ to cover common questions &amp;amp; concerns.&lt;br /&gt;
&lt;br /&gt;
This is a wiki and editable by anyone with an OWASP account. Please constructively contribute to the conversation.  Additional discussions should also take place within the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP top 10 mailing list].&lt;br /&gt;
&lt;br /&gt;
=Current Methodology=&lt;br /&gt;
The 2010 and later versions of OWASP Top 10 are organized based on the [[OWASP_Risk_Rating_Methodology]], adjusted for the fact that the Top 10 is independent of any particular system. This adjusted methodology is documented in the OWASP Top 10 for 2010 here: [[Top_10_2010-Notes_About_Risk]].&lt;br /&gt;
&lt;br /&gt;
This resulted in 4 risk factors used to calculate the order of the Top 10, 3 Likelihood Factors and 1 Impact Factor. These factors are:&lt;br /&gt;
* Likelihood of an Application Having that Vulnerability (Prevalence)&lt;br /&gt;
* Likelihood of an Attacker Discovering that Vulnerability (Detectability)&lt;br /&gt;
* Likelihood of An Attacker Successfully Exploiting that Vulnerability (Exploitability)&lt;br /&gt;
* Typical Technical Impact if that Vulnerability is Successfully Exploited (Impact)&lt;br /&gt;
Each of these factors is scored on a scale from 1 through 3, except for XSS, which has a prevalence of 4&lt;br /&gt;
&lt;br /&gt;
The Top 10 uses data sources provided by a variety of companies (see [[Top_10_2013/ProjectMethodology#Current_Data_Sources sources]]) to calculate Vulnerability Prevalence. We would love to use similar data to help calculate the scores for the other risk factors if that data is available (which is one of the improvement suggestions recommended below).&lt;br /&gt;
&lt;br /&gt;
The process for producing an update to the OWASP Top 10 is generally as follows:&lt;br /&gt;
# Collect prevalence data from data suppliers.&lt;br /&gt;
# Rank prevalence data for each supplier and then aggregate the results to create an overall prevalence ranking for this update to the Top 10.&lt;br /&gt;
# Determine the values of the other risk factors based on professional opinion. (This step not done prior to 2010)&lt;br /&gt;
#* Adjustments are sometimes done based on professional opinion (like adding CSRF in 2007, and Vulnerable Libraries in 2013)&lt;br /&gt;
# Calculate the Top 10 order&lt;br /&gt;
# Write a Draft/Release Candidate&lt;br /&gt;
# For 2010, a Draft was reviewed by the Data Contributors and other members of the OWASP Community, and the core commenters/contributors to the Release Candidate and Final Release were acknowledged here: [[Top_10_2010-Introduction]] (About 15 individuals/groups)&lt;br /&gt;
#* Note, for 2013 this internal project review step was eliminated in order to get the release candidate out for public comment faster&lt;br /&gt;
# Publish Release Candidate for public comment (Prior to 2010 there was no release candidate, just a final release)&lt;br /&gt;
# Accept comments during a comment period&lt;br /&gt;
# Interact with comment providers to update the Top 10&lt;br /&gt;
# Publish all provided comments&lt;br /&gt;
# Publish a Final Release&lt;br /&gt;
&lt;br /&gt;
This certainly doesn't cover every nuance of what it takes to produce the Top 10. For example, one of the most common comments is &amp;quot;Why don't you combine these two items into one to make room for my favorite Risk?&amp;quot;. Like combining XSS into Injection, since XSS is really just a client side injection issue. The goal of the OWASP Top 10 is to raise awareness of the most important Risks, not to include every possible Risk we can stuff into the Top 10. So, in some cases, we've kept related issues separate to try to increase awareness of each issue. But there is always debate as to what's best, which is clearly subjective. In the 2013 release candidate, we combined cryptographic storage and communications into a single category, and then pulled use of known vulnerable libraries out of the Security Misconfiguration category in order to bring more attention to the use of Known Vulnerable Libraries since we believe this is an extremely important issue that deserves more attention as the use of libraries becomes more and more prevalent. In past updates, to make room for new issues, we dropped the least important issues, like error handling and denial of service, which some people agreed with, but others did not.&lt;br /&gt;
&lt;br /&gt;
In 2010, the Release Candidate process worked like this:&lt;br /&gt;
# It was open for public comment for several months&lt;br /&gt;
# Dave Wichers, primarily, interacted via email with each comment provider to address their comments or provide rationale as to why no change was thought to be most appropriate.&lt;br /&gt;
# All provided comments were published at:&lt;br /&gt;
#* [http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 - 2010 Public Comments], and&lt;br /&gt;
#* [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf Kai Jendrian's Top 10 - 2010 Comments]&lt;br /&gt;
# The final version was published.&lt;br /&gt;
&lt;br /&gt;
In 2013, the process is currently like so:&lt;br /&gt;
# Public comment period of Release Candidate is currently from February through end of March 2013. (This can be extended if necessary)&lt;br /&gt;
# We were planning on following the same process as for 2010 to complete the Top 10, but clearly the OWASP Community wants to get more heavily involved in producing the Final Release, which is great.&lt;br /&gt;
# So, at this point, the process for completing the 2013 Top 10 is TBD, subject to your input/suggestions.&lt;br /&gt;
&lt;br /&gt;
=Current Prevalence Data Sources=&lt;br /&gt;
* Aspect Security&lt;br /&gt;
* HP (Results for both Fortify and WebInspect)&lt;br /&gt;
* Minded Security - [http://blog.mindedsecurity.com/2013/02/real-life-vulnerabilities-statistics.html Statistics]&lt;br /&gt;
* Softtek&lt;br /&gt;
* Trustwave Spiderlabs - [http://www2.trustwave.com/rs/trustwave/images/2013-Global-Security-Report.pdf Statistics]&lt;br /&gt;
* Veracode – [http://info.veracode.com/rs/veracode/images/VERACODE-SOSS-V4.PDF Statistics]&lt;br /&gt;
* WhiteHat Security – [https://www.whitehatsec.com/home/resource/stats.html Statistics]&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute your vulnerability statistics to the OWASP Top 10 project, please send your data to: dave.wichers@owasp.org. Please indicate if its OK for OWASP to publish this raw data. If you have already published this data, please provide us a link to the public posting.&lt;br /&gt;
&lt;br /&gt;
Note: In the first version of the Top 10 in 2003, we started with the MITRE CVE data, and each update expanded the number of prevalence data contributors. Unfortunately, the CVE data for 2011/2012 wasn't available for the 2013 release, which is why its not included this year.&lt;br /&gt;
&lt;br /&gt;
=Suggested Enhancements=&lt;br /&gt;
Note: This is a wiki - please add new suggestions into this page.&lt;br /&gt;
&lt;br /&gt;
# Use a public wiki or [http://code.google.com/p/owasptop10/issues/list google issues] to capture feedback - mailing lists are tough and things get lost&lt;br /&gt;
# Use a public wiki to allow for public edits, not just feedback. These edits will all be tracked with rollback capabilities for editing and will allow the history of Top 10 edit history to be &amp;quot;public&amp;quot; for maximum &amp;quot;open&amp;quot; and &amp;quot;visibility&amp;quot;.&lt;br /&gt;
# Establish a Top 10 panel to evaluate and make final decisions on inclusion &amp;amp; ranking&lt;br /&gt;
#* Not feasible for everyone to vote on every item&lt;br /&gt;
#* A diverse panel representing various verticals (vendor, enterprise, offense/defense, etc) &lt;br /&gt;
# Additional data sources could be considered (please add links)&lt;br /&gt;
#* WASC [http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database Web Hacking Incident Database]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371616ef WHID Top Attack Methods for 2012]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371786H4 WHID Top App Weaknesses for 2012]&lt;br /&gt;
#* Firehosts Web Application Attack Reports&lt;br /&gt;
#** [http://www.firehost.com/company/newsroom/web-application-attack-report-fourth-quarter-2012 Web Application Attack Report for Q4 2012]&lt;br /&gt;
#* Imperva's Web Application Attack Reports&lt;br /&gt;
#** [http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed3.pdf Web Application Attack Report for Q3 2012]&lt;br /&gt;
#* Prolexic Attack Report&lt;br /&gt;
#** [http://www.prolexic.com/pdf/Prolexic_Q212_Attack_Report_071212.pdf DDoS Attack Report for Q2 2012]&lt;br /&gt;
# Additional reports could be considered:&lt;br /&gt;
#* Annual Symantec Internet Threat Reports&lt;br /&gt;
#* Datalossdb&lt;br /&gt;
#* IBM XForce threat reports&lt;br /&gt;
#* Akamai State of the Internet Reports&lt;br /&gt;
# Public forum to brainstorm and discuss key topics&lt;br /&gt;
# Remove corporate logos from the Top Ten PDF and provide a &amp;quot;Who we are&amp;quot; link similar to Apache for maximum vendor neutrality: http://hadoop.apache.org/who.html&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
&lt;br /&gt;
1. The Three Cycle Reasons. Why OWASP Top 10 is release every three year cycle? &lt;br /&gt;
: Here are the reasons:&lt;br /&gt;
: a) The field does evolve pretty quick but Top 10 risks not substantially change every single year. Release every year is too much.&lt;br /&gt;
: b) It takes a lot of work to produce OWASP Top 10 update and spacing it out balances between the effort to produce and the amount of change when its updated.&lt;br /&gt;
: c) Lots of organizations, tools, etc, organize to the OWASP Top 10. So if it was published every single year, then everyone that chooses to align themselves to each update would have to do that work every year. &lt;br /&gt;
2. ...&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148630</id>
		<title>Top 10 2013/ProjectMethodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148630"/>
				<updated>2013-03-27T07:31:36Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* FAQ */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Goal=&lt;br /&gt;
'''The goal of this page is to provide the baseline of knowledge to begin a thoughtful conversation of enhancements and changes to continue growing the OWASP top 10.'''&lt;br /&gt;
&lt;br /&gt;
=About=&lt;br /&gt;
&lt;br /&gt;
This page is intended to provide greater clarity on the development methodology of the OWASP Top 10.  This page provides information on the data sources used as input to the top 10, the current development processes, suggestions to improve involvement and participation, and also an FAQ to cover common questions &amp;amp; concerns.&lt;br /&gt;
&lt;br /&gt;
This is a wiki and editable by anyone with an OWASP account. Please constructively contribute to the conversation.  Additional discussions should also take place within the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP top 10 mailing list].&lt;br /&gt;
&lt;br /&gt;
=Current Methodology=&lt;br /&gt;
The 2010 and later versions of OWASP Top 10 are organized based on the [[OWASP_Risk_Rating_Methodology]], adjusted for the fact that the Top 10 is independent of any particular system. This adjusted methodology is documented in the OWASP Top 10 for 2010 here: [[Top_10_2010-Notes_About_Risk]].&lt;br /&gt;
&lt;br /&gt;
This resulted in 4 risk factors used to calculate the order of the Top 10, 3 Likelihood Factors and 1 Impact Factor. These factors are:&lt;br /&gt;
* Likelihood of an Application Having that Vulnerability (Prevalence)&lt;br /&gt;
* Likelihood of an Attacker Discovering that Vulnerability (Detectability)&lt;br /&gt;
* Likelihood of An Attacker Successfully Exploiting that Vulnerability (Exploitability)&lt;br /&gt;
* Typical Technical Impact if that Vulnerability is Successfully Exploited (Impact)&lt;br /&gt;
Each of these factors is scored on a scale from 1 through 3, except for XSS, which has a prevalence of 4&lt;br /&gt;
&lt;br /&gt;
The Top 10 uses data sources provided by a variety of companies (see [[Top_10_2013/ProjectMethodology#Current_Data_Sources sources]]) to calculate Vulnerability Prevalence. We would love to use similar data to help calculate the scores for the other risk factors if that data is available (which is one of the improvement suggestions recommended below).&lt;br /&gt;
&lt;br /&gt;
The process for producing an update to the OWASP Top 10 is generally as follows:&lt;br /&gt;
# Collect prevalence data from data suppliers.&lt;br /&gt;
# Rank prevalence data for each supplier and then aggregate the results to create an overall prevalence ranking for this update to the Top 10.&lt;br /&gt;
# Determine the values of the other risk factors based on professional opinion. (This step not done prior to 2010)&lt;br /&gt;
#* Adjustments are sometimes done based on professional opinion (like adding CSRF in 2007, and Vulnerable Libraries in 2013)&lt;br /&gt;
# Calculate the Top 10 order&lt;br /&gt;
# Write a Draft/Release Candidate&lt;br /&gt;
# For 2010, a Draft was reviewed by the Data Contributors and other members of the OWASP Community, and the core commenters/contributors to the Release Candidate and Final Release were acknowledged here: [[Top_10_2010-Introduction]] (About 15 individuals/groups)&lt;br /&gt;
#* Note, for 2013 this internal project review step was eliminated in order to get the release candidate out for public comment faster&lt;br /&gt;
# Publish Release Candidate for public comment (Prior to 2010 there was no release candidate, just a final release)&lt;br /&gt;
# Accept comments during a comment period&lt;br /&gt;
# Interact with comment providers to update the Top 10&lt;br /&gt;
# Publish all provided comments&lt;br /&gt;
# Publish a Final Release&lt;br /&gt;
&lt;br /&gt;
This certainly doesn't cover every nuance of what it takes to produce the Top 10. For example, one of the most common comments is &amp;quot;Why don't you combine these two items into one to make room for my favorite Risk?&amp;quot;. Like combining XSS into Injection, since XSS is really just a client side injection issue. The goal of the OWASP Top 10 is to raise awareness of the most important Risks, not to include every possible Risk we can stuff into the Top 10. So, in some cases, we've kept related issues separate to try to increase awareness of each issue. But there is always debate as to what's best, which is clearly subjective. In the 2013 release candidate, we combined cryptographic storage and communications into a single category, and then pulled use of known vulnerable libraries out of the Security Misconfiguration category in order to bring more attention to the use of Known Vulnerable Libraries since we believe this is an extremely important issue that deserves more attention as the use of libraries becomes more and more prevalent. In past updates, to make room for new issues, we dropped the least important issues, like error handling and denial of service, which some people agreed with, but others did not.&lt;br /&gt;
&lt;br /&gt;
In 2010, the Release Candidate process worked like this:&lt;br /&gt;
# It was open for public comment for several months&lt;br /&gt;
# Dave Wichers, primarily, interacted via email with each comment provider to address their comments or provide rationale as to why no change was thought to be most appropriate.&lt;br /&gt;
# All provided comments were published at:&lt;br /&gt;
#* [http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 - 2010 Public Comments], and&lt;br /&gt;
#* [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf Kai Jendrian's Top 10 - 2010 Comments]&lt;br /&gt;
# The final version was published.&lt;br /&gt;
&lt;br /&gt;
In 2013, the process is currently like so:&lt;br /&gt;
# Public comment period of Release Candidate is currently from February through end of March 2013. (This can be extended if necessary)&lt;br /&gt;
# We were planning on following the same process as for 2010 to complete the Top 10, but clearly the OWASP Community wants to get more heavily involved in producing the Final Release, which is great.&lt;br /&gt;
# So, at this point, the process for completing the 2013 Top 10 is TBD, subject to your input/suggestions.&lt;br /&gt;
&lt;br /&gt;
=Current Prevalence Data Sources=&lt;br /&gt;
* Aspect Security&lt;br /&gt;
* HP (Results for both Fortify and WebInspect)&lt;br /&gt;
* Minded Security - [http://blog.mindedsecurity.com/2013/02/real-life-vulnerabilities-statistics.html Statistics]&lt;br /&gt;
* Softtek&lt;br /&gt;
* Trustwave Spiderlabs - [http://www2.trustwave.com/rs/trustwave/images/2013-Global-Security-Report.pdf Statistics]&lt;br /&gt;
* Veracode – [http://info.veracode.com/rs/veracode/images/VERACODE-SOSS-V4.PDF Statistics]&lt;br /&gt;
* WhiteHat Security – [https://www.whitehatsec.com/home/resource/stats.html Statistics]&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute your vulnerability statistics to the OWASP Top 10 project, please send your data to: dave.wichers@owasp.org. Please indicate if its OK for OWASP to publish this raw data. If you have already published this data, please provide us a link to the public posting.&lt;br /&gt;
&lt;br /&gt;
Note: In the first version of the Top 10 in 2003, we started with the MITRE CVE data, and each update expanded the number of prevalence data contributors. Unfortunately, the CVE data for 2011/2012 wasn't available for the 2013 release, which is why its not included this year.&lt;br /&gt;
&lt;br /&gt;
=Suggested Enhancements=&lt;br /&gt;
Note: This is a wiki - please add new suggestions into this page.&lt;br /&gt;
&lt;br /&gt;
# Use a public wiki or [http://code.google.com/p/owasptop10/issues/list google issues] to capture feedback - mailing lists are tough and things get lost&lt;br /&gt;
# Use a public wiki to allow for public edits, not just feedback. These edits will all be tracked with rollback capabilities for editing and will allow the history of Top 10 edit history to be &amp;quot;public&amp;quot; for maximum &amp;quot;open&amp;quot; and &amp;quot;visibility&amp;quot;.&lt;br /&gt;
# Establish a Top 10 panel to evaluate and make final decisions on inclusion &amp;amp; ranking&lt;br /&gt;
#* Not feasible for everyone to vote on every item&lt;br /&gt;
#* A diverse panel representing various verticals (vendor, enterprise, offense/defense, etc) &lt;br /&gt;
# Additional data sources could be considered (please add links)&lt;br /&gt;
#* WASC [http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database Web Hacking Incident Database]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371616ef WHID Top Attack Methods for 2012]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371786H4 WHID Top App Weaknesses for 2012]&lt;br /&gt;
#* Firehosts Web Application Attack Reports&lt;br /&gt;
#** [http://www.firehost.com/company/newsroom/web-application-attack-report-fourth-quarter-2012 Web Application Attack Report for Q4 2012]&lt;br /&gt;
#* Imperva's Web Application Attack Reports&lt;br /&gt;
#** [http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed3.pdf Web Application Attack Report for Q3 2012]&lt;br /&gt;
#* Prolexic Attack Report&lt;br /&gt;
#** [http://www.prolexic.com/pdf/Prolexic_Q212_Attack_Report_071212.pdf DDoS Attack Report for Q2 2012]&lt;br /&gt;
# Additional reports could be considered:&lt;br /&gt;
#* Annual Symantec Internet Threat Reports&lt;br /&gt;
#* Datalossdb&lt;br /&gt;
#* IBM XForce threat reports&lt;br /&gt;
#* Akamai State of the Internet Reports&lt;br /&gt;
# Public forum to brainstorm and discuss key topics&lt;br /&gt;
# Remove corporate logos from the Top Ten PDF and provide a &amp;quot;Who we are&amp;quot; link similar to Apache for maximum vendor neutrality: http://hadoop.apache.org/who.html&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
&lt;br /&gt;
# The Three Cycle Reasons. Why OWASP Top 10 is release every three year cycle? &lt;br /&gt;
Here are the reasons:&lt;br /&gt;
a) The field does evolve pretty quick but Top 10 risks not substantially change every single year. Release every year is too much.&amp;lt;br/&amp;gt;&lt;br /&gt;
b) It takes a lot of work to produce OWASP Top 10 update and spacing it out balances between the effort to produce and the amount of change when its updated.&amp;lt;br/&amp;gt;&lt;br /&gt;
c) Lots of organizations, tools, etc, organize to the OWASP Top 10. So if it was published every single year, then everyone that chooses to align themselves to each update would have to do that work every year. &amp;lt;br/&amp;gt;&lt;br /&gt;
# ...&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148629</id>
		<title>Top 10 2013/ProjectMethodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148629"/>
				<updated>2013-03-27T07:31:08Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* FAQ */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Goal=&lt;br /&gt;
'''The goal of this page is to provide the baseline of knowledge to begin a thoughtful conversation of enhancements and changes to continue growing the OWASP top 10.'''&lt;br /&gt;
&lt;br /&gt;
=About=&lt;br /&gt;
&lt;br /&gt;
This page is intended to provide greater clarity on the development methodology of the OWASP Top 10.  This page provides information on the data sources used as input to the top 10, the current development processes, suggestions to improve involvement and participation, and also an FAQ to cover common questions &amp;amp; concerns.&lt;br /&gt;
&lt;br /&gt;
This is a wiki and editable by anyone with an OWASP account. Please constructively contribute to the conversation.  Additional discussions should also take place within the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP top 10 mailing list].&lt;br /&gt;
&lt;br /&gt;
=Current Methodology=&lt;br /&gt;
The 2010 and later versions of OWASP Top 10 are organized based on the [[OWASP_Risk_Rating_Methodology]], adjusted for the fact that the Top 10 is independent of any particular system. This adjusted methodology is documented in the OWASP Top 10 for 2010 here: [[Top_10_2010-Notes_About_Risk]].&lt;br /&gt;
&lt;br /&gt;
This resulted in 4 risk factors used to calculate the order of the Top 10, 3 Likelihood Factors and 1 Impact Factor. These factors are:&lt;br /&gt;
* Likelihood of an Application Having that Vulnerability (Prevalence)&lt;br /&gt;
* Likelihood of an Attacker Discovering that Vulnerability (Detectability)&lt;br /&gt;
* Likelihood of An Attacker Successfully Exploiting that Vulnerability (Exploitability)&lt;br /&gt;
* Typical Technical Impact if that Vulnerability is Successfully Exploited (Impact)&lt;br /&gt;
Each of these factors is scored on a scale from 1 through 3, except for XSS, which has a prevalence of 4&lt;br /&gt;
&lt;br /&gt;
The Top 10 uses data sources provided by a variety of companies (see [[Top_10_2013/ProjectMethodology#Current_Data_Sources sources]]) to calculate Vulnerability Prevalence. We would love to use similar data to help calculate the scores for the other risk factors if that data is available (which is one of the improvement suggestions recommended below).&lt;br /&gt;
&lt;br /&gt;
The process for producing an update to the OWASP Top 10 is generally as follows:&lt;br /&gt;
# Collect prevalence data from data suppliers.&lt;br /&gt;
# Rank prevalence data for each supplier and then aggregate the results to create an overall prevalence ranking for this update to the Top 10.&lt;br /&gt;
# Determine the values of the other risk factors based on professional opinion. (This step not done prior to 2010)&lt;br /&gt;
#* Adjustments are sometimes done based on professional opinion (like adding CSRF in 2007, and Vulnerable Libraries in 2013)&lt;br /&gt;
# Calculate the Top 10 order&lt;br /&gt;
# Write a Draft/Release Candidate&lt;br /&gt;
# For 2010, a Draft was reviewed by the Data Contributors and other members of the OWASP Community, and the core commenters/contributors to the Release Candidate and Final Release were acknowledged here: [[Top_10_2010-Introduction]] (About 15 individuals/groups)&lt;br /&gt;
#* Note, for 2013 this internal project review step was eliminated in order to get the release candidate out for public comment faster&lt;br /&gt;
# Publish Release Candidate for public comment (Prior to 2010 there was no release candidate, just a final release)&lt;br /&gt;
# Accept comments during a comment period&lt;br /&gt;
# Interact with comment providers to update the Top 10&lt;br /&gt;
# Publish all provided comments&lt;br /&gt;
# Publish a Final Release&lt;br /&gt;
&lt;br /&gt;
This certainly doesn't cover every nuance of what it takes to produce the Top 10. For example, one of the most common comments is &amp;quot;Why don't you combine these two items into one to make room for my favorite Risk?&amp;quot;. Like combining XSS into Injection, since XSS is really just a client side injection issue. The goal of the OWASP Top 10 is to raise awareness of the most important Risks, not to include every possible Risk we can stuff into the Top 10. So, in some cases, we've kept related issues separate to try to increase awareness of each issue. But there is always debate as to what's best, which is clearly subjective. In the 2013 release candidate, we combined cryptographic storage and communications into a single category, and then pulled use of known vulnerable libraries out of the Security Misconfiguration category in order to bring more attention to the use of Known Vulnerable Libraries since we believe this is an extremely important issue that deserves more attention as the use of libraries becomes more and more prevalent. In past updates, to make room for new issues, we dropped the least important issues, like error handling and denial of service, which some people agreed with, but others did not.&lt;br /&gt;
&lt;br /&gt;
In 2010, the Release Candidate process worked like this:&lt;br /&gt;
# It was open for public comment for several months&lt;br /&gt;
# Dave Wichers, primarily, interacted via email with each comment provider to address their comments or provide rationale as to why no change was thought to be most appropriate.&lt;br /&gt;
# All provided comments were published at:&lt;br /&gt;
#* [http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 - 2010 Public Comments], and&lt;br /&gt;
#* [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf Kai Jendrian's Top 10 - 2010 Comments]&lt;br /&gt;
# The final version was published.&lt;br /&gt;
&lt;br /&gt;
In 2013, the process is currently like so:&lt;br /&gt;
# Public comment period of Release Candidate is currently from February through end of March 2013. (This can be extended if necessary)&lt;br /&gt;
# We were planning on following the same process as for 2010 to complete the Top 10, but clearly the OWASP Community wants to get more heavily involved in producing the Final Release, which is great.&lt;br /&gt;
# So, at this point, the process for completing the 2013 Top 10 is TBD, subject to your input/suggestions.&lt;br /&gt;
&lt;br /&gt;
=Current Prevalence Data Sources=&lt;br /&gt;
* Aspect Security&lt;br /&gt;
* HP (Results for both Fortify and WebInspect)&lt;br /&gt;
* Minded Security - [http://blog.mindedsecurity.com/2013/02/real-life-vulnerabilities-statistics.html Statistics]&lt;br /&gt;
* Softtek&lt;br /&gt;
* Trustwave Spiderlabs - [http://www2.trustwave.com/rs/trustwave/images/2013-Global-Security-Report.pdf Statistics]&lt;br /&gt;
* Veracode – [http://info.veracode.com/rs/veracode/images/VERACODE-SOSS-V4.PDF Statistics]&lt;br /&gt;
* WhiteHat Security – [https://www.whitehatsec.com/home/resource/stats.html Statistics]&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute your vulnerability statistics to the OWASP Top 10 project, please send your data to: dave.wichers@owasp.org. Please indicate if its OK for OWASP to publish this raw data. If you have already published this data, please provide us a link to the public posting.&lt;br /&gt;
&lt;br /&gt;
Note: In the first version of the Top 10 in 2003, we started with the MITRE CVE data, and each update expanded the number of prevalence data contributors. Unfortunately, the CVE data for 2011/2012 wasn't available for the 2013 release, which is why its not included this year.&lt;br /&gt;
&lt;br /&gt;
=Suggested Enhancements=&lt;br /&gt;
Note: This is a wiki - please add new suggestions into this page.&lt;br /&gt;
&lt;br /&gt;
# Use a public wiki or [http://code.google.com/p/owasptop10/issues/list google issues] to capture feedback - mailing lists are tough and things get lost&lt;br /&gt;
# Use a public wiki to allow for public edits, not just feedback. These edits will all be tracked with rollback capabilities for editing and will allow the history of Top 10 edit history to be &amp;quot;public&amp;quot; for maximum &amp;quot;open&amp;quot; and &amp;quot;visibility&amp;quot;.&lt;br /&gt;
# Establish a Top 10 panel to evaluate and make final decisions on inclusion &amp;amp; ranking&lt;br /&gt;
#* Not feasible for everyone to vote on every item&lt;br /&gt;
#* A diverse panel representing various verticals (vendor, enterprise, offense/defense, etc) &lt;br /&gt;
# Additional data sources could be considered (please add links)&lt;br /&gt;
#* WASC [http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database Web Hacking Incident Database]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371616ef WHID Top Attack Methods for 2012]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371786H4 WHID Top App Weaknesses for 2012]&lt;br /&gt;
#* Firehosts Web Application Attack Reports&lt;br /&gt;
#** [http://www.firehost.com/company/newsroom/web-application-attack-report-fourth-quarter-2012 Web Application Attack Report for Q4 2012]&lt;br /&gt;
#* Imperva's Web Application Attack Reports&lt;br /&gt;
#** [http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed3.pdf Web Application Attack Report for Q3 2012]&lt;br /&gt;
#* Prolexic Attack Report&lt;br /&gt;
#** [http://www.prolexic.com/pdf/Prolexic_Q212_Attack_Report_071212.pdf DDoS Attack Report for Q2 2012]&lt;br /&gt;
# Additional reports could be considered:&lt;br /&gt;
#* Annual Symantec Internet Threat Reports&lt;br /&gt;
#* Datalossdb&lt;br /&gt;
#* IBM XForce threat reports&lt;br /&gt;
#* Akamai State of the Internet Reports&lt;br /&gt;
# Public forum to brainstorm and discuss key topics&lt;br /&gt;
# Remove corporate logos from the Top Ten PDF and provide a &amp;quot;Who we are&amp;quot; link similar to Apache for maximum vendor neutrality: http://hadoop.apache.org/who.html&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
# The Three Cycle Reasons. Why OWASP Top 10 is release every three year cycle? &lt;br /&gt;
:Here are the reasons:&lt;br /&gt;
a) The field does evolve pretty quick but Top 10 risks not substantially change every single year. Release every year is too much.&amp;lt;br/&amp;gt;&lt;br /&gt;
b) It takes a lot of work to produce OWASP Top 10 update and spacing it out balances between the effort to produce and the amount of change when its updated.&amp;lt;br/&amp;gt;&lt;br /&gt;
c) Lots of organizations, tools, etc, organize to the OWASP Top 10. So if it was published every single year, then everyone that chooses to align themselves to each update would have to do that work every year. &amp;lt;br/&amp;gt;&lt;br /&gt;
# ...&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148628</id>
		<title>Top 10 2013/ProjectMethodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148628"/>
				<updated>2013-03-27T07:30:38Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* FAQ */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Goal=&lt;br /&gt;
'''The goal of this page is to provide the baseline of knowledge to begin a thoughtful conversation of enhancements and changes to continue growing the OWASP top 10.'''&lt;br /&gt;
&lt;br /&gt;
=About=&lt;br /&gt;
&lt;br /&gt;
This page is intended to provide greater clarity on the development methodology of the OWASP Top 10.  This page provides information on the data sources used as input to the top 10, the current development processes, suggestions to improve involvement and participation, and also an FAQ to cover common questions &amp;amp; concerns.&lt;br /&gt;
&lt;br /&gt;
This is a wiki and editable by anyone with an OWASP account. Please constructively contribute to the conversation.  Additional discussions should also take place within the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP top 10 mailing list].&lt;br /&gt;
&lt;br /&gt;
=Current Methodology=&lt;br /&gt;
The 2010 and later versions of OWASP Top 10 are organized based on the [[OWASP_Risk_Rating_Methodology]], adjusted for the fact that the Top 10 is independent of any particular system. This adjusted methodology is documented in the OWASP Top 10 for 2010 here: [[Top_10_2010-Notes_About_Risk]].&lt;br /&gt;
&lt;br /&gt;
This resulted in 4 risk factors used to calculate the order of the Top 10, 3 Likelihood Factors and 1 Impact Factor. These factors are:&lt;br /&gt;
* Likelihood of an Application Having that Vulnerability (Prevalence)&lt;br /&gt;
* Likelihood of an Attacker Discovering that Vulnerability (Detectability)&lt;br /&gt;
* Likelihood of An Attacker Successfully Exploiting that Vulnerability (Exploitability)&lt;br /&gt;
* Typical Technical Impact if that Vulnerability is Successfully Exploited (Impact)&lt;br /&gt;
Each of these factors is scored on a scale from 1 through 3, except for XSS, which has a prevalence of 4&lt;br /&gt;
&lt;br /&gt;
The Top 10 uses data sources provided by a variety of companies (see [[Top_10_2013/ProjectMethodology#Current_Data_Sources sources]]) to calculate Vulnerability Prevalence. We would love to use similar data to help calculate the scores for the other risk factors if that data is available (which is one of the improvement suggestions recommended below).&lt;br /&gt;
&lt;br /&gt;
The process for producing an update to the OWASP Top 10 is generally as follows:&lt;br /&gt;
# Collect prevalence data from data suppliers.&lt;br /&gt;
# Rank prevalence data for each supplier and then aggregate the results to create an overall prevalence ranking for this update to the Top 10.&lt;br /&gt;
# Determine the values of the other risk factors based on professional opinion. (This step not done prior to 2010)&lt;br /&gt;
#* Adjustments are sometimes done based on professional opinion (like adding CSRF in 2007, and Vulnerable Libraries in 2013)&lt;br /&gt;
# Calculate the Top 10 order&lt;br /&gt;
# Write a Draft/Release Candidate&lt;br /&gt;
# For 2010, a Draft was reviewed by the Data Contributors and other members of the OWASP Community, and the core commenters/contributors to the Release Candidate and Final Release were acknowledged here: [[Top_10_2010-Introduction]] (About 15 individuals/groups)&lt;br /&gt;
#* Note, for 2013 this internal project review step was eliminated in order to get the release candidate out for public comment faster&lt;br /&gt;
# Publish Release Candidate for public comment (Prior to 2010 there was no release candidate, just a final release)&lt;br /&gt;
# Accept comments during a comment period&lt;br /&gt;
# Interact with comment providers to update the Top 10&lt;br /&gt;
# Publish all provided comments&lt;br /&gt;
# Publish a Final Release&lt;br /&gt;
&lt;br /&gt;
This certainly doesn't cover every nuance of what it takes to produce the Top 10. For example, one of the most common comments is &amp;quot;Why don't you combine these two items into one to make room for my favorite Risk?&amp;quot;. Like combining XSS into Injection, since XSS is really just a client side injection issue. The goal of the OWASP Top 10 is to raise awareness of the most important Risks, not to include every possible Risk we can stuff into the Top 10. So, in some cases, we've kept related issues separate to try to increase awareness of each issue. But there is always debate as to what's best, which is clearly subjective. In the 2013 release candidate, we combined cryptographic storage and communications into a single category, and then pulled use of known vulnerable libraries out of the Security Misconfiguration category in order to bring more attention to the use of Known Vulnerable Libraries since we believe this is an extremely important issue that deserves more attention as the use of libraries becomes more and more prevalent. In past updates, to make room for new issues, we dropped the least important issues, like error handling and denial of service, which some people agreed with, but others did not.&lt;br /&gt;
&lt;br /&gt;
In 2010, the Release Candidate process worked like this:&lt;br /&gt;
# It was open for public comment for several months&lt;br /&gt;
# Dave Wichers, primarily, interacted via email with each comment provider to address their comments or provide rationale as to why no change was thought to be most appropriate.&lt;br /&gt;
# All provided comments were published at:&lt;br /&gt;
#* [http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 - 2010 Public Comments], and&lt;br /&gt;
#* [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf Kai Jendrian's Top 10 - 2010 Comments]&lt;br /&gt;
# The final version was published.&lt;br /&gt;
&lt;br /&gt;
In 2013, the process is currently like so:&lt;br /&gt;
# Public comment period of Release Candidate is currently from February through end of March 2013. (This can be extended if necessary)&lt;br /&gt;
# We were planning on following the same process as for 2010 to complete the Top 10, but clearly the OWASP Community wants to get more heavily involved in producing the Final Release, which is great.&lt;br /&gt;
# So, at this point, the process for completing the 2013 Top 10 is TBD, subject to your input/suggestions.&lt;br /&gt;
&lt;br /&gt;
=Current Prevalence Data Sources=&lt;br /&gt;
* Aspect Security&lt;br /&gt;
* HP (Results for both Fortify and WebInspect)&lt;br /&gt;
* Minded Security - [http://blog.mindedsecurity.com/2013/02/real-life-vulnerabilities-statistics.html Statistics]&lt;br /&gt;
* Softtek&lt;br /&gt;
* Trustwave Spiderlabs - [http://www2.trustwave.com/rs/trustwave/images/2013-Global-Security-Report.pdf Statistics]&lt;br /&gt;
* Veracode – [http://info.veracode.com/rs/veracode/images/VERACODE-SOSS-V4.PDF Statistics]&lt;br /&gt;
* WhiteHat Security – [https://www.whitehatsec.com/home/resource/stats.html Statistics]&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute your vulnerability statistics to the OWASP Top 10 project, please send your data to: dave.wichers@owasp.org. Please indicate if its OK for OWASP to publish this raw data. If you have already published this data, please provide us a link to the public posting.&lt;br /&gt;
&lt;br /&gt;
Note: In the first version of the Top 10 in 2003, we started with the MITRE CVE data, and each update expanded the number of prevalence data contributors. Unfortunately, the CVE data for 2011/2012 wasn't available for the 2013 release, which is why its not included this year.&lt;br /&gt;
&lt;br /&gt;
=Suggested Enhancements=&lt;br /&gt;
Note: This is a wiki - please add new suggestions into this page.&lt;br /&gt;
&lt;br /&gt;
# Use a public wiki or [http://code.google.com/p/owasptop10/issues/list google issues] to capture feedback - mailing lists are tough and things get lost&lt;br /&gt;
# Use a public wiki to allow for public edits, not just feedback. These edits will all be tracked with rollback capabilities for editing and will allow the history of Top 10 edit history to be &amp;quot;public&amp;quot; for maximum &amp;quot;open&amp;quot; and &amp;quot;visibility&amp;quot;.&lt;br /&gt;
# Establish a Top 10 panel to evaluate and make final decisions on inclusion &amp;amp; ranking&lt;br /&gt;
#* Not feasible for everyone to vote on every item&lt;br /&gt;
#* A diverse panel representing various verticals (vendor, enterprise, offense/defense, etc) &lt;br /&gt;
# Additional data sources could be considered (please add links)&lt;br /&gt;
#* WASC [http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database Web Hacking Incident Database]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371616ef WHID Top Attack Methods for 2012]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371786H4 WHID Top App Weaknesses for 2012]&lt;br /&gt;
#* Firehosts Web Application Attack Reports&lt;br /&gt;
#** [http://www.firehost.com/company/newsroom/web-application-attack-report-fourth-quarter-2012 Web Application Attack Report for Q4 2012]&lt;br /&gt;
#* Imperva's Web Application Attack Reports&lt;br /&gt;
#** [http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed3.pdf Web Application Attack Report for Q3 2012]&lt;br /&gt;
#* Prolexic Attack Report&lt;br /&gt;
#** [http://www.prolexic.com/pdf/Prolexic_Q212_Attack_Report_071212.pdf DDoS Attack Report for Q2 2012]&lt;br /&gt;
# Additional reports could be considered:&lt;br /&gt;
#* Annual Symantec Internet Threat Reports&lt;br /&gt;
#* Datalossdb&lt;br /&gt;
#* IBM XForce threat reports&lt;br /&gt;
#* Akamai State of the Internet Reports&lt;br /&gt;
# Public forum to brainstorm and discuss key topics&lt;br /&gt;
# Remove corporate logos from the Top Ten PDF and provide a &amp;quot;Who we are&amp;quot; link similar to Apache for maximum vendor neutrality: http://hadoop.apache.org/who.html&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
# The Three Cycle Reasons. Why OWASP Top 10 is release every three year cycle? &lt;br /&gt;
: Here are the reasons:&lt;br /&gt;
a) The field does evolve pretty quick but Top 10 risks not substantially change every single year. Release every year is too much.&lt;br /&gt;
b) It takes a lot of work to produce OWASP Top 10 update and spacing it out balances between the effort to produce and the amount of change when its updated.&lt;br /&gt;
c) Lots of organizations, tools, etc, organize to the OWASP Top 10. So if it was published every single year, then everyone that chooses to align themselves to each update would have to do that work every year. &lt;br /&gt;
# ...&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148627</id>
		<title>Top 10 2013/ProjectMethodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148627"/>
				<updated>2013-03-27T07:29:15Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* FAQ */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Goal=&lt;br /&gt;
'''The goal of this page is to provide the baseline of knowledge to begin a thoughtful conversation of enhancements and changes to continue growing the OWASP top 10.'''&lt;br /&gt;
&lt;br /&gt;
=About=&lt;br /&gt;
&lt;br /&gt;
This page is intended to provide greater clarity on the development methodology of the OWASP Top 10.  This page provides information on the data sources used as input to the top 10, the current development processes, suggestions to improve involvement and participation, and also an FAQ to cover common questions &amp;amp; concerns.&lt;br /&gt;
&lt;br /&gt;
This is a wiki and editable by anyone with an OWASP account. Please constructively contribute to the conversation.  Additional discussions should also take place within the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP top 10 mailing list].&lt;br /&gt;
&lt;br /&gt;
=Current Methodology=&lt;br /&gt;
The 2010 and later versions of OWASP Top 10 are organized based on the [[OWASP_Risk_Rating_Methodology]], adjusted for the fact that the Top 10 is independent of any particular system. This adjusted methodology is documented in the OWASP Top 10 for 2010 here: [[Top_10_2010-Notes_About_Risk]].&lt;br /&gt;
&lt;br /&gt;
This resulted in 4 risk factors used to calculate the order of the Top 10, 3 Likelihood Factors and 1 Impact Factor. These factors are:&lt;br /&gt;
* Likelihood of an Application Having that Vulnerability (Prevalence)&lt;br /&gt;
* Likelihood of an Attacker Discovering that Vulnerability (Detectability)&lt;br /&gt;
* Likelihood of An Attacker Successfully Exploiting that Vulnerability (Exploitability)&lt;br /&gt;
* Typical Technical Impact if that Vulnerability is Successfully Exploited (Impact)&lt;br /&gt;
Each of these factors is scored on a scale from 1 through 3, except for XSS, which has a prevalence of 4&lt;br /&gt;
&lt;br /&gt;
The Top 10 uses data sources provided by a variety of companies (see [[Top_10_2013/ProjectMethodology#Current_Data_Sources sources]]) to calculate Vulnerability Prevalence. We would love to use similar data to help calculate the scores for the other risk factors if that data is available (which is one of the improvement suggestions recommended below).&lt;br /&gt;
&lt;br /&gt;
The process for producing an update to the OWASP Top 10 is generally as follows:&lt;br /&gt;
# Collect prevalence data from data suppliers.&lt;br /&gt;
# Rank prevalence data for each supplier and then aggregate the results to create an overall prevalence ranking for this update to the Top 10.&lt;br /&gt;
# Determine the values of the other risk factors based on professional opinion. (This step not done prior to 2010)&lt;br /&gt;
#* Adjustments are sometimes done based on professional opinion (like adding CSRF in 2007, and Vulnerable Libraries in 2013)&lt;br /&gt;
# Calculate the Top 10 order&lt;br /&gt;
# Write a Draft/Release Candidate&lt;br /&gt;
# For 2010, a Draft was reviewed by the Data Contributors and other members of the OWASP Community, and the core commenters/contributors to the Release Candidate and Final Release were acknowledged here: [[Top_10_2010-Introduction]] (About 15 individuals/groups)&lt;br /&gt;
#* Note, for 2013 this internal project review step was eliminated in order to get the release candidate out for public comment faster&lt;br /&gt;
# Publish Release Candidate for public comment (Prior to 2010 there was no release candidate, just a final release)&lt;br /&gt;
# Accept comments during a comment period&lt;br /&gt;
# Interact with comment providers to update the Top 10&lt;br /&gt;
# Publish all provided comments&lt;br /&gt;
# Publish a Final Release&lt;br /&gt;
&lt;br /&gt;
This certainly doesn't cover every nuance of what it takes to produce the Top 10. For example, one of the most common comments is &amp;quot;Why don't you combine these two items into one to make room for my favorite Risk?&amp;quot;. Like combining XSS into Injection, since XSS is really just a client side injection issue. The goal of the OWASP Top 10 is to raise awareness of the most important Risks, not to include every possible Risk we can stuff into the Top 10. So, in some cases, we've kept related issues separate to try to increase awareness of each issue. But there is always debate as to what's best, which is clearly subjective. In the 2013 release candidate, we combined cryptographic storage and communications into a single category, and then pulled use of known vulnerable libraries out of the Security Misconfiguration category in order to bring more attention to the use of Known Vulnerable Libraries since we believe this is an extremely important issue that deserves more attention as the use of libraries becomes more and more prevalent. In past updates, to make room for new issues, we dropped the least important issues, like error handling and denial of service, which some people agreed with, but others did not.&lt;br /&gt;
&lt;br /&gt;
In 2010, the Release Candidate process worked like this:&lt;br /&gt;
# It was open for public comment for several months&lt;br /&gt;
# Dave Wichers, primarily, interacted via email with each comment provider to address their comments or provide rationale as to why no change was thought to be most appropriate.&lt;br /&gt;
# All provided comments were published at:&lt;br /&gt;
#* [http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 - 2010 Public Comments], and&lt;br /&gt;
#* [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf Kai Jendrian's Top 10 - 2010 Comments]&lt;br /&gt;
# The final version was published.&lt;br /&gt;
&lt;br /&gt;
In 2013, the process is currently like so:&lt;br /&gt;
# Public comment period of Release Candidate is currently from February through end of March 2013. (This can be extended if necessary)&lt;br /&gt;
# We were planning on following the same process as for 2010 to complete the Top 10, but clearly the OWASP Community wants to get more heavily involved in producing the Final Release, which is great.&lt;br /&gt;
# So, at this point, the process for completing the 2013 Top 10 is TBD, subject to your input/suggestions.&lt;br /&gt;
&lt;br /&gt;
=Current Prevalence Data Sources=&lt;br /&gt;
* Aspect Security&lt;br /&gt;
* HP (Results for both Fortify and WebInspect)&lt;br /&gt;
* Minded Security - [http://blog.mindedsecurity.com/2013/02/real-life-vulnerabilities-statistics.html Statistics]&lt;br /&gt;
* Softtek&lt;br /&gt;
* Trustwave Spiderlabs - [http://www2.trustwave.com/rs/trustwave/images/2013-Global-Security-Report.pdf Statistics]&lt;br /&gt;
* Veracode – [http://info.veracode.com/rs/veracode/images/VERACODE-SOSS-V4.PDF Statistics]&lt;br /&gt;
* WhiteHat Security – [https://www.whitehatsec.com/home/resource/stats.html Statistics]&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute your vulnerability statistics to the OWASP Top 10 project, please send your data to: dave.wichers@owasp.org. Please indicate if its OK for OWASP to publish this raw data. If you have already published this data, please provide us a link to the public posting.&lt;br /&gt;
&lt;br /&gt;
Note: In the first version of the Top 10 in 2003, we started with the MITRE CVE data, and each update expanded the number of prevalence data contributors. Unfortunately, the CVE data for 2011/2012 wasn't available for the 2013 release, which is why its not included this year.&lt;br /&gt;
&lt;br /&gt;
=Suggested Enhancements=&lt;br /&gt;
Note: This is a wiki - please add new suggestions into this page.&lt;br /&gt;
&lt;br /&gt;
# Use a public wiki or [http://code.google.com/p/owasptop10/issues/list google issues] to capture feedback - mailing lists are tough and things get lost&lt;br /&gt;
# Use a public wiki to allow for public edits, not just feedback. These edits will all be tracked with rollback capabilities for editing and will allow the history of Top 10 edit history to be &amp;quot;public&amp;quot; for maximum &amp;quot;open&amp;quot; and &amp;quot;visibility&amp;quot;.&lt;br /&gt;
# Establish a Top 10 panel to evaluate and make final decisions on inclusion &amp;amp; ranking&lt;br /&gt;
#* Not feasible for everyone to vote on every item&lt;br /&gt;
#* A diverse panel representing various verticals (vendor, enterprise, offense/defense, etc) &lt;br /&gt;
# Additional data sources could be considered (please add links)&lt;br /&gt;
#* WASC [http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database Web Hacking Incident Database]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371616ef WHID Top Attack Methods for 2012]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371786H4 WHID Top App Weaknesses for 2012]&lt;br /&gt;
#* Firehosts Web Application Attack Reports&lt;br /&gt;
#** [http://www.firehost.com/company/newsroom/web-application-attack-report-fourth-quarter-2012 Web Application Attack Report for Q4 2012]&lt;br /&gt;
#* Imperva's Web Application Attack Reports&lt;br /&gt;
#** [http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed3.pdf Web Application Attack Report for Q3 2012]&lt;br /&gt;
#* Prolexic Attack Report&lt;br /&gt;
#** [http://www.prolexic.com/pdf/Prolexic_Q212_Attack_Report_071212.pdf DDoS Attack Report for Q2 2012]&lt;br /&gt;
# Additional reports could be considered:&lt;br /&gt;
#* Annual Symantec Internet Threat Reports&lt;br /&gt;
#* Datalossdb&lt;br /&gt;
#* IBM XForce threat reports&lt;br /&gt;
#* Akamai State of the Internet Reports&lt;br /&gt;
# Public forum to brainstorm and discuss key topics&lt;br /&gt;
# Remove corporate logos from the Top Ten PDF and provide a &amp;quot;Who we are&amp;quot; link similar to Apache for maximum vendor neutrality: http://hadoop.apache.org/who.html&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
# The Three Cycle Reasons. Why OWASP Top 10 is release every three year cycle? &lt;br /&gt;
: Here are three reasons why OWASP release its Top 10 every three year:&lt;br /&gt;
##The field does evolve pretty quick but Top 10 risks not substantially change every single year. Release every year is too much.&lt;br /&gt;
## It takes a lot of work to produce OWASP Top 10 update and spacing it out balances between the effort to produce and the amount of change when its updated.&lt;br /&gt;
## Lots of organizations, tools, etc, organize to the OWASP Top 10. So if it was published every single year, then everyone that chooses to align themselves to each update would have to do that work every year. &lt;br /&gt;
# ...&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148626</id>
		<title>Top 10 2013/ProjectMethodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2013/ProjectMethodology&amp;diff=148626"/>
				<updated>2013-03-27T07:28:54Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* FAQ */  Add why three year cycles reasons&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Goal=&lt;br /&gt;
'''The goal of this page is to provide the baseline of knowledge to begin a thoughtful conversation of enhancements and changes to continue growing the OWASP top 10.'''&lt;br /&gt;
&lt;br /&gt;
=About=&lt;br /&gt;
&lt;br /&gt;
This page is intended to provide greater clarity on the development methodology of the OWASP Top 10.  This page provides information on the data sources used as input to the top 10, the current development processes, suggestions to improve involvement and participation, and also an FAQ to cover common questions &amp;amp; concerns.&lt;br /&gt;
&lt;br /&gt;
This is a wiki and editable by anyone with an OWASP account. Please constructively contribute to the conversation.  Additional discussions should also take place within the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP top 10 mailing list].&lt;br /&gt;
&lt;br /&gt;
=Current Methodology=&lt;br /&gt;
The 2010 and later versions of OWASP Top 10 are organized based on the [[OWASP_Risk_Rating_Methodology]], adjusted for the fact that the Top 10 is independent of any particular system. This adjusted methodology is documented in the OWASP Top 10 for 2010 here: [[Top_10_2010-Notes_About_Risk]].&lt;br /&gt;
&lt;br /&gt;
This resulted in 4 risk factors used to calculate the order of the Top 10, 3 Likelihood Factors and 1 Impact Factor. These factors are:&lt;br /&gt;
* Likelihood of an Application Having that Vulnerability (Prevalence)&lt;br /&gt;
* Likelihood of an Attacker Discovering that Vulnerability (Detectability)&lt;br /&gt;
* Likelihood of An Attacker Successfully Exploiting that Vulnerability (Exploitability)&lt;br /&gt;
* Typical Technical Impact if that Vulnerability is Successfully Exploited (Impact)&lt;br /&gt;
Each of these factors is scored on a scale from 1 through 3, except for XSS, which has a prevalence of 4&lt;br /&gt;
&lt;br /&gt;
The Top 10 uses data sources provided by a variety of companies (see [[Top_10_2013/ProjectMethodology#Current_Data_Sources sources]]) to calculate Vulnerability Prevalence. We would love to use similar data to help calculate the scores for the other risk factors if that data is available (which is one of the improvement suggestions recommended below).&lt;br /&gt;
&lt;br /&gt;
The process for producing an update to the OWASP Top 10 is generally as follows:&lt;br /&gt;
# Collect prevalence data from data suppliers.&lt;br /&gt;
# Rank prevalence data for each supplier and then aggregate the results to create an overall prevalence ranking for this update to the Top 10.&lt;br /&gt;
# Determine the values of the other risk factors based on professional opinion. (This step not done prior to 2010)&lt;br /&gt;
#* Adjustments are sometimes done based on professional opinion (like adding CSRF in 2007, and Vulnerable Libraries in 2013)&lt;br /&gt;
# Calculate the Top 10 order&lt;br /&gt;
# Write a Draft/Release Candidate&lt;br /&gt;
# For 2010, a Draft was reviewed by the Data Contributors and other members of the OWASP Community, and the core commenters/contributors to the Release Candidate and Final Release were acknowledged here: [[Top_10_2010-Introduction]] (About 15 individuals/groups)&lt;br /&gt;
#* Note, for 2013 this internal project review step was eliminated in order to get the release candidate out for public comment faster&lt;br /&gt;
# Publish Release Candidate for public comment (Prior to 2010 there was no release candidate, just a final release)&lt;br /&gt;
# Accept comments during a comment period&lt;br /&gt;
# Interact with comment providers to update the Top 10&lt;br /&gt;
# Publish all provided comments&lt;br /&gt;
# Publish a Final Release&lt;br /&gt;
&lt;br /&gt;
This certainly doesn't cover every nuance of what it takes to produce the Top 10. For example, one of the most common comments is &amp;quot;Why don't you combine these two items into one to make room for my favorite Risk?&amp;quot;. Like combining XSS into Injection, since XSS is really just a client side injection issue. The goal of the OWASP Top 10 is to raise awareness of the most important Risks, not to include every possible Risk we can stuff into the Top 10. So, in some cases, we've kept related issues separate to try to increase awareness of each issue. But there is always debate as to what's best, which is clearly subjective. In the 2013 release candidate, we combined cryptographic storage and communications into a single category, and then pulled use of known vulnerable libraries out of the Security Misconfiguration category in order to bring more attention to the use of Known Vulnerable Libraries since we believe this is an extremely important issue that deserves more attention as the use of libraries becomes more and more prevalent. In past updates, to make room for new issues, we dropped the least important issues, like error handling and denial of service, which some people agreed with, but others did not.&lt;br /&gt;
&lt;br /&gt;
In 2010, the Release Candidate process worked like this:&lt;br /&gt;
# It was open for public comment for several months&lt;br /&gt;
# Dave Wichers, primarily, interacted via email with each comment provider to address their comments or provide rationale as to why no change was thought to be most appropriate.&lt;br /&gt;
# All provided comments were published at:&lt;br /&gt;
#* [http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 - 2010 Public Comments], and&lt;br /&gt;
#* [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf Kai Jendrian's Top 10 - 2010 Comments]&lt;br /&gt;
# The final version was published.&lt;br /&gt;
&lt;br /&gt;
In 2013, the process is currently like so:&lt;br /&gt;
# Public comment period of Release Candidate is currently from February through end of March 2013. (This can be extended if necessary)&lt;br /&gt;
# We were planning on following the same process as for 2010 to complete the Top 10, but clearly the OWASP Community wants to get more heavily involved in producing the Final Release, which is great.&lt;br /&gt;
# So, at this point, the process for completing the 2013 Top 10 is TBD, subject to your input/suggestions.&lt;br /&gt;
&lt;br /&gt;
=Current Prevalence Data Sources=&lt;br /&gt;
* Aspect Security&lt;br /&gt;
* HP (Results for both Fortify and WebInspect)&lt;br /&gt;
* Minded Security - [http://blog.mindedsecurity.com/2013/02/real-life-vulnerabilities-statistics.html Statistics]&lt;br /&gt;
* Softtek&lt;br /&gt;
* Trustwave Spiderlabs - [http://www2.trustwave.com/rs/trustwave/images/2013-Global-Security-Report.pdf Statistics]&lt;br /&gt;
* Veracode – [http://info.veracode.com/rs/veracode/images/VERACODE-SOSS-V4.PDF Statistics]&lt;br /&gt;
* WhiteHat Security – [https://www.whitehatsec.com/home/resource/stats.html Statistics]&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute your vulnerability statistics to the OWASP Top 10 project, please send your data to: dave.wichers@owasp.org. Please indicate if its OK for OWASP to publish this raw data. If you have already published this data, please provide us a link to the public posting.&lt;br /&gt;
&lt;br /&gt;
Note: In the first version of the Top 10 in 2003, we started with the MITRE CVE data, and each update expanded the number of prevalence data contributors. Unfortunately, the CVE data for 2011/2012 wasn't available for the 2013 release, which is why its not included this year.&lt;br /&gt;
&lt;br /&gt;
=Suggested Enhancements=&lt;br /&gt;
Note: This is a wiki - please add new suggestions into this page.&lt;br /&gt;
&lt;br /&gt;
# Use a public wiki or [http://code.google.com/p/owasptop10/issues/list google issues] to capture feedback - mailing lists are tough and things get lost&lt;br /&gt;
# Use a public wiki to allow for public edits, not just feedback. These edits will all be tracked with rollback capabilities for editing and will allow the history of Top 10 edit history to be &amp;quot;public&amp;quot; for maximum &amp;quot;open&amp;quot; and &amp;quot;visibility&amp;quot;.&lt;br /&gt;
# Establish a Top 10 panel to evaluate and make final decisions on inclusion &amp;amp; ranking&lt;br /&gt;
#* Not feasible for everyone to vote on every item&lt;br /&gt;
#* A diverse panel representing various verticals (vendor, enterprise, offense/defense, etc) &lt;br /&gt;
# Additional data sources could be considered (please add links)&lt;br /&gt;
#* WASC [http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database Web Hacking Incident Database]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371616ef WHID Top Attack Methods for 2012]&lt;br /&gt;
#** [https://www.google.com/fusiontables/DataSource?snapid=S91371786H4 WHID Top App Weaknesses for 2012]&lt;br /&gt;
#* Firehosts Web Application Attack Reports&lt;br /&gt;
#** [http://www.firehost.com/company/newsroom/web-application-attack-report-fourth-quarter-2012 Web Application Attack Report for Q4 2012]&lt;br /&gt;
#* Imperva's Web Application Attack Reports&lt;br /&gt;
#** [http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed3.pdf Web Application Attack Report for Q3 2012]&lt;br /&gt;
#* Prolexic Attack Report&lt;br /&gt;
#** [http://www.prolexic.com/pdf/Prolexic_Q212_Attack_Report_071212.pdf DDoS Attack Report for Q2 2012]&lt;br /&gt;
# Additional reports could be considered:&lt;br /&gt;
#* Annual Symantec Internet Threat Reports&lt;br /&gt;
#* Datalossdb&lt;br /&gt;
#* IBM XForce threat reports&lt;br /&gt;
#* Akamai State of the Internet Reports&lt;br /&gt;
# Public forum to brainstorm and discuss key topics&lt;br /&gt;
# Remove corporate logos from the Top Ten PDF and provide a &amp;quot;Who we are&amp;quot; link similar to Apache for maximum vendor neutrality: http://hadoop.apache.org/who.html&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
# The Three Cycle Reasons. Why OWASP Top 10 is release every three year cycle? &lt;br /&gt;
: Here are three reasons why OWASP release its Top 10 every three year:&lt;br /&gt;
: #The field does evolve pretty quick but Top 10 risks not substantially change every single year. Release every year is too much.&lt;br /&gt;
: # It takes a lot of work to produce OWASP Top 10 update and spacing it out balances between the effort to produce and the amount of change when its updated.&lt;br /&gt;
: # Lots of organizations, tools, etc, organize to the OWASP Top 10. So if it was published every single year, then everyone that chooses to align themselves to each update would have to do that work every year. &lt;br /&gt;
# ...&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Video&amp;diff=142052</id>
		<title>Category:OWASP Video</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Video&amp;diff=142052"/>
				<updated>2013-01-09T06:14:39Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* OWASP Summit 2011 */ add my youtube collection&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;font-size:7pt;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;openx&amp;gt;&amp;lt;/openx&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Disclaimer: Banner ads are not endorsements, and reflect the messages of the advertiser only. | [https://www.owasp.org/index.php/Advertising More Information]&amp;lt;/b&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Video Collection ==&lt;br /&gt;
&lt;br /&gt;
OWASP attempts to make videos of presentations made by our members and at our conferences concerning application security whenever possible. The slides for most of these presentations are available, linked to the conference agendas (please link them if possible!).&lt;br /&gt;
&lt;br /&gt;
== Videos ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
=== OWASP AppSecUSA 2011 ===&lt;br /&gt;
[http://2011.appsecusa.org/schedule.html#slides_video Videos and Slides]&lt;br /&gt;
&lt;br /&gt;
=== OWASP Summit 2011 ===&lt;br /&gt;
OWASP Summit 2011 Vimeo videos are available at &lt;br /&gt;
* [http://vimeo.com/channels/owaspsummit http://vimeo.com/channels/owaspsummit].&lt;br /&gt;
* http://www.vimeo.com/25335824&lt;br /&gt;
* [http://www.youtube.com/watch?v=GRWCgbZF3_g Chapter Leader Session]&lt;br /&gt;
* [http://www.youtube.com/watch?v=O0eD-CeQld4 Browser Security]&lt;br /&gt;
* [http://www.youtube.com/watch?v=ZB2JM4xgtBQ ESAPI]&lt;br /&gt;
* [http://www.youtube.com/watch?v=w6nuPCxCyC8 Governance Session #1]&lt;br /&gt;
* [http://www.youtube.com/watch?v=6HnA3NY7gR0 Governance Session #2]&lt;br /&gt;
* [http://www.youtube.com/watch?v=VKrxVTenV7I Mobile Security]&lt;br /&gt;
* [http://www.youtube.com/watch?v=RStrwZGgz0U Wrap Up Session #1]&lt;br /&gt;
* [http://www.youtube.com/watch?v=_pV8RvaBIfg Wrap Up Session #2]&lt;br /&gt;
&lt;br /&gt;
===OWASP Appsec Tutorial Series===&lt;br /&gt;
OWASP Appsec Tutorial Series [https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series Click Here]&lt;br /&gt;
&lt;br /&gt;
===OWASP Appsec DC 2010===&lt;br /&gt;
OWASP Appsec DC 2010 [http://vimeo.com/groups/asdc10/videos/sort:plays Click Here]&lt;br /&gt;
&lt;br /&gt;
===OWASP USA 2010===&lt;br /&gt;
OWASP USA 2010 [http://vimeo.com/user4863863/videos/sort:plays Click Here]&lt;br /&gt;
&lt;br /&gt;
===OWASP EU 2010===&lt;br /&gt;
OWASP Stockholm Sweden 2010 [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden#tab=June_23 Click Here] and [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden#tab=June_24 Click Here]  &lt;br /&gt;
&lt;br /&gt;
=== OWASP FROC 2010 ===&lt;br /&gt;
FROC 2010 - [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010#tab=Agenda Click Here]&lt;br /&gt;
&lt;br /&gt;
=== OWASP USA 2009 ===&lt;br /&gt;
APPSEC DC 2009 - [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009_Schedule#tab=Talks_11.2F12 Click Here]&lt;br /&gt;
&lt;br /&gt;
=== OWASP EU ===&lt;br /&gt;
OWASP EU 2009 - [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2009_-_Poland#tab=Conference_-_May_13 Here] and [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2009_-_Poland#tab=Conference_-_May_14 Here]  &lt;br /&gt;
&lt;br /&gt;
=== OWASP Israel 2008 ===&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC) Click Here]&lt;br /&gt;
&lt;br /&gt;
=== OWASP USA 2008 ===&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference Click Here]&lt;br /&gt;
&lt;br /&gt;
=== SnowFROC ===&lt;br /&gt;
;[http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009  OWASP SnowFROC from Denver, CO 2009]&lt;br /&gt;
&lt;br /&gt;
=== OWASP Minneapolis/St. Paul (OWASP MSP) ===&lt;br /&gt;
&lt;br /&gt;
Presentations from the [[Minneapolis St Paul | OWASP Minneapolis-St. Paul (OWASP MSP) chapter]] events hosted in the Twin Cities area of Minnesota are now on their own page.  Please visit [[OWASPMSP_Videos]] page for links to them.  Some of the presenters include Pravir Chandra, Bruce Schneier, Jeremiah Grossman, Ryan Barnett, and many others.&lt;br /&gt;
&lt;br /&gt;
=== Black Hat 2006 ===&lt;br /&gt;
&lt;br /&gt;
'''From Black Hat 2006:'''&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=941077664562737284&amp;amp;q=owasp Dinis Cruz @ BlackHat 2006 with FSTV]&lt;br /&gt;
:Dinis Cruz, leader of the OWASP.NET project joins us to talk about .NET, web security tools, the future of OWASP, and Open Source Software. OWASP - 30 min - Aug 30, 2006&lt;br /&gt;
&lt;br /&gt;
=== AppSec Washington 2005 ===&lt;br /&gt;
&lt;br /&gt;
'''From the [[AppSec_Washington_2005/Agenda | 2nd U.S. OWASP Conference held Oct 11-12, 2005]] - Day 1:'''&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-2481289516847680871&amp;amp;q=owasp OWASP_Intro_DaveWichers_Key_JoeJarzombek_RonRoss.mp4]&lt;br /&gt;
:OWASP Intro: Dave Wichers - Key Note Day 1: Joe Jarzombek - Dir. of Software Assurance - DHS - Software Assurance: Considerations for Advancing a National Strategy to Secure Cyberspace &amp;amp; Ron Ross -FISMA Project Lead - NIST - Status of the Federal Information Security Management Act (FISMA) Project. OWASP - 2 hr 7 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=3853779542023264815&amp;amp;q=owasp OWASP_JackDanahy_The_Business_Case_for_Software_Security_Assurance.mp4]&lt;br /&gt;
:OWASP Jack Danahy - The Business Case for Software Security Assurance. OWASP - 1 hr 2 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=5758230888370998733&amp;amp;q=owasp OWASP_ArianEvans_Tools_SurveyProject.mp4]&lt;br /&gt;
:OWASP Arian Evans - The OWASP Tools Survey Project. OWASP - 1 hr 18 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-2492965730809426450&amp;amp;q=owasp OWASP_DinizCruz_Rooting_the_CLR.mp4]&lt;br /&gt;
:OWASP Diniz Cruz - Rooting the CLR. OWASP - 1 hr 22 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-5233500471539001436&amp;amp;q=owasp OWASP_PaulBlack_RickKuhn.mp4]&lt;br /&gt;
:OWASP Paul Black - NIST - Developing a Reference Dataset &amp;amp; Rick Kuhn - NIST - Software Fault Interactions. OWASP - 1 hr 9 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=4473926180612118549&amp;amp;q=owasp OWASP_AlexSmolen_Application_Logic_Defense.mp4]&lt;br /&gt;
:OWASP Alex Smolen - Application Logic Defense. OWASP - 36 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=4379894308228900017&amp;amp;q=owasp OWASP_DanielCuthbert_Evolution_WebAppPenTest.mp4]&lt;br /&gt;
:OWASP Daniel Cuthbert - OWASP Testing Guide Lead - The Evolution Web App Pen Testing. OWASP - 1 hr 11 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
'''The [[AppSec_Washington_2005/Agenda | 2nd U.S. OWASP Conference]] Day 2:'''&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-9110574247136866679&amp;amp;q=owasp OWASP_IraWinkler_Secrets_of_Superspies.mp4]&lt;br /&gt;
:OWASP Ira Winkler - Keynote Day 2: Secrets of Superspies &amp;amp; Jeremy Poteet - In the Line of Fire: Defending Highly Visible Targets. OWASP - 2 hr 2 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-5332911124544076749&amp;amp;q=owasp OWASP_JeffWilliams_OWASP_Guide_and_Membership.mp4]&lt;br /&gt;
:OWASP Jeff Williams - OWASP Development Guide and OWASP Membership Plan. OWASP - 1 hr 12 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=7947858567235952851&amp;amp;q=owasp OWASP_DinizCruz_DotNet_Tools_Project.mp4]&lt;br /&gt;
:OWASP Diniz Cruz - The .Net Tools Project. OWASP - 1 hr 15 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=2018648061521175729&amp;amp;q=owasp OWASP_MattFisher_WormsNowTargetingWebApps.mp4]&lt;br /&gt;
:OWASP Matt Fisher - Worms Now Targeting Web Applications. OWASP - 49 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=8437304318271455155&amp;amp;q=owasp OWASP_RoganDawes_AdvancedFeaturesofWebScarab.mp4]&lt;br /&gt;
:OWASP Rogan Dawes - Advanced Features of OWASP WebScarab. OWASP - 1 hr 24 min - Oct 12, 2005 &lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-2492965730809426450&amp;amp;q=owasp OWASP_JohnSteven_Building_a_Scalable_Software_Security_Practice.mp4]&lt;br /&gt;
:OWASP John Steven - Building a Scalable Software Security Practice. OWASP - 1 hr 19 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-1807054604513842127&amp;amp;q=owasp OWASP_GunnerPeterson_IntegratingIdentityServicesintoWebApps.mp4]&lt;br /&gt;
:OWASP Gunnar Peterson - Integrating Identity Services into Web Apps. OWASP - 35 min - Oct 12, 2005&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Indonesia&amp;diff=139980</id>
		<title>Indonesia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Indonesia&amp;diff=139980"/>
				<updated>2012-11-21T08:54:36Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Indonesia|extra=The chapter leader is [mailto:za@owasp.org Zaki Akhmad]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Indonesia|emailarchives=http://lists.owasp.org/pipermail/owasp-Indonesia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= Beranda =&lt;br /&gt;
Salam, &lt;br /&gt;
&lt;br /&gt;
Selamat datang di halaman OWASP Indonesia! OWASP Indonesia merupakan salah satu ''chapter'' OWASP yang tersebar di berbagai belahan dunia. OWASP sendiri merupakan organisasi nirlaba yang fokus pada keamanan aplikasi dan web. Kehadiran OWASP Indonesia diharapkan mampu memberikan kontribusi dalam meningkatkan keamanan aplikasi &amp;amp; web yang ada di Indonesia. &lt;br /&gt;
&lt;br /&gt;
Selamat mengeksplorasi lebih jauh OWASP Indonesia dengan membuka tab-tab yang ada di halaman ini.   &lt;br /&gt;
&lt;br /&gt;
= Tentang =&lt;br /&gt;
=== Sejarah ===&lt;br /&gt;
OWASP Indonesia berdiri pada tanggal 11 Juli 2007. Chapter ini pertama kali dipimpin oleh Azwar Rosyadi. Selanjutnya Azwar Rosyadi tak lagi aktif di OWASP Indonesia. Sejak Desember 2008, [[User:Zakiakhmad|Zaki Akhmad]] berinisiatif memimpin chapter ini. &lt;br /&gt;
&lt;br /&gt;
=== Aktivitas ===&lt;br /&gt;
Hingga saat ini belum dilaksanakan pertemuan rutin. Aktivitas OWASP Indonesia baru sebatas dilakukan di milis saja. Pada Agustus 2010, Tedi Heriyanto berinisiatif mengkoordinir penerjemahan presentasi OWASP Top 10 ke Bahasa Indonesia. &lt;br /&gt;
&lt;br /&gt;
= Agenda =&lt;br /&gt;
=== Perpanjang Domain OWASP.or.id ===&lt;br /&gt;
Domain OWASP.or.id telah diperpanjang hingga akhir tahun 2013. Sejauh ini server OWASP.or.id baru mencermin materi video AppSec. Apakah Anda memiliki ide agar domain ini tidak percuma diperpanjang?&lt;br /&gt;
&lt;br /&gt;
=== Situs OWASP.or.id ===&lt;br /&gt;
Januari 2012. Saat ini OWASP Indonesia memiliki situs dengan domain [http://owasp.or.id OWASP.or.id]. Situs ini masih dalam tahap pengembangan namun sudah bisa diakses. Untuk sementara situs ini menyediakan materi-materi OWASP. Diharapkan dengan menyediakan akses lokal, materi-materi OWASP dapat lebih mudah diakses dari Indonesia. &lt;br /&gt;
&lt;br /&gt;
=== Indonesia Internet Security Forum 2011 ===&lt;br /&gt;
Desember 2011. OWASP Indonesia akan menjadi salah satu panelis dalam acara Indonesia Internet Security Forum 2011 (IISF 2011). Acara ini akan dilaksanakan pada hari Rabu, 14 Desember 2011. Detail acara dapat dilihat pada [http://aptika.kominfo.go.id/registration/IISF2011 http://aptika.kominfo.go.id/registration/IISF2011] , atau akses berkas [[File:Agenda_IISF_Tentative_20111203.pdf]] agenda.&lt;br /&gt;
&lt;br /&gt;
=== IASA Business Architecture Summit 2011 ===&lt;br /&gt;
Charles Lim, dari SGU, akan memberikan presentasi mengenai OWASP Top 10 dalam acara IASA Business Architecture Summit 2011. Acara akan dilaksanakan pada hari Kamis, 1 Desember 2011, pukul 14.30 - 15.00, di Hotel Sahid, Jakarta. &lt;br /&gt;
&lt;br /&gt;
==== Arsip ====&lt;br /&gt;
&lt;br /&gt;
=== SGU menjadi OWASP University Supporter ===&lt;br /&gt;
[[File:SGU_OWASPUniversitySupporter.jpg|right|300px|thumb|SGU - OWASP University Supporter]]&lt;br /&gt;
Pada hari Senin 25 April 2011, telah dilakukan penandatanganan MoU antara SGU dengan OWASP Indonesia. SGU saat ini telah menjadi OWASP University Supporter. SGU menjadi universitas di Indonesia yang pertama menjadi OWASP University Supporter.&lt;br /&gt;
&lt;br /&gt;
=== Kopi Darat, Maret 2011 ===&lt;br /&gt;
Jakarta, 21 Februari 2011, rencananya pada hari Kamis 24 Maret 2011 di Senayan City akan diadakan kopi darat dengan agenda: perkenalan, rencana OWASP Indonesia, dan cerita dari OWASP Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
=== Blog OWASP Indonesia ===&lt;br /&gt;
Jakarta, 25 Februari 2011, dibuat blog OWASP Indonesia di [http://owaspid.blogspot.com http://owaspid.blogspot.com] sebagai salah satu cara berkomunikasi dengan komunitas OWASP Indonesia. &lt;br /&gt;
&lt;br /&gt;
=== Hasil Kopi Darat 23 Februari 2011===&lt;br /&gt;
Jakarta, 23 Februari 2011, kopi darat OWASP Indonesia dihadiri oleh Charles dan Zaki. Dilakukan pembicaraan mengenai rencana SGU menjadi OWASP University Supporter dan berbagi cerita dari OWASP Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
=== Kopi Darat, Februari 2011 ===&lt;br /&gt;
Jakarta, 18 Februari 2011, akan diadakan kopi darat pada hari Rabu 23 Februari 2011 di Senayan City dengan agenda: SGU menjadi OWASP University Supporter dan cerita dari OWASP Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
=== Partisipasi di OWASP Summit 2011 ===&lt;br /&gt;
Jakarta, 8 Februari 2011, Zaki dengan dukungan dari OWASP, akhirnya berangkat ke Lisbon, Portugal, untuk ikut berpartisipasi di OWASP Summit 2011. &lt;br /&gt;
&lt;br /&gt;
===SGU Mengajukan Diri sebagai OWASP University Supporter===&lt;br /&gt;
Jakarta, 28 Januari 2011, [http://www.sgu.ac.id SGU (Swiss German University)] melalui Charles Lim mengajukan diri untuk menjadi OWASP University Supporter. &lt;br /&gt;
&lt;br /&gt;
=== Penerjemahan Situs OWASP.org ===&lt;br /&gt;
Jakarta, 18 Januari 2011, menurut Anda perlukah situs OWASP.org diterjemahkan ke Bahasa Indonesia? Bagi mereka yang memiliki batasan bahasa, hal ini bisa bermanfaat. &lt;br /&gt;
&lt;br /&gt;
=== Penerjemahan OWASP Top 10 ===&lt;br /&gt;
&lt;br /&gt;
Jakarta, 17 Januari 2011, Berangkat dari inisiatif TH, baru saja diselesaikan proyek penerjemahan dokumentasi OWASP Top 10 ke bahasa Indonesia. Berikut ini adalah dokumen OWASP Top 10 yang sudah diterjemahken ke Bahasa Indonesia. &lt;br /&gt;
&lt;br /&gt;
* [[File:OWASP_Top_10_-_2010_FINAL_Indonesia_v1.0.1.pdf]] OWASP Top 10 2010 Final Indonesia v1.0.1 (RC).&lt;br /&gt;
&lt;br /&gt;
= Penerjemahan =&lt;br /&gt;
* OWASP ASVS &lt;br /&gt;
* [[File:OWASP_Top_10_-_2010_FINAL_Indonesia_v1.0.1.pdf]] OWASP Top 10 2010 dalam Bahasa Indonesia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Kontribusi =&lt;br /&gt;
&lt;br /&gt;
= Lain-lain =&lt;br /&gt;
=== ISO DVD/CD OWASP ===&lt;br /&gt;
&lt;br /&gt;
Live-DVD/CD OWASP sangat membantu dalam mempelajari web application/database security. ISO Live-DVD/CD OWASP dapat diunduh di: &lt;br /&gt;
&lt;br /&gt;
* [http://nebula.indocisc.co.id/~za Cermin di IIX] &lt;br /&gt;
&lt;br /&gt;
Atau jika mengalami kesulitan mengunduh, silakan kontak [mailto:za@owasp.org Zaki Akhmad] disertai nama dan alamat jelas untuk dapat dikirimkan Live-DVD/CD OWASP.&lt;br /&gt;
&lt;br /&gt;
= Media Sosial =&lt;br /&gt;
=== Milis === &lt;br /&gt;
&lt;br /&gt;
OWASP telah menyediakan milis OWASP Indonesia di mail server-nya. Untuk bergabung dapat mengirimkan email kosong ke [mailto:owasp-indonesia-subscribe@lists.owasp.org alamat ini]. Lalu ikuti instruksi berikutnya yang dikirim via email. Untuk arsip milis bisa diakses di [https://lists.owasp.org/pipermail/owasp-indonesia halaman ini].&lt;br /&gt;
&lt;br /&gt;
=== Twitter ===&lt;br /&gt;
Silakan ikuti akun twitter [http://twitter.com/#!/owaspid @owaspid] untuk berita-berita seputar OWASP Indonesia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Indonesia]]&lt;br /&gt;
[[Category:Asia]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Indonesia&amp;diff=139979</id>
		<title>Indonesia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Indonesia&amp;diff=139979"/>
				<updated>2012-11-21T08:53:31Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Indonesia|extra=The chapter leader is [mailto:za@owasp.org Zaki Akhmad]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Indonesia|emailarchives=http://lists.owasp.org/pipermail/owasp-Indonesia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= Beranda =&lt;br /&gt;
Salam, &lt;br /&gt;
&lt;br /&gt;
Selamat datang di halaman OWASP Indonesia! OWASP Indonesia merupakan salah satu ''chapter'' OWASP yang tersebar di berbagai belahan dunia. OWASP sendiri merupakan organisasi nirlaba yang fokus pada keamanan aplikasi dan web. Kehadiran OWASP Indonesia diharapkan mampu memberikan kontribusi dalam meningkatkan keamanan aplikasi &amp;amp; web yang ada di Indonesia. &lt;br /&gt;
&lt;br /&gt;
Selamat mengeksplorasi lebih jauh OWASP Indonesia dengan membuka tab-tab yang ada di halaman ini.   &lt;br /&gt;
&lt;br /&gt;
= Tentang =&lt;br /&gt;
=== Sejarah ===&lt;br /&gt;
OWASP Indonesia berdiri pada tanggal 11 Juli 2007. Chapter ini pertama kali dipimpin oleh Azwar Rosyadi. Selanjutnya Azwar Rosyadi tak lagi aktif di OWASP Indonesia. Sejak Desember 2008, [[User:Zakiakhmad|Zaki Akhmad]] berinisiatif memimpin chapter ini. &lt;br /&gt;
&lt;br /&gt;
=== Aktivitas ===&lt;br /&gt;
Hingga saat ini belum dilaksanakan pertemuan rutin. Aktivitas OWASP Indonesia baru sebatas dilakukan di milis saja. Pada Agustus 2010, Tedi Heriyanto berinisiatif mengkoordinir penerjemahan presentasi OWASP Top 10 ke Bahasa Indonesia. &lt;br /&gt;
&lt;br /&gt;
= Agenda =&lt;br /&gt;
=== Perpanjang Domain OWASP.or.id ===&lt;br /&gt;
Domain OWASP.or.id telah diperpanjang hingga akhir tahun 2013. Sejauh ini server OWASP.or.id baru mencermin materi video AppSec. Apakah Anda memiliki ide agar domain ini tidak percuma diperpanjang?&lt;br /&gt;
&lt;br /&gt;
=== Situs OWASP.or.id ===&lt;br /&gt;
Januari 2012. Saat ini OWASP Indonesia memiliki situs dengan domain [http://owasp.or.id OWASP.or.id]. Situs ini masih dalam tahap pengembangan namun sudah bisa diakses. Untuk sementara situs ini menyediakan materi-materi OWASP. Diharapkan dengan menyediakan akses lokal, materi-materi OWASP dapat lebih mudah diakses dari Indonesia. &lt;br /&gt;
&lt;br /&gt;
=== Indonesia Internet Security Forum 2011 ===&lt;br /&gt;
Desember 2011. OWASP Indonesia akan menjadi salah satu panelis dalam acara Indonesia Internet Security Forum 2011 (IISF 2011). Acara ini akan dilaksanakan pada hari Rabu, 14 Desember 2011. Detail acara dapat dilihat pada [http://aptika.kominfo.go.id/registration/IISF2011 http://aptika.kominfo.go.id/registration/IISF2011] , atau akses berkas [[File:Agenda_IISF_Tentative_20111203.pdf]] agenda.&lt;br /&gt;
&lt;br /&gt;
=== IASA Business Architecture Summit 2011 ===&lt;br /&gt;
Charles Lim, dari SGU, akan memberikan presentasi mengenai OWASP Top 10 dalam acara IASA Business Architecture Summit 2011. Acara akan dilaksanakan pada hari Kamis, 1 Desember 2011, pukul 14.30 - 15.00, di Hotel Sahid, Jakarta. &lt;br /&gt;
&lt;br /&gt;
==== Arsip ====&lt;br /&gt;
&lt;br /&gt;
=== SGU menjadi OWASP University Supporter ===&lt;br /&gt;
[[File:SGU_OWASPUniversitySupporter.jpg|right|300px|thumb|SGU - OWASP University Supporter]]&lt;br /&gt;
Pada hari Senin 25 April 2011, telah dilakukan penandatanganan MoU antara SGU dengan OWASP Indonesia. SGU saat ini telah menjadi OWASP University Supporter. SGU menjadi universitas di Indonesia yang pertama menjadi OWASP University Supporter.&lt;br /&gt;
&lt;br /&gt;
=== Kopi Darat, Maret 2011 ===&lt;br /&gt;
Jakarta, 21 Februari 2011, rencananya pada hari Kamis 24 Maret 2011 di Senayan City akan diadakan kopi darat dengan agenda: perkenalan, rencana OWASP Indonesia, dan cerita dari OWASP Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
=== Blog OWASP Indonesia ===&lt;br /&gt;
Jakarta, 25 Februari 2011, dibuat blog OWASP Indonesia di [http://owaspid.blogspot.com http://owaspid.blogspot.com] sebagai salah satu cara berkomunikasi dengan komunitas OWASP Indonesia. &lt;br /&gt;
&lt;br /&gt;
=== Hasil Kopi Darat 23 Februari 2011===&lt;br /&gt;
Jakarta, 23 Februari 2011, kopi darat OWASP Indonesia dihadiri oleh Charles dan Zaki. Dilakukan pembicaraan mengenai rencana SGU menjadi OWASP University Supporter dan berbagi cerita dari OWASP Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
=== Kopi Darat, Februari 2011 ===&lt;br /&gt;
Jakarta, 18 Februari 2011, akan diadakan kopi darat pada hari Rabu 23 Februari 2011 di Senayan City dengan agenda: SGU menjadi OWASP University Supporter dan cerita dari OWASP Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
=== Partisipasi di OWASP Summit 2011 ===&lt;br /&gt;
Jakarta, 8 Februari 2011, Zaki dengan dukungan dari OWASP, akhirnya berangkat ke Lisbon, Portugal, untuk ikut berpartisipasi di OWASP Summit 2011. &lt;br /&gt;
&lt;br /&gt;
===SGU Mengajukan Diri sebagai OWASP University Supporter===&lt;br /&gt;
Jakarta, 28 Januari 2011, [http://www.sgu.ac.id SGU (Swiss German University)] melalui Charles Lim mengajukan diri untuk menjadi OWASP University Supporter. &lt;br /&gt;
&lt;br /&gt;
=== Penerjemahan Situs OWASP.org ===&lt;br /&gt;
Jakarta, 18 Januari 2011, menurut Anda perlukah situs OWASP.org diterjemahkan ke Bahasa Indonesia? Bagi mereka yang memiliki batasan bahasa, hal ini bisa bermanfaat. &lt;br /&gt;
&lt;br /&gt;
=== Penerjemahan OWASP Top 10 ===&lt;br /&gt;
&lt;br /&gt;
Jakarta, 17 Januari 2011, Berangkat dari inisiatif TH, baru saja diselesaikan proyek penerjemahan dokumentasi OWASP Top 10 ke bahasa Indonesia. Berikut ini adalah dokumen OWASP Top 10 yang sudah diterjemahken ke Bahasa Indonesia. &lt;br /&gt;
&lt;br /&gt;
* [[File:OWASP_Top_10_-_2010_FINAL_Indonesia_v1.0.1.pdf]] OWASP Top 10 2010 Final Indonesia v1.0.1 (RC).&lt;br /&gt;
&lt;br /&gt;
= Lokalisasi =&lt;br /&gt;
* OWASP ASVS ''(dalam proses penerjemahan)''&lt;br /&gt;
* [[File:OWASP_Top_10_-_2010_FINAL_Indonesia_v1.0.1.pdf]] OWASP Top 10 2010 dalam Bahasa Indonesia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Kontribusi =&lt;br /&gt;
&lt;br /&gt;
= Lain-lain =&lt;br /&gt;
=== ISO DVD/CD OWASP ===&lt;br /&gt;
&lt;br /&gt;
Live-DVD/CD OWASP sangat membantu dalam mempelajari web application/database security. ISO Live-DVD/CD OWASP dapat diunduh di: &lt;br /&gt;
&lt;br /&gt;
* [http://nebula.indocisc.co.id/~za Cermin di IIX] &lt;br /&gt;
&lt;br /&gt;
Atau jika mengalami kesulitan mengunduh, silakan kontak [mailto:za@owasp.org Zaki Akhmad] disertai nama dan alamat jelas untuk dapat dikirimkan Live-DVD/CD OWASP.&lt;br /&gt;
&lt;br /&gt;
= Media Sosial =&lt;br /&gt;
=== Milis === &lt;br /&gt;
&lt;br /&gt;
OWASP telah menyediakan milis OWASP Indonesia di mail server-nya. Untuk bergabung dapat mengirimkan email kosong ke [mailto:owasp-indonesia-subscribe@lists.owasp.org alamat ini]. Lalu ikuti instruksi berikutnya yang dikirim via email. Untuk arsip milis bisa diakses di [https://lists.owasp.org/pipermail/owasp-indonesia halaman ini].&lt;br /&gt;
&lt;br /&gt;
=== Twitter ===&lt;br /&gt;
Silakan ikuti akun twitter [http://twitter.com/#!/owaspid @owaspid] untuk berita-berita seputar OWASP Indonesia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Indonesia]]&lt;br /&gt;
[[Category:Asia]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Indonesia&amp;diff=139978</id>
		<title>Indonesia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Indonesia&amp;diff=139978"/>
				<updated>2012-11-21T08:53:01Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Indonesia|extra=The chapter leader is [mailto:za@owasp.org Zaki Akhmad]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Indonesia|emailarchives=http://lists.owasp.org/pipermail/owasp-Indonesia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= Beranda =&lt;br /&gt;
Salam, &lt;br /&gt;
&lt;br /&gt;
Selamat datang di halaman OWASP Indonesia! OWASP Indonesia merupakan salah satu ''chapter'' OWASP yang tersebar di berbagai belahan dunia. OWASP sendiri merupakan organisasi nirlaba yang fokus pada keamanan aplikasi dan web. Kehadiran OWASP Indonesia diharapkan mampu memberikan kontribusi dalam meningkatkan keamanan aplikasi &amp;amp; web yang ada di Indonesia. &lt;br /&gt;
&lt;br /&gt;
Selamat mengeksplorasi lebih jauh OWASP Indonesia dengan membuka tab-tab yang ada di halaman ini.   &lt;br /&gt;
&lt;br /&gt;
= Tentang =&lt;br /&gt;
=== Sejarah ===&lt;br /&gt;
OWASP Indonesia berdiri pada tanggal 11 Juli 2007. Chapter ini pertama kali dipimpin oleh Azwar Rosyadi. Selanjutnya Azwar Rosyadi tak lagi aktif di OWASP Indonesia. Sejak Desember 2008, [[User:Zakiakhmad|Zaki Akhmad]] berinisiatif memimpin chapter ini. &lt;br /&gt;
&lt;br /&gt;
=== Aktivitas ===&lt;br /&gt;
Hingga saat ini belum dilaksanakan pertemuan rutin. Aktivitas OWASP Indonesia baru sebatas dilakukan di milis saja. Pada Agustus 2010, Tedi Heriyanto berinisiatif mengkoordinir penerjemahan presentasi OWASP Top 10 ke Bahasa Indonesia. &lt;br /&gt;
&lt;br /&gt;
= Agenda =&lt;br /&gt;
=== Perpanjang Domain OWASP.or.id ====&lt;br /&gt;
Domain OWASP.or.id telah diperpanjang hingga akhir tahun 2013. Sejauh ini server OWASP.or.id baru mencermin materi video AppSec. Apakah Anda memiliki ide agar domain ini tidak percuma diperpanjang?&lt;br /&gt;
&lt;br /&gt;
=== Situs OWASP.or.id ===&lt;br /&gt;
Januari 2012. Saat ini OWASP Indonesia memiliki situs dengan domain [http://owasp.or.id OWASP.or.id]. Situs ini masih dalam tahap pengembangan namun sudah bisa diakses. Untuk sementara situs ini menyediakan materi-materi OWASP. Diharapkan dengan menyediakan akses lokal, materi-materi OWASP dapat lebih mudah diakses dari Indonesia. &lt;br /&gt;
&lt;br /&gt;
=== Indonesia Internet Security Forum 2011 ===&lt;br /&gt;
Desember 2011. OWASP Indonesia akan menjadi salah satu panelis dalam acara Indonesia Internet Security Forum 2011 (IISF 2011). Acara ini akan dilaksanakan pada hari Rabu, 14 Desember 2011. Detail acara dapat dilihat pada [http://aptika.kominfo.go.id/registration/IISF2011 http://aptika.kominfo.go.id/registration/IISF2011] , atau akses berkas [[File:Agenda_IISF_Tentative_20111203.pdf]] agenda.&lt;br /&gt;
&lt;br /&gt;
=== IASA Business Architecture Summit 2011 ===&lt;br /&gt;
Charles Lim, dari SGU, akan memberikan presentasi mengenai OWASP Top 10 dalam acara IASA Business Architecture Summit 2011. Acara akan dilaksanakan pada hari Kamis, 1 Desember 2011, pukul 14.30 - 15.00, di Hotel Sahid, Jakarta. &lt;br /&gt;
&lt;br /&gt;
==== Arsip ====&lt;br /&gt;
&lt;br /&gt;
=== SGU menjadi OWASP University Supporter ===&lt;br /&gt;
[[File:SGU_OWASPUniversitySupporter.jpg|right|300px|thumb|SGU - OWASP University Supporter]]&lt;br /&gt;
Pada hari Senin 25 April 2011, telah dilakukan penandatanganan MoU antara SGU dengan OWASP Indonesia. SGU saat ini telah menjadi OWASP University Supporter. SGU menjadi universitas di Indonesia yang pertama menjadi OWASP University Supporter.&lt;br /&gt;
&lt;br /&gt;
=== Kopi Darat, Maret 2011 ===&lt;br /&gt;
Jakarta, 21 Februari 2011, rencananya pada hari Kamis 24 Maret 2011 di Senayan City akan diadakan kopi darat dengan agenda: perkenalan, rencana OWASP Indonesia, dan cerita dari OWASP Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
=== Blog OWASP Indonesia ===&lt;br /&gt;
Jakarta, 25 Februari 2011, dibuat blog OWASP Indonesia di [http://owaspid.blogspot.com http://owaspid.blogspot.com] sebagai salah satu cara berkomunikasi dengan komunitas OWASP Indonesia. &lt;br /&gt;
&lt;br /&gt;
=== Hasil Kopi Darat 23 Februari 2011===&lt;br /&gt;
Jakarta, 23 Februari 2011, kopi darat OWASP Indonesia dihadiri oleh Charles dan Zaki. Dilakukan pembicaraan mengenai rencana SGU menjadi OWASP University Supporter dan berbagi cerita dari OWASP Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
=== Kopi Darat, Februari 2011 ===&lt;br /&gt;
Jakarta, 18 Februari 2011, akan diadakan kopi darat pada hari Rabu 23 Februari 2011 di Senayan City dengan agenda: SGU menjadi OWASP University Supporter dan cerita dari OWASP Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
=== Partisipasi di OWASP Summit 2011 ===&lt;br /&gt;
Jakarta, 8 Februari 2011, Zaki dengan dukungan dari OWASP, akhirnya berangkat ke Lisbon, Portugal, untuk ikut berpartisipasi di OWASP Summit 2011. &lt;br /&gt;
&lt;br /&gt;
===SGU Mengajukan Diri sebagai OWASP University Supporter===&lt;br /&gt;
Jakarta, 28 Januari 2011, [http://www.sgu.ac.id SGU (Swiss German University)] melalui Charles Lim mengajukan diri untuk menjadi OWASP University Supporter. &lt;br /&gt;
&lt;br /&gt;
=== Penerjemahan Situs OWASP.org ===&lt;br /&gt;
Jakarta, 18 Januari 2011, menurut Anda perlukah situs OWASP.org diterjemahkan ke Bahasa Indonesia? Bagi mereka yang memiliki batasan bahasa, hal ini bisa bermanfaat. &lt;br /&gt;
&lt;br /&gt;
=== Penerjemahan OWASP Top 10 ===&lt;br /&gt;
&lt;br /&gt;
Jakarta, 17 Januari 2011, Berangkat dari inisiatif TH, baru saja diselesaikan proyek penerjemahan dokumentasi OWASP Top 10 ke bahasa Indonesia. Berikut ini adalah dokumen OWASP Top 10 yang sudah diterjemahken ke Bahasa Indonesia. &lt;br /&gt;
&lt;br /&gt;
* [[File:OWASP_Top_10_-_2010_FINAL_Indonesia_v1.0.1.pdf]] OWASP Top 10 2010 Final Indonesia v1.0.1 (RC).&lt;br /&gt;
&lt;br /&gt;
= Lokalisasi =&lt;br /&gt;
* OWASP ASVS ''(dalam proses penerjemahan)''&lt;br /&gt;
* [[File:OWASP_Top_10_-_2010_FINAL_Indonesia_v1.0.1.pdf]] OWASP Top 10 2010 dalam Bahasa Indonesia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Kontribusi =&lt;br /&gt;
&lt;br /&gt;
= Lain-lain =&lt;br /&gt;
=== ISO DVD/CD OWASP ===&lt;br /&gt;
&lt;br /&gt;
Live-DVD/CD OWASP sangat membantu dalam mempelajari web application/database security. ISO Live-DVD/CD OWASP dapat diunduh di: &lt;br /&gt;
&lt;br /&gt;
* [http://nebula.indocisc.co.id/~za Cermin di IIX] &lt;br /&gt;
&lt;br /&gt;
Atau jika mengalami kesulitan mengunduh, silakan kontak [mailto:za@owasp.org Zaki Akhmad] disertai nama dan alamat jelas untuk dapat dikirimkan Live-DVD/CD OWASP.&lt;br /&gt;
&lt;br /&gt;
= Media Sosial =&lt;br /&gt;
=== Milis === &lt;br /&gt;
&lt;br /&gt;
OWASP telah menyediakan milis OWASP Indonesia di mail server-nya. Untuk bergabung dapat mengirimkan email kosong ke [mailto:owasp-indonesia-subscribe@lists.owasp.org alamat ini]. Lalu ikuti instruksi berikutnya yang dikirim via email. Untuk arsip milis bisa diakses di [https://lists.owasp.org/pipermail/owasp-indonesia halaman ini].&lt;br /&gt;
&lt;br /&gt;
=== Twitter ===&lt;br /&gt;
Silakan ikuti akun twitter [http://twitter.com/#!/owaspid @owaspid] untuk berita-berita seputar OWASP Indonesia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Indonesia]]&lt;br /&gt;
[[Category:Asia]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWTGv4_Contributors_list&amp;diff=135412</id>
		<title>OWTGv4 Contributors list</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWTGv4_Contributors_list&amp;diff=135412"/>
				<updated>2012-09-06T07:04:38Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Contributors team:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Matteo Meucci&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Pavol Luptak&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Marco Morana&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Giorgio Fedon&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Stefano Di Paola&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Gianrico Ingrosso&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Giuseppe Bonfà&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Roberto Suggi Liverani&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Robert Smith&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Andrew Muller&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Robert Winkel&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; tripurari rai&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Thomas Ryan&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; tim bertels&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Cecil Su&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Aung KhAnt&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Norbert Szetei&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; michael.boman&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Wagner Elias&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Kevin Horvat&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Juan Galiana Lara&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Kenan Gursoy&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Jason Flood&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Javier Marcos de Prado&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Sumit Siddharth&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Mike Hryekewicz&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; psiinon&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Ray Schippers&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Raul Siles&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Jayanta Karmakar&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Brad Causey&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Vicente Aguilera&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Ismael Gonçalves&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; David Fern &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Tom Eston&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Kevin Horvath&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Rick.Mitchell&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Eduardo Castellanos &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Simone Onofri &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Harword Sheen &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Amro AlOlaqi&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Suhas Desai&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Ryan Dewhurst&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Zaki Akhmad &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Reviewers team:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Paolo Perego&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Daniel Cuthbert&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Matthew Churcher&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Lode Vanstechelman&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Sebastien Gioria&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;gt; Antonio Fontes&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=135411</id>
		<title>OWASP Testing Guide v4 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=135411"/>
				<updated>2012-09-06T07:03:56Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: Fix the ToC formatting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
'''This is DRAFT of the table of content of the New Testing Guide v4.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;You can download the stable version [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Back to the OWASP Testing Guide Project:&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
'''Updated: 31st August 2012'''&lt;br /&gt;
&lt;br /&gt;
[[ OWTGv4 Contributors list|'''Contributors List]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The following are the main improvements we have to realize: &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(1) - Add new testing techniques and OWASP Top10 update: &amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for HTTP Verb tampering&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for HTTP Parameter Pollutions&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for URL Redirection&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Insecure Direct Object References&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Insecure Cryptographic Storage&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Failure to Restrict URL Access&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Insufficient Transport Layer Protection&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Unvalidated Redirects and Forwards.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
(2) - Review and improve all the sections in v3,&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
(3) - Create a more readable guide, eliminating some sections that are not&lt;br /&gt;
really useful, Rationalize some sections as Session Management Testing.&lt;br /&gt;
&lt;br /&gt;
(4) Pavol says: - add new opensource testing tools that appeared during last 3 years&lt;br /&gt;
(and are missing in the OWASP Testing Guide v3)&lt;br /&gt;
&lt;br /&gt;
- add few useful and life-scenarios of possible&lt;br /&gt;
vulnerabilities in Bussiness Logic Testing (many testers have no idea what&lt;br /&gt;
vulnerabilities in Business Logic exactly mean)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;Brute force testing&amp;quot; of &amp;quot;session ID&amp;quot; is missing in &amp;quot;Session Management&lt;br /&gt;
Testing&amp;quot;, describe other tools for Session ID entropy analysis&lt;br /&gt;
(e.g. Stompy)&lt;br /&gt;
&lt;br /&gt;
- in &amp;quot;Data Validation Testing&amp;quot; describe some basic obfuscation methods for&lt;br /&gt;
malicious code injection including the statements how it is possible to&lt;br /&gt;
detect it (web application obfuscation is quite succesfull in bypassing&lt;br /&gt;
many data validation controls)&lt;br /&gt;
&lt;br /&gt;
- split the phase Logout and Browser Cache Management&amp;quot; into two sections&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The following is a DRAFT of the Toc based on the feedback already received.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Foreword|Foreword by OWASP Chair]]== &lt;br /&gt;
[To review--&amp;gt; OWASP Chair]&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece |1. Frontispiece]]== &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[Testing Guide Frontispiece|1.1 About the OWASP Testing Guide Project]]''' &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[About The Open Web Application Security Project|1.2 About The Open Web Application Security Project]]''' &lt;br /&gt;
[To review--&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction|2. Introduction]]==&lt;br /&gt;
&lt;br /&gt;
'''2.1 The OWASP Testing Project'''&lt;br /&gt;
&lt;br /&gt;
'''2.2 Principles of Testing'''&lt;br /&gt;
&lt;br /&gt;
'''2.3 Testing Techniques Explained''' &lt;br /&gt;
&lt;br /&gt;
2.4 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Requirements_Test_Derivation Security requirements test derivation],[https://www.owasp.org/index.php/Testing_Guide_Introduction#Functional_and_Non_Functional_Test_Requirements functional and non functional test requirements], and [https://www.owasp.org/index.php/Testing_Guide_Introduction#Test_Cases_Through_Use_and_Misuse_Cases test cases through use and misuse cases]&lt;br /&gt;
&lt;br /&gt;
2.5 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Test_Data_Analysis_and_Reporting Security test data analysis and reporting: root cause identification and business/role case test data reporting]&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework|3. The OWASP Testing Framework]]==&lt;br /&gt;
&lt;br /&gt;
'''3.1. Overview'''&lt;br /&gt;
&lt;br /&gt;
'''3.2. Phase 1: Before Development Begins '''&lt;br /&gt;
&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&lt;br /&gt;
&lt;br /&gt;
'''3.4. Phase 3: During Development'''&lt;br /&gt;
&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&lt;br /&gt;
&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&lt;br /&gt;
&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing |4. Web Application Penetration Testing ]]==&lt;br /&gt;
&lt;br /&gt;
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']] [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing Checklist| 4.1.1 Testing Checklist]] [To review at the end of brainstorming --&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing: Information Gathering|'''4.2 Information Gathering ''']] [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
[[Testing for configuration management|'''4.3 Configuration and Deploy Management Testing ''']]&lt;br /&gt;
&lt;br /&gt;
Infrastructure Configuration management weakness&amp;lt;br&amp;gt;&lt;br /&gt;
Application Configuration management weakness&amp;lt;br&amp;gt;&lt;br /&gt;
File extensions handling&amp;lt;br&amp;gt;&lt;br /&gt;
Old, backup and unreferenced files&amp;lt;br&amp;gt;&lt;br /&gt;
Access to Admin interfaces&amp;lt;br&amp;gt;&lt;br /&gt;
Bad HTTP Methods enabled, [new]&amp;lt;br&amp;gt;&lt;br /&gt;
Informative Error Messages&amp;lt;br&amp;gt;&lt;br /&gt;
Database credentials/connection strings available&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for authentication|'''4.4 Authentication Testing ''']] &lt;br /&gt;
&lt;br /&gt;
Credentials transport over an unencrypted channel [Robert Winkel]&amp;lt;br&amp;gt;&lt;br /&gt;
User enumeration (also Guessable user account) [Robert Winkel]&amp;lt;br&amp;gt;&lt;br /&gt;
Default passwords [Robert Winkel]&amp;lt;br&amp;gt;&lt;br /&gt;
Weak lock out mechanism [New! - Robert Winkel] &amp;lt;br&amp;gt;&lt;br /&gt;
Account lockout DoS [New! - Robert Winkel]&amp;lt;br&amp;gt;&lt;br /&gt;
Bypassing authentication schema&amp;lt;br&amp;gt; &lt;br /&gt;
Directory traversal/file include &amp;lt;br&amp;gt;&lt;br /&gt;
Vulnerable remember password [Robert Winkel]&amp;lt;br&amp;gt;&lt;br /&gt;
Browser cache weakness [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Weak password policy [New! - Robert Winkel]&amp;lt;br&amp;gt;&lt;br /&gt;
Weak username policy [New! - Robert Winkel]&amp;lt;br&amp;gt;&lt;br /&gt;
Weak security question/answer [New! - Robert Winkel]&amp;lt;br&amp;gt; &lt;br /&gt;
Failure to restrict access to authenticated resource [New!]&amp;lt;br&amp;gt; &lt;br /&gt;
Weak password change function [New! - Robert Winkel]&amp;lt;br&amp;gt;&lt;br /&gt;
Testing for CAPTCHA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Management|'''4.5 Session Management Testing''']] &lt;br /&gt;
&lt;br /&gt;
Bypassing Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
Weak Session Token &amp;lt;br&amp;gt;&lt;br /&gt;
Cookies are set not ‘HTTP Only’, ‘Secure’,  and no time validity&amp;lt;br&amp;gt; &lt;br /&gt;
Exposed sensitive session variables &amp;lt;br&amp;gt;&lt;br /&gt;
CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
Session passed over http [New!] &amp;lt;br&amp;gt;&lt;br /&gt;
Session token within URL [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
Session token not removed on server after logout [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Persistent session token [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Session token not restrcited properly (such as domain or path not set properly) [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Logout function not properly implemented &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Authorization|'''4.6 Authorization Testing''']] &lt;br /&gt;
&lt;br /&gt;
Bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
Insecure Direct Object References &amp;lt;br&amp;gt;&lt;br /&gt;
Failure to Restrict access to authorized resource [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for business logic   (OWASP-BL-001)|'''4.7 Business Logic Testing  (OWASP-BL-001)''']] [To review--&amp;gt; contributor here]&lt;br /&gt;
Business Logic&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Validation|'''4.8 Data Validation Testing''']] &lt;br /&gt;
&lt;br /&gt;
Reflected XSS &amp;lt;br&amp;gt;&lt;br /&gt;
Stored XSS &amp;lt;br&amp;gt;&lt;br /&gt;
HTTP Verb Tampering [Brad Causey]&amp;lt;br&amp;gt; &lt;br /&gt;
HTTP Parameter pollution [Brad Causey]&amp;lt;br&amp;gt;&lt;br /&gt;
Unvalidated Redirects and Forwards [Brad Causey]&amp;lt;br&amp;gt; &lt;br /&gt;
SQL Injection [Brad Causey]&amp;lt;br&amp;gt;&lt;br /&gt;
LDAP Injection &amp;lt;br&amp;gt;&lt;br /&gt;
ORM Injection &amp;lt;br&amp;gt;&lt;br /&gt;
XML Injection &amp;lt;br&amp;gt;&lt;br /&gt;
SSI Injection &amp;lt;br&amp;gt;&lt;br /&gt;
XPath Injection &amp;lt;br&amp;gt;&lt;br /&gt;
SOAP Injection &amp;lt;br&amp;gt;&lt;br /&gt;
IMAP/SMTP Injection &amp;lt;br&amp;gt;&lt;br /&gt;
Code Injection &amp;lt;br&amp;gt;&lt;br /&gt;
OS Commanding &amp;lt;br&amp;gt;&lt;br /&gt;
Buffer overflow &amp;lt;br&amp;gt;&lt;br /&gt;
Incubated vulnerability &amp;lt;br&amp;gt; &lt;br /&gt;
HTTP Splitting/Smuggling &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Encryption (New!)]]&lt;br /&gt;
&lt;br /&gt;
Application did not use encryption &amp;lt;br&amp;gt;&lt;br /&gt;
Weak SSL/TSL Ciphers, Insufficient &amp;lt;br&amp;gt;&lt;br /&gt;
Transport Layer Protection&amp;lt;br&amp;gt;&lt;br /&gt;
Cacheable HTTPS Response&amp;lt;br&amp;gt;&lt;br /&gt;
Cache directives insecure&amp;lt;br&amp;gt;&lt;br /&gt;
Insecure Cryptographic Storage [mainly CR Guide]&amp;lt;br&amp;gt;&lt;br /&gt;
Sensitive information sent via unencrypted&lt;br /&gt;
channels &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ XML Interpreter? (New!)]]&lt;br /&gt;
&lt;br /&gt;
Weak XML Structure&lt;br /&gt;
XML content-level&lt;br /&gt;
WS HTTP GET parameters/REST&lt;br /&gt;
WS Naughty SOAP attachments&lt;br /&gt;
WS Replay Testing&lt;br /&gt;
&lt;br /&gt;
[[ Client Side Testing (New!) ]]&lt;br /&gt;
&lt;br /&gt;
DOM XSS&amp;lt;br&amp;gt;&lt;br /&gt;
Cross Site Flashing&amp;lt;br&amp;gt;&lt;br /&gt;
ClickHijacking&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==[[Writing Reports: value the real risk |5. Writing Reports: value the real risk ]]==&lt;br /&gt;
&lt;br /&gt;
[[How to value the real risk |5.1 How to value the real risk]] [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
[[How to write the report of the testing |5.2 How to write the report of the testing]] [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
&lt;br /&gt;
* Black Box Testing Tools [To review--&amp;gt; Amro. We need only tools fo webapp testing]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
* Whitepapers [To review--&amp;gt; contributor here]&lt;br /&gt;
* Books [To review--&amp;gt; contributor here]&lt;br /&gt;
* Useful Websites [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]==&lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix D: Encoded Injection | Appendix D: Encoded Injection]]==&lt;br /&gt;
&lt;br /&gt;
[To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide&amp;diff=130355</id>
		<title>Projects/OWASP Secure Coding Practices - Quick Reference Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide&amp;diff=130355"/>
				<updated>2012-05-23T09:05:41Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Secure Coding Practices - Quick Reference Guide&lt;br /&gt;
| project_home_page = :OWASP Secure Coding Practices - Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
| project_description =&lt;br /&gt;
&lt;br /&gt;
This document provides a quick high level reference for secure coding practices. It is technology agnostic and defines a set of general software security coding practices, in a checklist format, that can be integrated into the development lifecycle. Implementation of these practices will mitigate most common software vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/by-sa/3.0/ '''Creative Commons Attribution Share Alike 3.0'''] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Keith Turpin &lt;br /&gt;
| leader_email1 = keith.turpin@owasp.org&lt;br /&gt;
| leader_username1 = Keith Turpin&lt;br /&gt;
 &lt;br /&gt;
| contributor_name1 = Dan Kranz &lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name2 = Walt Pietrowski &lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name3 = Catherine Spencer&lt;br /&gt;
| contributor_email3 = &lt;br /&gt;
| contributor_username3 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name4 = Caleb McGary &lt;br /&gt;
| contributor_email4 = Caleb.mcgary@gmail.com&lt;br /&gt;
| contributor_username4 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name5 = Jim Manico&lt;br /&gt;
| contributor_email5 = jim.manico@owasp.org&lt;br /&gt;
| contributor_username5 = Jmanico&lt;br /&gt;
&lt;br /&gt;
| contributor_name6 = Brad Causey&lt;br /&gt;
| contributor_email6 = bradcausey@owasp.org&lt;br /&gt;
| contributor_username6 = Bradcausey&lt;br /&gt;
&lt;br /&gt;
| contributor_name7 = Ludovic Petit&lt;br /&gt;
| contributor_email7 = ludovic.petit@owasp.org&lt;br /&gt;
| contributor_username7 = Ludovic Petit&lt;br /&gt;
&lt;br /&gt;
| contributor_name8 = Michael V. Scovetta&lt;br /&gt;
| contributor_email8 = michael.scovetta@gmail.com&lt;br /&gt;
| contributor_username8 =  &lt;br /&gt;
&lt;br /&gt;
| contributor_name9 = Jason Coleman&lt;br /&gt;
| contributor_email9 = &lt;br /&gt;
| contributor_username9 =  &lt;br /&gt;
&lt;br /&gt;
| contributor_name10 = Tarcizio Vieira Neto&lt;br /&gt;
| contributor_email10 = &lt;br /&gt;
| contributor_username10 =  &lt;br /&gt;
&lt;br /&gt;
| contributor_name11 = OWASP Korea chapter&lt;br /&gt;
| contributor_email11 = &lt;br /&gt;
| contributor_username11 =  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = http://www.owasp.org/images/3/35/Flyer_Secure_Coding_Practices_Quick_Reference_Guide_V2.pdf&lt;br /&gt;
&lt;br /&gt;
| presentation_link = https://www.owasp.org/images/f/fd/Secure_Coding_Practices_Quick_Ref_6.ppt&lt;br /&gt;
&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-secure-coding-practices&lt;br /&gt;
&lt;br /&gt;
| project_road_map = http://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide/Roadmap&lt;br /&gt;
&lt;br /&gt;
| links_url1 = http://vimeo.com/17018329 &lt;br /&gt;
| links_name1 = Video - Keith Turpin presenting the Quick Reference Guide on OWASP AppSec USA 2010&lt;br /&gt;
&lt;br /&gt;
| links_url2 = https://www.owasp.org/images/b/b3/OWASP_SCP_v1.3_pt-BR.pdf&lt;br /&gt;
| links_name2 = SCP v2 &amp;gt; Brazilian Portuguese Translation &amp;gt; PDF file&lt;br /&gt;
&lt;br /&gt;
| links_url3 = https://www.owasp.org/images/6/6d/OWASP_SCP_v1.3_pt-PT.pdf&lt;br /&gt;
| links_name3 = SCP v2 &amp;gt; Portugal Portuguese Translation &amp;gt; PDF file&lt;br /&gt;
&lt;br /&gt;
| links_url4 = https://www.owasp.org/images/8/8e/2011%EB%85%846%EC%9B%94_OWASP_%EC%8B%9C%ED%81%90%EC%96%B4%EC%BD%94%EB%94%A9%EA%B7%9C%EC%B9%99_v2_KOR.pdf&lt;br /&gt;
| links_name4 = SCP v2 &amp;gt; Korean Translation &amp;gt; PDF file&lt;br /&gt;
&lt;br /&gt;
| links_url5 = http://www.owasp.org/images/c/c8/OWASP_SCP_Quick_Reference_Guide_SPA.doc&lt;br /&gt;
| links_name5 = SCP v2 &amp;gt; Spanish Translation &amp;gt; doc file&lt;br /&gt;
&lt;br /&gt;
| links_url6 = http://www.owasp.org/images/5/54/Secure_Coding_Practices_Quick_Ref_5.ppt&lt;br /&gt;
| links_name6 = Slide - Presented by Keith Turpin on OWASP AppSec USA 2010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| release_1 = SCP v1&lt;br /&gt;
&lt;br /&gt;
| release_2 = SCP v1.1&lt;br /&gt;
&lt;br /&gt;
| release_3 = SCP v2&lt;br /&gt;
&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP Secure Coding Practices - Quick Reference Guide&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide&amp;diff=130354</id>
		<title>Projects/OWASP Secure Coding Practices - Quick Reference Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide&amp;diff=130354"/>
				<updated>2012-05-23T09:04:06Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Secure Coding Practices - Quick Reference Guide&lt;br /&gt;
| project_home_page = :OWASP Secure Coding Practices - Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
| project_description =&lt;br /&gt;
&lt;br /&gt;
This document provides a quick high level reference for secure coding practices. It is technology agnostic and defines a set of general software security coding practices, in a checklist format, that can be integrated into the development lifecycle. Implementation of these practices will mitigate most common software vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/by-sa/3.0/ '''Creative Commons Attribution Share Alike 3.0'''] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Keith Turpin &lt;br /&gt;
| leader_email1 = keith.turpin@owasp.org&lt;br /&gt;
| leader_username1 = Keith Turpin&lt;br /&gt;
 &lt;br /&gt;
| contributor_name1 = Dan Kranz &lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name2 = Walt Pietrowski &lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name3 = Catherine Spencer&lt;br /&gt;
| contributor_email3 = &lt;br /&gt;
| contributor_username3 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name4 = Caleb McGary &lt;br /&gt;
| contributor_email4 = Caleb.mcgary@gmail.com&lt;br /&gt;
| contributor_username4 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name5 = Jim Manico&lt;br /&gt;
| contributor_email5 = jim.manico@owasp.org&lt;br /&gt;
| contributor_username5 = Jmanico&lt;br /&gt;
&lt;br /&gt;
| contributor_name6 = Brad Causey&lt;br /&gt;
| contributor_email6 = bradcausey@owasp.org&lt;br /&gt;
| contributor_username6 = Bradcausey&lt;br /&gt;
&lt;br /&gt;
| contributor_name7 = Ludovic Petit&lt;br /&gt;
| contributor_email7 = ludovic.petit@owasp.org&lt;br /&gt;
| contributor_username7 = Ludovic Petit&lt;br /&gt;
&lt;br /&gt;
| contributor_name8 = Michael V. Scovetta&lt;br /&gt;
| contributor_email8 = michael.scovetta@gmail.com&lt;br /&gt;
| contributor_username8 =  &lt;br /&gt;
&lt;br /&gt;
| contributor_name9 = Jason Coleman&lt;br /&gt;
| contributor_email9 = &lt;br /&gt;
| contributor_username9 =  &lt;br /&gt;
&lt;br /&gt;
| contributor_name10 = Tarcizio Vieira Neto&lt;br /&gt;
| contributor_email10 = &lt;br /&gt;
| contributor_username10 =  &lt;br /&gt;
&lt;br /&gt;
| contributor_name11 = OWASP Korea chapter&lt;br /&gt;
| contributor_email11 = &lt;br /&gt;
| contributor_username11 =  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = http://www.owasp.org/images/3/35/Flyer_Secure_Coding_Practices_Quick_Reference_Guide_V2.pdf&lt;br /&gt;
&lt;br /&gt;
| presentation_link = https://www.owasp.org/images/f/fd/Secure_Coding_Practices_Quick_Ref_6.ppt&lt;br /&gt;
&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-secure-coding-practices&lt;br /&gt;
&lt;br /&gt;
| project_road_map = http://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide/Roadmap&lt;br /&gt;
&lt;br /&gt;
| links_url0 = http://www.owasp.org/images/5/54/Secure_Coding_Practices_Quick_Ref_5.ppt&lt;br /&gt;
| links_name0 = Slide - Presented by Keith Turpin on OWASP AppSec USA 2010&lt;br /&gt;
&lt;br /&gt;
| links_url1 = http://vimeo.com/17018329 &lt;br /&gt;
| links_name1 = Video - Keith Turpin presenting the Quick Reference Guide on OWASP AppSec USA 2010&lt;br /&gt;
&lt;br /&gt;
| links_url2 = https://www.owasp.org/images/b/b3/OWASP_SCP_v1.3_pt-BR.pdf&lt;br /&gt;
| links_name2 = SCP v2 &amp;gt; Brazilian Portuguese Translation &amp;gt; PDF file&lt;br /&gt;
&lt;br /&gt;
| links_url3 = https://www.owasp.org/images/6/6d/OWASP_SCP_v1.3_pt-PT.pdf&lt;br /&gt;
| links_name3 = SCP v2 &amp;gt; Portugal Portuguese Translation &amp;gt; PDF file&lt;br /&gt;
&lt;br /&gt;
| links_url4 = https://www.owasp.org/images/8/8e/2011%EB%85%846%EC%9B%94_OWASP_%EC%8B%9C%ED%81%90%EC%96%B4%EC%BD%94%EB%94%A9%EA%B7%9C%EC%B9%99_v2_KOR.pdf&lt;br /&gt;
| links_name4 = SCP v2 &amp;gt; Korean Translation &amp;gt; PDF file&lt;br /&gt;
&lt;br /&gt;
| links_url5 = http://www.owasp.org/images/c/c8/OWASP_SCP_Quick_Reference_Guide_SPA.doc&lt;br /&gt;
| links_name5 = SCP v2 &amp;gt; Spanish Translation &amp;gt; doc file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| release_1 = SCP v1&lt;br /&gt;
&lt;br /&gt;
| release_2 = SCP v1.1&lt;br /&gt;
&lt;br /&gt;
| release_3 = SCP v2&lt;br /&gt;
&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP Secure Coding Practices - Quick Reference Guide&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track&amp;diff=130353</id>
		<title>Category:Summit 2011 OWASP Secure Coding Workshop Track</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track&amp;diff=130353"/>
				<updated>2012-05-23T08:55:35Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=[[Image:T._secure_coding.jpg]]=&lt;br /&gt;
&lt;br /&gt;
The track seeks to add to OWASP's cache of &amp;quot;secure code&amp;quot;. Facilitators will chose a focus for each of the track's sub-sections addressing a &amp;quot;development scenario&amp;quot; developers consistently face in each application they build. Each sub-section aims to deliver secure functionality or code useful in helping developers build security into their application when addressing that development scenario even if it delivers only &amp;quot;code snippets&amp;quot;. Two principals govern this track:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;All track participants will support analysis, design, implementation, and testing activities for each section&lt;br /&gt;
&amp;lt;LI&amp;gt;Each track sub-section should deliver design and implementation useful as a leave-behind, for building security into applications&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The first implementation of this track aims to deliver only code snippets because track organizers want freedom to select topics beyond what already exists in secure programming toolkits, if necessary. For those familiar with OWASP's [http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API ESAPI], the track will seek to:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Use existing ESAPI (or other OWASP project) material where appropriate&lt;br /&gt;
&amp;lt;LI&amp;gt;Roll-up and contribute back to OWASP projects, all applicable code developed during this  track&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Track sub-sections regarding &amp;quot;input validation&amp;quot; and AppSensor represent two OWASP project targets we've already included focus on.&lt;br /&gt;
&lt;br /&gt;
Our goal will be to extend the practice of &amp;quot;building security into applications&amp;quot; without a preference for whether or not the application&lt;br /&gt;
exists in a calcified form of maintenance or whether it's being developed in a green-field manner.  Summarizing: the objective of each sub-section is to make our technology better not necessarily to raise awareness of its existence.&lt;br /&gt;
&lt;br /&gt;
== Facilitation ==&lt;br /&gt;
&lt;br /&gt;
A set of facilitators, each with both a security and development background, will take turns leading their chosen focus. Facilitators will come prepared with their sub-section problem definition, session goals, and supporting material. Do not expect the facilitator to lead a lecture. Rather, expect the facilitator to come with a skeleton analysis of the development scenario and framework for analyzing the security challenge. &lt;br /&gt;
&lt;br /&gt;
Expect facilitators to divide their sub-section into a list of goals for the development scenario. Facilitators will break the goal into intermediate objectives and will either delegate these objectives to participants or help to direct the conversation across contexts for participants. For example: during a sub-section on persistence frameworks, the facilitator may present risks associated with configuring and implementing auto-binding in a particular framework, then direct snippet implementation on other persistence frameworks, owned and implemented by participants themselves. &lt;br /&gt;
&lt;br /&gt;
== Participants ==&lt;br /&gt;
&lt;br /&gt;
Participants will be expected to arrive with at least a conversational understanding (preferably experience) in the sub-topic area. They will be expected to contribute to analysis, design, implementation, and/or testing. Track participants will need to  self-police each sub-section. If&lt;br /&gt;
things get too introductory and forward progress stalls,  participants can help a lagging participant &amp;quot;Get up to speed&amp;quot; with the rest of the session quickly in a side conversation/demo/hand-holding exercise.&lt;br /&gt;
&lt;br /&gt;
== Sub-Sections (Topic Areas) ==&lt;br /&gt;
'''[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Applying_ESAPI_Input_Validation 1. Applying ESAPI Input Validation]'''&lt;br /&gt;
*Serial Decomp: Decode, canonicalize, filter&amp;lt;br&amp;gt;&lt;br /&gt;
*Structured data (SSN, CC, etc.) &amp;lt;br&amp;gt;&lt;br /&gt;
*Unstructured data (comments, blogs, etc.) &amp;lt;br&amp;gt;&lt;br /&gt;
*Other input exaples (ws-, database, etc.) &amp;lt;br&amp;gt;&lt;br /&gt;
'''2. Defining AppSensor Sensors for:'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Forced Browsing &amp;lt;br&amp;gt;&lt;br /&gt;
*Request Velocity&amp;lt;br&amp;gt;&lt;br /&gt;
*Unexpected encodings&amp;lt;br&amp;gt;&lt;br /&gt;
*Impersonation (Sudden user switch) &amp;lt;br&amp;gt;&lt;br /&gt;
'''3. Managing Sessions'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Across requests&amp;lt;br&amp;gt;&lt;br /&gt;
*Across containers&amp;lt;br&amp;gt;&lt;br /&gt;
*Invalidating sessions (Timeout, attack event, logout)&amp;lt;br&amp;gt;&lt;br /&gt;
*Invalidating sessions (across containers, SSO token invalidation, user termination)&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Protecting_Information_Stored_Client-Side 4. Protecting Information Stored Client-Side]'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Threat Modeling the problem &amp;lt;br&amp;gt;&lt;br /&gt;
*Protecting theft and re-playability of application-specific info (on client &amp;amp; in flight)&amp;lt;br&amp;gt;&lt;br /&gt;
*Protecting theft and re-playability of session-specific info (in flight)&amp;lt;br&amp;gt;&lt;br /&gt;
*Protecting session-specific information from attack on the client &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Protecting_Against_CSRF 5. Protecting against CSRF]'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Hygiene: Discuss/show frames-busting, cross-domain policy; Discuss referrer and other red herrings &amp;lt;br&amp;gt;&lt;br /&gt;
*Tokens (crafting, scoping, and checking)&amp;lt;br&amp;gt;&lt;br /&gt;
*Discussions, techniques on scale&amp;lt;br&amp;gt;&lt;br /&gt;
*Discussions, techniquest on CAPTCHA, re-auth, etc. &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Providing_Access_to_Persisted_Data 6. Providing Access to Persisted Data]'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Controlling visibility of tables by role&amp;lt;br&amp;gt;&lt;br /&gt;
*Providing access to safe SQL-like query through DAO layer&amp;lt;br&amp;gt;&lt;br /&gt;
*Discussions, techniques for providing secure'auto-wiring' / marshaling&amp;lt;br&amp;gt;&lt;br /&gt;
*Encoding and canonicalization for storage (or alternatively: Security concerns with heirarchical caching and object pooling) &amp;lt;br&amp;gt;&lt;br /&gt;
== Resources ==&lt;br /&gt;
GITHUB will allow us to share track code pretty rapidly. Find code-based resources associated with this track here:&lt;br /&gt;
&lt;br /&gt;
[https://code.google.com/p/secure-coding-workshop/ &amp;quot;Secure Coding Workshop (Google Code)&amp;quot; ] &amp;lt;br/&amp;gt;&lt;br /&gt;
[https://github.com/jsteven/OWASP-Secure-Coding-Workshop &amp;quot;Secure Coding Workshop (Github)&amp;quot; ]&lt;br /&gt;
&lt;br /&gt;
[[Category:Summit_2011_Tracks]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track&amp;diff=130352</id>
		<title>Category:Summit 2011 OWASP Secure Coding Workshop Track</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track&amp;diff=130352"/>
				<updated>2012-05-23T08:55:19Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=[[Image:T._secure_coding.jpg]]=&lt;br /&gt;
&lt;br /&gt;
The track seeks to add to OWASP's cache of &amp;quot;secure code&amp;quot;. Facilitators will chose a focus for each of the track's sub-sections addressing a &amp;quot;development scenario&amp;quot; developers consistently face in each application they build. Each sub-section aims to deliver secure functionality or code useful in helping developers build security into their application when addressing that development scenario even if it delivers only &amp;quot;code snippets&amp;quot;. Two principals govern this track:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;All track participants will support analysis, design, implementation, and testing activities for each section&lt;br /&gt;
&amp;lt;LI&amp;gt;Each track sub-section should deliver design and implementation useful as a leave-behind, for building security into applications&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The first implementation of this track aims to deliver only code snippets because track organizers want freedom to select topics beyond what already exists in secure programming toolkits, if necessary. For those familiar with OWASP's [http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API ESAPI], the track will seek to:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Use existing ESAPI (or other OWASP project) material where appropriate&lt;br /&gt;
&amp;lt;LI&amp;gt;Roll-up and contribute back to OWASP projects, all applicable code developed during this  track&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Track sub-sections regarding &amp;quot;input validation&amp;quot; and AppSensor represent two OWASP project targets we've already included focus on.&lt;br /&gt;
&lt;br /&gt;
Our goal will be to extend the practice of &amp;quot;building security into applications&amp;quot; without a preference for whether or not the application&lt;br /&gt;
exists in a calcified form of maintenance or whether it's being developed in a green-field manner.  Summarizing: the objective of each sub-section is to make our technology better not necessarily to raise awareness of its existence.&lt;br /&gt;
&lt;br /&gt;
== Facilitation ==&lt;br /&gt;
&lt;br /&gt;
A set of facilitators, each with both a security and development background, will take turns leading their chosen focus. Facilitators will come prepared with their sub-section problem definition, session goals, and supporting material. Do not expect the facilitator to lead a lecture. Rather, expect the facilitator to come with a skeleton analysis of the development scenario and framework for analyzing the security challenge. &lt;br /&gt;
&lt;br /&gt;
Expect facilitators to divide their sub-section into a list of goals for the development scenario. Facilitators will break the goal into intermediate objectives and will either delegate these objectives to participants or help to direct the conversation across contexts for participants. For example: during a sub-section on persistence frameworks, the facilitator may present risks associated with configuring and implementing auto-binding in a particular framework, then direct snippet implementation on other persistence frameworks, owned and implemented by participants themselves. &lt;br /&gt;
&lt;br /&gt;
== Participants ==&lt;br /&gt;
&lt;br /&gt;
Participants will be expected to arrive with at least a conversational understanding (preferably experience) in the sub-topic area. They will be expected to contribute to analysis, design, implementation, and/or testing. Track participants will need to  self-police each sub-section. If&lt;br /&gt;
things get too introductory and forward progress stalls,  participants can help a lagging participant &amp;quot;Get up to speed&amp;quot; with the rest of the session quickly in a side conversation/demo/hand-holding exercise.&lt;br /&gt;
&lt;br /&gt;
== Sub-Sections (Topic Areas) ==&lt;br /&gt;
'''[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Applying_ESAPI_Input_Validation 1. Applying ESAPI Input Validation]'''&lt;br /&gt;
*Serial Decomp: Decode, canonicalize, filter&amp;lt;br&amp;gt;&lt;br /&gt;
*Structured data (SSN, CC, etc.) &amp;lt;br&amp;gt;&lt;br /&gt;
*Unstructured data (comments, blogs, etc.) &amp;lt;br&amp;gt;&lt;br /&gt;
*Other input exaples (ws-, database, etc.) &amp;lt;br&amp;gt;&lt;br /&gt;
'''2. Defining AppSensor Sensors for:'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Forced Browsing &amp;lt;br&amp;gt;&lt;br /&gt;
*Request Velocity&amp;lt;br&amp;gt;&lt;br /&gt;
*Unexpected encodings&amp;lt;br&amp;gt;&lt;br /&gt;
*Impersonation (Sudden user switch) &amp;lt;br&amp;gt;&lt;br /&gt;
'''3. Managing Sessions'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Across requests&amp;lt;br&amp;gt;&lt;br /&gt;
*Across containers&amp;lt;br&amp;gt;&lt;br /&gt;
*Invalidating sessions (Timeout, attack event, logout)&amp;lt;br&amp;gt;&lt;br /&gt;
*Invalidating sessions (across containers, SSO token invalidation, user termination)&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Protecting_Information_Stored_Client-Side 4. Protecting Information Stored Client-Side]'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Threat Modeling the problem &amp;lt;br&amp;gt;&lt;br /&gt;
*Protecting theft and re-playability of application-specific info (on client &amp;amp; in flight)&amp;lt;br&amp;gt;&lt;br /&gt;
*Protecting theft and re-playability of session-specific info (in flight)&amp;lt;br&amp;gt;&lt;br /&gt;
*Protecting session-specific information from attack on the client &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Protecting_Against_CSRF 5. Protecting against CSRF]'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Hygiene: Discuss/show frames-busting, cross-domain policy; Discuss referrer and other red herrings &amp;lt;br&amp;gt;&lt;br /&gt;
*Tokens (crafting, scoping, and checking)&amp;lt;br&amp;gt;&lt;br /&gt;
*Discussions, techniques on scale&amp;lt;br&amp;gt;&lt;br /&gt;
*Discussions, techniquest on CAPTCHA, re-auth, etc. &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Providing_Access_to_Persisted_Data 6. Providing Access to Persisted Data]'''&amp;lt;br&amp;gt;&lt;br /&gt;
*Controlling visibility of tables by role&amp;lt;br&amp;gt;&lt;br /&gt;
*Providing access to safe SQL-like query through DAO layer&amp;lt;br&amp;gt;&lt;br /&gt;
*Discussions, techniques for providing secure'auto-wiring' / marshaling&amp;lt;br&amp;gt;&lt;br /&gt;
*Encoding and canonicalization for storage (or alternatively: Security concerns with heirarchical caching and object pooling) &amp;lt;br&amp;gt;&lt;br /&gt;
== Resources ==&lt;br /&gt;
GITHUB will allow us to share track code pretty rapidly. Find code-based resources associated with this track here:&lt;br /&gt;
&lt;br /&gt;
[https://code.google.com/p/secure-coding-workshop/ &amp;quot;Secure Coding Workshop (Google Code)&amp;quot; ]&lt;br /&gt;
[https://github.com/jsteven/OWASP-Secure-Coding-Workshop &amp;quot;Secure Coding Workshop (Github)&amp;quot; ]&lt;br /&gt;
&lt;br /&gt;
[[Category:Summit_2011_Tracks]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Service_Security_Cheat_Sheet&amp;diff=129605</id>
		<title>Web Service Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Service_Security_Cheat_Sheet&amp;diff=129605"/>
				<updated>2012-05-11T10:28:41Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Authors and Primary Editors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction  =&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing guidance to securing web services and preventing web services related attacks. Please notice that due to the difference of implementation between different frameworks, this cheat sheet is kept at a high level. &lt;br /&gt;
&lt;br /&gt;
== Transport Confidentiality  ==&lt;br /&gt;
&lt;br /&gt;
Transport confidentiality protects against eavesdropping and man-in-the-middle attacks against web service communications to/from the server. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - All communication with and between web services containing sensitive features, an authenticated session, or transfer of sensitive data must be encrypted using well configured TLS. This is recommended even if the messages themselves are encrypted because SSL/TLS provides numerous benefits beyond traffic confidentiality including integrity protection, replay defenses, and server authentication. For more information on how to do this properly see the [[Transport Layer Protection Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
== Server Authentication  ==&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - SSL/TLS must be used to authenticate the service provider to the service consumer. The service consumer should verify the server certificate is issued by a trusted provider, is not expired, is not revoked, matches the domain name of the service, and that the server has proven that it has the private key associated with the public key certificate (by properly signing something or successfully decrypting something encrypted with the associated public key).&lt;br /&gt;
&lt;br /&gt;
== User Authentication ==&lt;br /&gt;
&lt;br /&gt;
User authentication verifies the identity of the user or the system trying to connect to the service. Such authentication is usually a function of the container of the web service.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - If used, Basic Authentication must be conducted over SSL, but Basic Authentication is not recommended.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Client Certificate Authentication using SSL is a strong form of authentication that is recommended.&lt;br /&gt;
&lt;br /&gt;
== Transport Encoding  ==&lt;br /&gt;
&lt;br /&gt;
SOAP encoding styles are meant to move data between software objects into XML format and back again.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Enforce the same encoding style between the client and the server.&lt;br /&gt;
&lt;br /&gt;
== Message Integrity  ==&lt;br /&gt;
&lt;br /&gt;
This is for data at rest. Integrity of data in transit can easily be provided by SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
When using public key cryptography, encryption does guarantee confidentiality but it does not guarantee integrity since the receiver's public key is public. For the same reason, encryption does not ensure the identity of the sender. &lt;br /&gt;
&lt;br /&gt;
'''Rule '''- For XML data, use XML digital signatures to provide message integrity using the sender's private key. This signature can be validated by the recipient using the sender’s digital certificate (public key).&lt;br /&gt;
&lt;br /&gt;
== Message Confidentiality  ==&lt;br /&gt;
&lt;br /&gt;
Data elements meant to be kept confidential must be encrypted using a strong encryption cipher with an adequate key length to deter brute forcing.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Messages containing sensitive data must be encrypted using a strong encryption cipher. This could be transport encryption or message encryption.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Messages containing sensitive data that must remain encrypted at rest after receipt must be encrypted with strong data encryption, not just transport encryption.&lt;br /&gt;
&lt;br /&gt;
== Authorization  ==&lt;br /&gt;
&lt;br /&gt;
Web services need to authorize web service clients the same way web applications authorize users. A web service needs to make sure a web service client is authorized to: perform a certain action (coarse-grained); on the requested data (fine-grained).&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - A web service should authorize its clients whether they have access to the method in question. Following authentication, the web service should check the privileges of the requesting entity whether they have access to the requested resource. This should be done on every request.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Ensure access to administration and management functions within the Web Service Application is limited to web service administrators. Ideally, any administrative capabilities would be in an application that is completely separate from the web services being managed by these capabilities, thus completely separating normal users from these sensitive functions.&lt;br /&gt;
&lt;br /&gt;
== Schema Validation  ==&lt;br /&gt;
&lt;br /&gt;
Schema validation enforces constraints and syntax defined by the schema. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Web services must validate SOAP payloads against their associated XML schema definition (XSD).&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - The XSD defined for a SOAP web service should, at a minimum, define the maximum length and character set of every parameter allowed to pass into and out of the web service.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - The XSD defined for a SOAP web service should define strong (ideally white list) validation patterns for all fixed format parameters (e.g., zip codes, phone numbers, list values, etc.).&lt;br /&gt;
&lt;br /&gt;
== Content Validation  ==&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Like any web application, web services need to validate input before consuming it. Content validation for XML input should include: &lt;br /&gt;
&lt;br /&gt;
*Validation against malformed XML entities &lt;br /&gt;
*Validation against XML Bomb attacks &lt;br /&gt;
*Validating inputs using a strong white list &lt;br /&gt;
*Validating against external entity attacks&lt;br /&gt;
&lt;br /&gt;
== Output Encoding  ==&lt;br /&gt;
&lt;br /&gt;
Web services need to ensure that output sent to clients is encoded to be consumed as data and not as scripts. This gets pretty important when web service clients use the output to render HTML pages either directly or indirectly using AJAX objects. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - All the rules of output encoding applies as per [[XSS (Cross Site Scripting) Prevention Cheat Sheet]] .&lt;br /&gt;
&lt;br /&gt;
== Virus Protection  ==&lt;br /&gt;
&lt;br /&gt;
SOAP provides the ability to attach files and document to SOAP messages. This gives the opportunity for hackers to attach viruses and malware to these SOAP messages. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Ensure Virus Scanning technology is installed and preferably inline so files and attachments could be checked before being saved on disk. &lt;br /&gt;
'''Rule''' - Ensure Virus Scanning technology is regularly updated with the latest virus definitions / rules.&lt;br /&gt;
&lt;br /&gt;
== Message Size  ==&lt;br /&gt;
&lt;br /&gt;
Web services like web applications could be a target for DOS attacks by automatically sending the web services thousands of large size SOAP messages. This either cripples the application making it unable to respond to legitimate messages or it could take it down entirely. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - SOAP Messages size should be limited to an appropriate size limit. Larger size limit (or no limit at all) increases the chances of a successful DoS attack.&lt;br /&gt;
&lt;br /&gt;
== Availability ==&lt;br /&gt;
&lt;br /&gt;
=== Message Throughput ===&lt;br /&gt;
&lt;br /&gt;
Throughput represents the number of web service requests served during a specific amount of time. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Configuration should be optimized for maximum message throughput to avoid running into DoS-like situations.&lt;br /&gt;
&lt;br /&gt;
=== XML Denial of Service Protection  ===&lt;br /&gt;
&lt;br /&gt;
XML Denial of Service is probably the most serious attack against web services. So the web service must provide the following validation: &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Validation against recursive payloads&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Validation against oversized payloads&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Protection against XML entity expansion&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Validating against overlong element names. If you are working with SOAP-based Web Services, the element names are those SOAP Actions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This protection should be provided by your XML parser/schema validator. To verify, build test cases to make sure your parser to resistant to these types of attacks.&lt;br /&gt;
&lt;br /&gt;
== Endpoint Security Profile  ==&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Web services must be compliant with Web Services-Interoperability (WS-I) Basic Profile at minimum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Gunnar Peterson &amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:sherif.koussa@owasp.org Sherif Koussa] &amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:dave.wichers@owasp.org Dave Wichers] &amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:jim@owasp.org Jim Manico] &lt;br /&gt;
&lt;br /&gt;
= Related Pages =&lt;br /&gt;
{{Cheatsheet_Navigation}} &lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Service_Security_Cheat_Sheet&amp;diff=129604</id>
		<title>Web Service Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Service_Security_Cheat_Sheet&amp;diff=129604"/>
				<updated>2012-05-11T10:24:02Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Authors and Primary Editors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction  =&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing guidance to securing web services and preventing web services related attacks. Please notice that due to the difference of implementation between different frameworks, this cheat sheet is kept at a high level. &lt;br /&gt;
&lt;br /&gt;
== Transport Confidentiality  ==&lt;br /&gt;
&lt;br /&gt;
Transport confidentiality protects against eavesdropping and man-in-the-middle attacks against web service communications to/from the server. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - All communication with and between web services containing sensitive features, an authenticated session, or transfer of sensitive data must be encrypted using well configured TLS. This is recommended even if the messages themselves are encrypted because SSL/TLS provides numerous benefits beyond traffic confidentiality including integrity protection, replay defenses, and server authentication. For more information on how to do this properly see the [[Transport Layer Protection Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
== Server Authentication  ==&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - SSL/TLS must be used to authenticate the service provider to the service consumer. The service consumer should verify the server certificate is issued by a trusted provider, is not expired, is not revoked, matches the domain name of the service, and that the server has proven that it has the private key associated with the public key certificate (by properly signing something or successfully decrypting something encrypted with the associated public key).&lt;br /&gt;
&lt;br /&gt;
== User Authentication ==&lt;br /&gt;
&lt;br /&gt;
User authentication verifies the identity of the user or the system trying to connect to the service. Such authentication is usually a function of the container of the web service.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - If used, Basic Authentication must be conducted over SSL, but Basic Authentication is not recommended.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Client Certificate Authentication using SSL is a strong form of authentication that is recommended.&lt;br /&gt;
&lt;br /&gt;
== Transport Encoding  ==&lt;br /&gt;
&lt;br /&gt;
SOAP encoding styles are meant to move data between software objects into XML format and back again.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Enforce the same encoding style between the client and the server.&lt;br /&gt;
&lt;br /&gt;
== Message Integrity  ==&lt;br /&gt;
&lt;br /&gt;
This is for data at rest. Integrity of data in transit can easily be provided by SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
When using public key cryptography, encryption does guarantee confidentiality but it does not guarantee integrity since the receiver's public key is public. For the same reason, encryption does not ensure the identity of the sender. &lt;br /&gt;
&lt;br /&gt;
'''Rule '''- For XML data, use XML digital signatures to provide message integrity using the sender's private key. This signature can be validated by the recipient using the sender’s digital certificate (public key).&lt;br /&gt;
&lt;br /&gt;
== Message Confidentiality  ==&lt;br /&gt;
&lt;br /&gt;
Data elements meant to be kept confidential must be encrypted using a strong encryption cipher with an adequate key length to deter brute forcing.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Messages containing sensitive data must be encrypted using a strong encryption cipher. This could be transport encryption or message encryption.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Messages containing sensitive data that must remain encrypted at rest after receipt must be encrypted with strong data encryption, not just transport encryption.&lt;br /&gt;
&lt;br /&gt;
== Authorization  ==&lt;br /&gt;
&lt;br /&gt;
Web services need to authorize web service clients the same way web applications authorize users. A web service needs to make sure a web service client is authorized to: perform a certain action (coarse-grained); on the requested data (fine-grained).&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - A web service should authorize its clients whether they have access to the method in question. Following authentication, the web service should check the privileges of the requesting entity whether they have access to the requested resource. This should be done on every request.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Ensure access to administration and management functions within the Web Service Application is limited to web service administrators. Ideally, any administrative capabilities would be in an application that is completely separate from the web services being managed by these capabilities, thus completely separating normal users from these sensitive functions.&lt;br /&gt;
&lt;br /&gt;
== Schema Validation  ==&lt;br /&gt;
&lt;br /&gt;
Schema validation enforces constraints and syntax defined by the schema. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Web services must validate SOAP payloads against their associated XML schema definition (XSD).&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - The XSD defined for a SOAP web service should, at a minimum, define the maximum length and character set of every parameter allowed to pass into and out of the web service.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - The XSD defined for a SOAP web service should define strong (ideally white list) validation patterns for all fixed format parameters (e.g., zip codes, phone numbers, list values, etc.).&lt;br /&gt;
&lt;br /&gt;
== Content Validation  ==&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Like any web application, web services need to validate input before consuming it. Content validation for XML input should include: &lt;br /&gt;
&lt;br /&gt;
*Validation against malformed XML entities &lt;br /&gt;
*Validation against XML Bomb attacks &lt;br /&gt;
*Validating inputs using a strong white list &lt;br /&gt;
*Validating against external entity attacks&lt;br /&gt;
&lt;br /&gt;
== Output Encoding  ==&lt;br /&gt;
&lt;br /&gt;
Web services need to ensure that output sent to clients is encoded to be consumed as data and not as scripts. This gets pretty important when web service clients use the output to render HTML pages either directly or indirectly using AJAX objects. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - All the rules of output encoding applies as per [[XSS (Cross Site Scripting) Prevention Cheat Sheet]] .&lt;br /&gt;
&lt;br /&gt;
== Virus Protection  ==&lt;br /&gt;
&lt;br /&gt;
SOAP provides the ability to attach files and document to SOAP messages. This gives the opportunity for hackers to attach viruses and malware to these SOAP messages. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Ensure Virus Scanning technology is installed and preferably inline so files and attachments could be checked before being saved on disk. &lt;br /&gt;
'''Rule''' - Ensure Virus Scanning technology is regularly updated with the latest virus definitions / rules.&lt;br /&gt;
&lt;br /&gt;
== Message Size  ==&lt;br /&gt;
&lt;br /&gt;
Web services like web applications could be a target for DOS attacks by automatically sending the web services thousands of large size SOAP messages. This either cripples the application making it unable to respond to legitimate messages or it could take it down entirely. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - SOAP Messages size should be limited to an appropriate size limit. Larger size limit (or no limit at all) increases the chances of a successful DoS attack.&lt;br /&gt;
&lt;br /&gt;
== Availability ==&lt;br /&gt;
&lt;br /&gt;
=== Message Throughput ===&lt;br /&gt;
&lt;br /&gt;
Throughput represents the number of web service requests served during a specific amount of time. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Configuration should be optimized for maximum message throughput to avoid running into DoS-like situations.&lt;br /&gt;
&lt;br /&gt;
=== XML Denial of Service Protection  ===&lt;br /&gt;
&lt;br /&gt;
XML Denial of Service is probably the most serious attack against web services. So the web service must provide the following validation: &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Validation against recursive payloads&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Validation against oversized payloads&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Protection against XML entity expansion&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Validating against overlong element names. If you are working with SOAP-based Web Services, the element names are those SOAP Actions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This protection should be provided by your XML parser/schema validator. To verify, build test cases to make sure your parser to resistant to these types of attacks.&lt;br /&gt;
&lt;br /&gt;
== Endpoint Security Profile  ==&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Web services must be compliant with Web Services-Interoperability (WS-I) Basic Profile at minimum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Gunnar Peterson &amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:sherif.koussa@owasp.org Sherif Koussa] &amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:dave.wichers@owasp.org Dave Wichers] &amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:jim@owasp.org Jim Manico] &lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}} &lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Service_Security_Cheat_Sheet&amp;diff=129603</id>
		<title>Web Service Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Service_Security_Cheat_Sheet&amp;diff=129603"/>
				<updated>2012-05-11T10:12:35Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Transport Confidentiality */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction  =&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing guidance to securing web services and preventing web services related attacks. Please notice that due to the difference of implementation between different frameworks, this cheat sheet is kept at a high level. &lt;br /&gt;
&lt;br /&gt;
== Transport Confidentiality  ==&lt;br /&gt;
&lt;br /&gt;
Transport confidentiality protects against eavesdropping and man-in-the-middle attacks against web service communications to/from the server. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - All communication with and between web services containing sensitive features, an authenticated session, or transfer of sensitive data must be encrypted using well configured TLS. This is recommended even if the messages themselves are encrypted because SSL/TLS provides numerous benefits beyond traffic confidentiality including integrity protection, replay defenses, and server authentication. For more information on how to do this properly see the [[Transport Layer Protection Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
== Server Authentication  ==&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - SSL/TLS must be used to authenticate the service provider to the service consumer. The service consumer should verify the server certificate is issued by a trusted provider, is not expired, is not revoked, matches the domain name of the service, and that the server has proven that it has the private key associated with the public key certificate (by properly signing something or successfully decrypting something encrypted with the associated public key).&lt;br /&gt;
&lt;br /&gt;
== User Authentication ==&lt;br /&gt;
&lt;br /&gt;
User authentication verifies the identity of the user or the system trying to connect to the service. Such authentication is usually a function of the container of the web service.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - If used, Basic Authentication must be conducted over SSL, but Basic Authentication is not recommended.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Client Certificate Authentication using SSL is a strong form of authentication that is recommended.&lt;br /&gt;
&lt;br /&gt;
== Transport Encoding  ==&lt;br /&gt;
&lt;br /&gt;
SOAP encoding styles are meant to move data between software objects into XML format and back again.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Enforce the same encoding style between the client and the server.&lt;br /&gt;
&lt;br /&gt;
== Message Integrity  ==&lt;br /&gt;
&lt;br /&gt;
This is for data at rest. Integrity of data in transit can easily be provided by SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
When using public key cryptography, encryption does guarantee confidentiality but it does not guarantee integrity since the receiver's public key is public. For the same reason, encryption does not ensure the identity of the sender. &lt;br /&gt;
&lt;br /&gt;
'''Rule '''- For XML data, use XML digital signatures to provide message integrity using the sender's private key. This signature can be validated by the recipient using the sender’s digital certificate (public key).&lt;br /&gt;
&lt;br /&gt;
== Message Confidentiality  ==&lt;br /&gt;
&lt;br /&gt;
Data elements meant to be kept confidential must be encrypted using a strong encryption cipher with an adequate key length to deter brute forcing.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Messages containing sensitive data must be encrypted using a strong encryption cipher. This could be transport encryption or message encryption.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Messages containing sensitive data that must remain encrypted at rest after receipt must be encrypted with strong data encryption, not just transport encryption.&lt;br /&gt;
&lt;br /&gt;
== Authorization  ==&lt;br /&gt;
&lt;br /&gt;
Web services need to authorize web service clients the same way web applications authorize users. A web service needs to make sure a web service client is authorized to: perform a certain action (coarse-grained); on the requested data (fine-grained).&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - A web service should authorize its clients whether they have access to the method in question. Following authentication, the web service should check the privileges of the requesting entity whether they have access to the requested resource. This should be done on every request.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Ensure access to administration and management functions within the Web Service Application is limited to web service administrators. Ideally, any administrative capabilities would be in an application that is completely separate from the web services being managed by these capabilities, thus completely separating normal users from these sensitive functions.&lt;br /&gt;
&lt;br /&gt;
== Schema Validation  ==&lt;br /&gt;
&lt;br /&gt;
Schema validation enforces constraints and syntax defined by the schema. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Web services must validate SOAP payloads against their associated XML schema definition (XSD).&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - The XSD defined for a SOAP web service should, at a minimum, define the maximum length and character set of every parameter allowed to pass into and out of the web service.&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - The XSD defined for a SOAP web service should define strong (ideally white list) validation patterns for all fixed format parameters (e.g., zip codes, phone numbers, list values, etc.).&lt;br /&gt;
&lt;br /&gt;
== Content Validation  ==&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Like any web application, web services need to validate input before consuming it. Content validation for XML input should include: &lt;br /&gt;
&lt;br /&gt;
*Validation against malformed XML entities &lt;br /&gt;
*Validation against XML Bomb attacks &lt;br /&gt;
*Validating inputs using a strong white list &lt;br /&gt;
*Validating against external entity attacks&lt;br /&gt;
&lt;br /&gt;
== Output Encoding  ==&lt;br /&gt;
&lt;br /&gt;
Web services need to ensure that output sent to clients is encoded to be consumed as data and not as scripts. This gets pretty important when web service clients use the output to render HTML pages either directly or indirectly using AJAX objects. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - All the rules of output encoding applies as per [[XSS (Cross Site Scripting) Prevention Cheat Sheet]] .&lt;br /&gt;
&lt;br /&gt;
== Virus Protection  ==&lt;br /&gt;
&lt;br /&gt;
SOAP provides the ability to attach files and document to SOAP messages. This gives the opportunity for hackers to attach viruses and malware to these SOAP messages. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Ensure Virus Scanning technology is installed and preferably inline so files and attachments could be checked before being saved on disk. &lt;br /&gt;
'''Rule''' - Ensure Virus Scanning technology is regularly updated with the latest virus definitions / rules.&lt;br /&gt;
&lt;br /&gt;
== Message Size  ==&lt;br /&gt;
&lt;br /&gt;
Web services like web applications could be a target for DOS attacks by automatically sending the web services thousands of large size SOAP messages. This either cripples the application making it unable to respond to legitimate messages or it could take it down entirely. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - SOAP Messages size should be limited to an appropriate size limit. Larger size limit (or no limit at all) increases the chances of a successful DoS attack.&lt;br /&gt;
&lt;br /&gt;
== Availability ==&lt;br /&gt;
&lt;br /&gt;
=== Message Throughput ===&lt;br /&gt;
&lt;br /&gt;
Throughput represents the number of web service requests served during a specific amount of time. &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Configuration should be optimized for maximum message throughput to avoid running into DoS-like situations.&lt;br /&gt;
&lt;br /&gt;
=== XML Denial of Service Protection  ===&lt;br /&gt;
&lt;br /&gt;
XML Denial of Service is probably the most serious attack against web services. So the web service must provide the following validation: &lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Validation against recursive payloads&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Validation against oversized payloads&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Protection against XML entity expansion&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Validating against overlong element names. If you are working with SOAP-based Web Services, the element names are those SOAP Actions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This protection should be provided by your XML parser/schema validator. To verify, build test cases to make sure your parser to resistant to these types of attacks.&lt;br /&gt;
&lt;br /&gt;
== Endpoint Security Profile  ==&lt;br /&gt;
&lt;br /&gt;
'''Rule''' - Web services must be compliant with Web Services-Interoperability (WS-I) Basic Profile at minimum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Gunnar Peterson - &amp;lt;br/&amp;gt;&lt;br /&gt;
Sherif Koussa - sherif.koussa[at]owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Dave Wichers - dave.wichers[at]owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}} &lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Services&amp;diff=129602</id>
		<title>Web Services</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Services&amp;diff=129602"/>
				<updated>2012-05-11T10:02:25Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Guide Table of Contents|Development Guide Table of Contents]] &lt;br /&gt;
&lt;br /&gt;
__TOC__ &lt;br /&gt;
&lt;br /&gt;
''This section of the Development Guide details the common issues facing Web services developers, and methods to address common issues. Due to the space limitations, it cannot look at all of the surrounding issues in great detail, since each of them deserves a separate book of its own. Instead, an attempt is made to steer the reader to the appropriate usage patterns, and warn about potential roadblocks on the way.'' &lt;br /&gt;
&lt;br /&gt;
Web Services have received a lot of press, and with that comes a great deal of confusion over what they really are. Some are heralding Web Services as the biggest technology breakthrough since the web itself; others are more skeptical that they are nothing more than evolved web applications. In either case, the issues of web application security apply to web services just as they do to web applications. &lt;br /&gt;
&lt;br /&gt;
== What are Web Services?  ==&lt;br /&gt;
&lt;br /&gt;
Suppose you were making an application that you wanted other applications to be able to communicate with. For example, your Java application has stock information updated every 5 minutes and you would like other applications, ones that may not even exist yet, to be able to use the data. &lt;br /&gt;
&lt;br /&gt;
One way you can do this is to serialize your Java objects and send them over the wire to the application that requests them. The problem with this approach is that a C# application would not be able to use these objects because it serializes and deserializes objects differently than Java. &lt;br /&gt;
&lt;br /&gt;
Another approach you could take is to send a text file filled with data to the application that requests it. This is better because a C# application could read the data. But this has another flaw: Lets assume your stock application is not the only one the C# application needs to interact with. Maybe it needs weather data, local restaurant data, movie data, etc. If every one of these applications uses its own unique file format, it would take considerable research to get the C# application to a working state. &lt;br /&gt;
&lt;br /&gt;
The solution to both of these problems is to send a standard file format. A format that any application can use, regardless of the data being transported. Web Services are this solution. They let any application communicate with any other application without having to consider the language it was developed in or the format of the data. &lt;br /&gt;
&lt;br /&gt;
At the simplest level, web services can be seen as a specialized web application that differs mainly at the presentation tier level. While web applications typically are HTML-based, web services are XML-based. Interactive users for B2C (business to consumer) transactions normally access web applications, while web services are employed as building blocks by other web applications for forming B2B (business to business) chains using the so-called SOA model. Web services typically present a public functional interface, callable in a programmatic fashion, while web applications tend to deal with a richer set of features and are content-driven in most cases. &lt;br /&gt;
&lt;br /&gt;
== Securing Web Services  ==&lt;br /&gt;
&lt;br /&gt;
Web services, like other distributed applications, require protection at multiple levels: &lt;br /&gt;
&lt;br /&gt;
*SOAP messages that are sent on the wire should be delivered confidentially and without tampering&lt;br /&gt;
&lt;br /&gt;
*The server needs to be confident who it is talking to and what the clients are entitled to&lt;br /&gt;
&lt;br /&gt;
*The clients need to know that they are talking to the right server, and not a phishing site (see the Phishing chapter for more information)&lt;br /&gt;
&lt;br /&gt;
*System message logs should contain sufficient information to reliably reconstruct the chain of events and track those back to the authenticated callers&lt;br /&gt;
&lt;br /&gt;
Correspondingly, the high-level approaches to solutions, discussed in the following sections, are valid for pretty much any distributed application, with some variations in the implementation details. &lt;br /&gt;
&lt;br /&gt;
The good news for Web Services developers is that these are infrastructure-level tasks, so, theoretically, it is only the system administrators who should be worrying about these issues. However, for a number of reasons discussed later in this chapter, WS developers usually have to be at least aware of all these risks, and oftentimes they still have to resort to manually coding or tweaking the protection components. &lt;br /&gt;
&lt;br /&gt;
== Communication security  ==&lt;br /&gt;
&lt;br /&gt;
There is a commonly cited statement, and even more often implemented approach &amp;quot;We are using SSL to protect all communication, we are secure&amp;quot;. At the same time, there have been so many articles published on the topic of &amp;quot;channel security vs. token security&amp;quot; that it hardly makes sense to repeat those arguments here. Therefore, listed below is just a brief rundown of most common pitfalls when using channel security alone: &lt;br /&gt;
&lt;br /&gt;
*It provides only &amp;quot;point-to-point&amp;quot; security&lt;br /&gt;
&lt;br /&gt;
Any communication with multiple &amp;quot;hops&amp;quot; requires establishing separate channels (and trusts) between each communicating node along the way. There is also a subtle issue of trust transitivity, as trusts between node pairs {A,B} and {B,C} do not automatically imply {A,C} trust relationship. &lt;br /&gt;
&lt;br /&gt;
*Storage issue&lt;br /&gt;
&lt;br /&gt;
After messages are received on the server (even if it is not the intended recipient), they exist in the clear-text form, at least temporarily. Storing the transmitted information at the intermediate aggravates the problem or destination servers in log files (where it can be browsed by anybody) and local caches. &lt;br /&gt;
&lt;br /&gt;
*Lack of interoperability&lt;br /&gt;
&lt;br /&gt;
While SSL provides a standard mechanism for transport protection, applications then have to utilize highly proprietary mechanisms for transmitting credentials, ensuring freshness, integrity, and confidentiality of data sent over the secure channel. Using a different server, which is semantically equivalent, but accepts a different format of the same credentials, would require altering the client and prevent forming automatic B2B service chains. &lt;br /&gt;
&lt;br /&gt;
Standards-based token protection in many cases provides a superior alternative for message-oriented Web Service SOAP communication model. &lt;br /&gt;
&lt;br /&gt;
That said the reality is that the most Web Services today are still protected by some form of channel security mechanism, which alone might suffice for a simple internal application. However, one should clearly realize the limitations of such approach, and make conscious trade-offs at the design time, whether channel, token, or combined protection would work better for each specific case. &lt;br /&gt;
&lt;br /&gt;
== Passing credentials  ==&lt;br /&gt;
&lt;br /&gt;
In order to enable credentials exchange and authentication for Web Services, their developers must address the following issues. &lt;br /&gt;
&lt;br /&gt;
First, since SOAP messages are XML-based, all passed credentials have to be converted to text format. This is not a problem for username/password types of credentials, but binary ones (like X.509 certificates or Kerberos tokens) require converting them into text prior to sending and unambiguously restoring them upon receiving, which is usually done via a procedure called Base64 encoding and decoding. &lt;br /&gt;
&lt;br /&gt;
Second, passing credentials carries an inherited risk of their disclosure, either by sniffing them during the wire transmission, or by analyzing the server logs. Therefore, things like passwords and private keys need to be either encrypted, or just never sent &amp;quot;in the clear&amp;quot;. Usual ways to avoid sending sensitive credentials are using cryptographic hashing and/or signatures. &lt;br /&gt;
&lt;br /&gt;
== Ensuring message freshness  ==&lt;br /&gt;
&lt;br /&gt;
Even a valid message may present a danger if it is utilized in a &amp;quot;replay attack&amp;quot;. i.e. it is sent multiple times to the server to make it repeat the requested operation. This may be achieved by capturing an entire message, even if it is sufficiently protected against tampering, since it is the message itself that is used for attack now (see the XML Injection section of the Interpreter Injection chapter). &lt;br /&gt;
&lt;br /&gt;
Usual means to protect against replayed messages is either using unique identifiers (nonces) on messages and keeping track of processed ones, or using a relatively short validity time window. In the Web Services world, information about the message creation time is usually communicated by inserting timestamps, which may just tell the instant the message was created, or have additional information, like its expiration time, or certain conditions. &lt;br /&gt;
&lt;br /&gt;
The latter solution, although easier to implement, requires clock synchronization and is sensitive to server time skew, whereas server or clients' clocks drift too much, preventing timely message delivery, although this usually does not present significant problems with modern-day computers. A greater issue lies with message queuing at the servers, where messages may be expiring while waiting to be processed in the queue of an especially busy or non-responsive server. &lt;br /&gt;
&lt;br /&gt;
== Protecting message integrity  ==&lt;br /&gt;
&lt;br /&gt;
When a message is received by a web service, it must always ask two questions: ¿whether I trust the caller?, ¿whether it created this message&amp;amp;nbsp;?. Assuming that the caller trust has been established one way or another, the server has to be assured that the message it is looking at was indeed issued by the caller, and not altered along the way (intentionally or not). This may affect technical qualities of a SOAP message, such as the message's timestamp, or business content, such as the amount to be withdrawn from the bank account. Obviously, neither change should go undetected by the server. &lt;br /&gt;
&lt;br /&gt;
In communication protocols, there are usually some mechanisms like checksum applied to ensure packet's integrity. This would not be sufficient, however, in the realm of publicly exposed Web Services, since checksums (or digests, their cryptographic equivalents) are easily replaceable and cannot be reliably tracked back to the issuer. The required association may be established by utilizing HMAC, or by combining message digests with either cryptographic signatures or with secret key-encryption (assuming the keys are only known to the two communicating parties) to ensure that any change will immediately result in a cryptographic error. &lt;br /&gt;
&lt;br /&gt;
== Protecting message confidentiality  ==&lt;br /&gt;
&lt;br /&gt;
Oftentimes, it is not sufficient to ensure the integrity; in many cases it is also desirable that nobody can see the data that is passed around and/or stored locally. It may apply to the entire message being processed, or only to certain parts of it; In either case, some type of encryption is required to conceal the content. Normally, symmetric encryption algorithms are used to encrypt bulk data, since it is significantly faster than the asymmetric ones. Asymmetric encryption is then applied to protect the symmetric session keys, which, in many implementations, are valid for one communication only and are subsequently discarded. &lt;br /&gt;
&lt;br /&gt;
Applying encryption requires conducting an extensive setup work, since the communicating parties now have to be aware of which keys they can trust, deal with certificate and key validation, and know which keys should be used for communication. &lt;br /&gt;
&lt;br /&gt;
In many cases, encryption is combined with signatures to provide both integrity and confidentiality. Normally, signing keys are different from the encrypting ones, primarily because of their different lifecycles, signing keys are permanently associated with their owners, while encryption keys may be invalidated after the message exchange. Another reason may be separation of business responsibilities - the signing authority (and the corresponding key) may belong to one department or person, while encryption keys are generated by the server controlled by members of IT department. &lt;br /&gt;
&lt;br /&gt;
== Access control  ==&lt;br /&gt;
&lt;br /&gt;
After the message has been received and successfully validated, the server must decide: &lt;br /&gt;
&lt;br /&gt;
*Does it know who is requesting the operation (Identification)&lt;br /&gt;
&lt;br /&gt;
*Does it trust the caller's identity claim (Authentication)&lt;br /&gt;
&lt;br /&gt;
*Does it allow the caller to perform this operation (Authorization)&lt;br /&gt;
&lt;br /&gt;
There is not much WS-specific activity that takes place at this stage, just several new ways of passing the credentials for authentication. Most often, authorization (or entitlement) tasks occur completely outside of the Web Service implementation, at the Policy Server that protects the whole domain. &lt;br /&gt;
&lt;br /&gt;
There is another significant problem here, the traditional HTTP firewalls do not help at stopping attacks at the Web Services. An organization would need an XML/SOAP firewall, which is capable of conducting application-level analysis of the web server's traffic and make intelligent decision about passing SOAP messages to their destination. The reader would need to refer to other books and publications on this very important topic, as it is impossible to cover it within just one chapter. &lt;br /&gt;
&lt;br /&gt;
== Audit  ==&lt;br /&gt;
&lt;br /&gt;
A common task, typically required from the audits, is reconstructing the chain of events that led to a certain problem. Normally, this would be achieved by saving server logs in a secure location, available only to the IT administrators and system auditors, in order to create what is commonly referred to as &amp;quot;audit trail&amp;quot;. Web Services are no exception to this practice, and follow the general approach of other types of Web Applications. &lt;br /&gt;
&lt;br /&gt;
Another auditing goal is non-repudiation, meaning that a message can be verifiably traced back to the caller. Following the standard legal practice, electronic documents now require some form of an &amp;quot;electronic signature&amp;quot;, but its definition is extremely broad and can mean practically anything, in many cases, entering your name and birthday qualifies as an e-signature. &lt;br /&gt;
&lt;br /&gt;
As far as the WS are concerned, such level of protection would be insufficient and easily forgeable. The standard practice is to require cryptographic digital signatures over any content that has to be legally binding, if a document with such a signature is saved in the audit log, it can be reliably traced to the owner of the signing key &lt;br /&gt;
&lt;br /&gt;
== Web Services Security Hierarchy  ==&lt;br /&gt;
&lt;br /&gt;
Technically speaking, Web Services themselves are very simple and versatile, XML-based communication, described by an XML-based grammar, called Web Services Description Language (WSDL, see &amp;lt;u&amp;gt;http://www.w3.org/TR/2005/WD-wsdl20-20050510&amp;lt;/u&amp;gt;), which binds abstract service interfaces, consisting of messages, expressed as XML Schema, and operations, to the underlying wire format. Although it is by no means a requirement, the format of choice is currently SOAP over HTTP. This means that Web Service interfaces are described in terms of the incoming and outgoing SOAP messages, transmitted over HTTP protocol. &lt;br /&gt;
&lt;br /&gt;
=== Standards committees  ===&lt;br /&gt;
&lt;br /&gt;
Before reviewing the individual standards, it is worth taking a brief look at the organizations which are developing and promoting them. There are quite a few industry-wide groups and consortiums working in this area, most important of which are listed below. &lt;br /&gt;
&lt;br /&gt;
W3C (see &amp;lt;u&amp;gt;http://www.w3.org&amp;lt;/u&amp;gt;) is the most well known industry group, which owns many Web-related standards and develops them in Working Group format. Of particular interest to this chapter are XML Schema, SOAP, XML-dsig, XML-enc, and WSDL standards (called recommendations in the W3C's jargon). &lt;br /&gt;
&lt;br /&gt;
OASIS (see &amp;lt;u&amp;gt;http://www.oasis-open.org&amp;lt;/u&amp;gt;) mostly deals with Web Service-specific standards, not necessarily security-related. It also operates on a committee basis, forming so-called Technical Committees (TC) for the standards that it is going to be developing. Of interest for this discussion, OASIS owns WS-Security and SAML standards. &lt;br /&gt;
&lt;br /&gt;
Web Services Interoperability Organization (WS-I, see &amp;lt;u&amp;gt;http://www.ws-i.org/&amp;lt;/u&amp;gt;) was formed to promote a general framework for interoperable Web Services. Mostly its work consists of taking other broadly accepted standards, and developing so-called profiles, or sets of requirements for conforming Web Service implementations. In particular, its Basic Security Profile (BSP) relies on the OASIS' WS-Security standard and specifies sets of optional and required security features in Web Services that claim interoperability. &lt;br /&gt;
&lt;br /&gt;
Liberty Alliance (LA, see &amp;lt;u&amp;gt;http://projectliberty.org&amp;lt;/u&amp;gt;) consortium was formed to develop and promote an interoperable Identity Federation framework. Although this framework is not strictly Web Service-specific, but rather general, it is important for this topic because of its close relation with the SAML standard developed by OASIS. &lt;br /&gt;
&lt;br /&gt;
Besides the previously listed organizations, there are other industry associations, both permanently established and short-lived, which push forward various Web Service security activities. They are usually made up of software industry's leading companies, such as Microsoft, IBM, Verisign, BEA, Sun, and others, that join them to work on a particular issue or proposal. Results of these joint activities, once they reach certain maturity, are often submitted to standardizations committees as a basis for new industry standards. &lt;br /&gt;
&lt;br /&gt;
== SOAP  ==&lt;br /&gt;
&lt;br /&gt;
Simple Object Access Protocol (SOAP, see &amp;lt;u&amp;gt;http://www.w3.org/TR/2003/REC-soap12-part1-20030624/&amp;lt;/u&amp;gt;) provides an XML-based framework for exchanging structured and typed information between peer services. This information, formatted into Header and Body, can theoretically be transmitted over a number of transport protocols, but only HTTP binding has been formally defined and is in active use today. SOAP provides for Remote Procedure Call-style (RPC) interactions, similar to remote function calls, and Document-style communication, with message contents based exclusively on XML Schema definitions in the Web Service's WSDL. Invocation results may be optionally returned in the response message, or a Fault may be raised, which is roughly equivalent to using exceptions in traditional programming languages. &lt;br /&gt;
&lt;br /&gt;
SOAP protocol, while defining the communication framework, provides no help in terms of securing message exchanges, the communications must either happen over secure channels, or use protection mechanisms described later in this chapter. &lt;br /&gt;
&lt;br /&gt;
=== XML security specifications (XML-dsig &amp;amp;amp; Encryption)  ===&lt;br /&gt;
&lt;br /&gt;
XML Signature (XML-dsig, see &amp;lt;u&amp;gt;http://www.w3.org/TR/2002/REC-xmldsig-core-20020212&amp;lt;/u&amp;gt;/), and XML Encryption (XML-enc, see &amp;lt;u&amp;gt;http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/&amp;lt;/u&amp;gt;) add cryptographic protection to plain XML documents. These specifications add integrity, message and signer authentication, as well as support for encryption/decryption of whole XML documents or only of some elements inside them. &lt;br /&gt;
&lt;br /&gt;
The real value of those standards comes from the highly flexible framework developed to reference the data being processed (both internal and external relative to the XML document), refer to the secret keys and key pairs, and to represent results of signing/encrypting operations as XML, which is added to/substituted in the original document. &lt;br /&gt;
&lt;br /&gt;
However, by themselves, XML-dsig and XML-enc do not solve the problem of securing SOAP-based Web Service interactions, since the client and service first have to agree on the order of those operations, where to look for the signature, how to retrieve cryptographic tokens, which message elements should be signed and encrypted, how long a message is considered to be valid, and so on. These issues are addressed by the higher-level specifications, reviewed in the following sections. &lt;br /&gt;
&lt;br /&gt;
=== Security specifications  ===&lt;br /&gt;
&lt;br /&gt;
In addition to the above standards, there is a broad set of security-related specifications being currently developed for various aspects of Web Service operations. &lt;br /&gt;
&lt;br /&gt;
One of them is SAML, which defines how identity, attribute, and authorization assertions should be exchanged among participating services in a secure and interoperable way. &lt;br /&gt;
&lt;br /&gt;
A broad consortium, headed by Microsoft and IBM, with the input from Verisign, RSA Security, and other participants, developed a family of specifications, collectively known as &amp;quot;Web Services Roadmap&amp;quot;. Its foundation, WS-Security, has been submitted to OASIS and became an OASIS standard in 2004. Other important specifications from this family are still found in different development stages, and plans for their submission have not yet been announced, although they cover such important issues as security policies (WS-Policy et al), trust issues and security token exchange (WS-Trust), establishing context for secure conversation (WS-SecureConversation). One of the specifications in this family, WS-Federation, directly competes with the work being done by the LA consortium, and, although it is supposed to be incorporated into the Longhorn release of Windows, its future is not clear at the moment, since it has been significantly delayed and presently does not have industry momentum behind it. &lt;br /&gt;
&lt;br /&gt;
== WS-Security Standard  ==&lt;br /&gt;
&lt;br /&gt;
WS-Security specification (WSS) was originally developed by Microsoft, IBM, and Verisign as part of a &amp;quot;Roadmap&amp;quot;, which was later renamed to Web Services Architecture, or WSA. WSS served as the foundation for all other specifications in this domain, creating a basic infrastructure for developing message-based security exchange. Because of its importance for establishing interoperable Web Services, it was submitted to OASIS and, after undergoing the required committee process, became an officially accepted standard. Current version is 1.1, and it was released on February 17, 2006.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The protocol is currently officially called WSS and developed via committee in Oasis-Open.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Organization of the standard  ===&lt;br /&gt;
&lt;br /&gt;
The WSS standard itself deals with several core security areas, leaving many details to so-called profile documents. The core areas, broadly defined by the standard, are: &lt;br /&gt;
&lt;br /&gt;
*Ways to add security headers (WSSE Header) to SOAP Envelopes&lt;br /&gt;
&lt;br /&gt;
*Attachment of security tokens and credentials to the message&lt;br /&gt;
&lt;br /&gt;
*Inserting a timestamp&lt;br /&gt;
&lt;br /&gt;
*Signing the message&lt;br /&gt;
&lt;br /&gt;
*Encrypting the message&lt;br /&gt;
&lt;br /&gt;
*Extensibility&lt;br /&gt;
&lt;br /&gt;
Flexibility of the WS-Security standard lies in its extensibility, so that it remains adaptable to new types of security tokens and protocols that are being developed. This flexibility is achieved by defining additional profiles for inserting new types of security tokens into the WSS framework. While the signing and encrypting parts of the standards are not expected to require significant changes (only when the underlying XML-dsig and XML-enc are updated), the types of tokens, passed in WSS messages, and ways of attaching them to the message may vary substantially. At the high level the WSS standard defines three types of security tokens, attachable to a WSS Header: Username/password, Binary, and XML tokens. Each of those types is further specified in one (or more) profile document, which defines additional tokens' attributes and elements, needed to represent a particular type of security token. &lt;br /&gt;
&lt;br /&gt;
[[Image:WSS Specification Hierarchy.gif|Figure 4: WSS specification hierarchy]] &lt;br /&gt;
&lt;br /&gt;
=== Purpose  ===&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WSS standard is providing tools for message-level communication protection, whereas each message represents an isolated piece of information, carrying enough security data to verify all important message properties, such as: authenticity, integrity, freshness, and to initiate decryption of any encrypted message parts. This concept is a stark contrast to the traditional channel security, which methodically applies pre-negotiated security context to the whole stream, as opposed to the selective process of securing individual messages in WSS. In the Roadmap, that type of service is eventually expected to be provided by implementations of standards like WS-SecureConversation. &lt;br /&gt;
&lt;br /&gt;
From the beginning, the WSS standard was conceived as a message-level toolkit for securely delivering data for higher level protocols. Those protocols, based on the standards like WS-Policy, WS-Trust, and Liberty Alliance, rely on the transmitted tokens to implement access control policies, token exchange, and other types of protection and integration. However, taken alone, the WSS standard does not mandate any specific security properties, and an ad-hoc application of its constructs can lead to subtle security vulnerabilities and hard to detect problems, as is also discussed in later sections of this chapter. &lt;br /&gt;
&lt;br /&gt;
== WS-Security Building Blocks  ==&lt;br /&gt;
&lt;br /&gt;
The WSS standard actually consists of a number of documents, one core document, which defines how security headers may be included into SOAP envelope and describes all high-level blocks, which must be present in a valid security header. Profile documents have the dual task of extending definitions for the token types they are dealing with, providing additional attributes, elements, as well as defining relationships left out of the core specification, such as using attachments. &lt;br /&gt;
&lt;br /&gt;
Core WSS 1.1 specification, located at &amp;lt;u&amp;gt;http://www.oasis-open.org/committees/download.php/16790/wss-v1.1-spec-os-SOAPMessageSecurity.pdf&amp;lt;/u&amp;gt;, defines several types of security tokens (discussed later in this section: see 0), ways to reference them, timestamps, and ways to apply XML-dsig and XML-enc in the security headers, see the XML Dsig section for more details about their general structure. &lt;br /&gt;
&lt;br /&gt;
Associated specifications are: &lt;br /&gt;
&lt;br /&gt;
*Username token profile 1.1, located at &amp;lt;u&amp;gt;http://www.oasis-open.org/committees/download.php/16782/wss-v1.1-spec-os-UsernameTokenProfile.pdf&amp;lt;/u&amp;gt;, which adds various password-related extensions to the basic UsernameToken from the core specification&lt;br /&gt;
&lt;br /&gt;
*X.509 token profile 1.1, located at &amp;lt;u&amp;gt;http://www.oasis-open.org/committees/download.php/16785/wss-v1.1-spec-os-x509TokenProfile.pdf&amp;lt;/u&amp;gt; which specifies, how X.509 certificates may be passed in the BinarySecurityToken, specified by the core document&lt;br /&gt;
&lt;br /&gt;
*SAML Token profile 1.1, located at &amp;lt;u&amp;gt;http://www.oasis-open.org/committees/download.php/16768/wss-v1.1-spec-os-SAMLTokenProfile.pdf&amp;lt;/u&amp;gt; that specifies how XML-based SAML tokens can be inserted into WSS headers.&lt;br /&gt;
&lt;br /&gt;
*Kerberos Token Profile 1.1, located at &amp;lt;u&amp;gt;http://www.oasis-open.org/committees/download.php/16788/wss-v1.1-spec-os-KerberosTokenProfile.pdf&amp;lt;/u&amp;gt; that defines how to encode Kerberos tickets and attach them to SOAP messages.&lt;br /&gt;
&lt;br /&gt;
*Rights Expression Language (REL) Token Profile 1.1, located at &amp;lt;u&amp;gt;http://www.oasis-open.org/committees/download.php/16687/oasis-wss-rel-token-profile-1.1.pdf&amp;lt;/u&amp;gt; that describes the use of ISO/IEC 21000-5 Rights Expressions with respect to the WS-Security specification.&lt;br /&gt;
&lt;br /&gt;
*SOAP with Attachments (SWA) Profile 1.1, located at &amp;lt;u&amp;gt;http://www.oasis-open.org/committees/download.php/16672/wss-v1.1-spec-os-SwAProfile.pdf&amp;lt;/u&amp;gt; that describes how to use WSS-Sec with SOAP Messages with Attachments.&lt;br /&gt;
&lt;br /&gt;
=== How data is passed  ===&lt;br /&gt;
&lt;br /&gt;
WSS security specification deals with two distinct types of data: security information, which includes security tokens, signatures, digests, etc; and message data, i.e. everything else that is passed in the SOAP message. Being an XML-based standard, WSS works with textual information grouped into XML elements. Any binary data, such as cryptographic signatures or Kerberos tokens, has to go through a special transform, called Base64 encoding/decoding, which provides straightforward conversion from binary to ASCII formats and back. The example below demonstrates how binary data looks like in the encoded format: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''cCBDQTAeFw0wNDA1MTIxNjIzMDRaFw0wNTA1MTIxNjIzMDRaMG8xCz'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
After encoding a binary element, an attribute with the algorithm's identifier is added to the XML element carrying the data, so that the receiver would know to apply the correct decoder to read it. These identifiers are defined in the WSS specification documents. &lt;br /&gt;
&lt;br /&gt;
=== Security header's structure  ===&lt;br /&gt;
&lt;br /&gt;
A security header in a message is used as a sort of an envelope around a letter, it seals and protects the letter, but does not care about its content. This &amp;quot;indifference&amp;quot; works in the other direction as well, as the letter (SOAP message) should not know, nor should it care about its envelope (WSS Header), since the different units of information, carried on the envelope and in the letter, are presumably targeted at different people or applications. &lt;br /&gt;
&lt;br /&gt;
A SOAP Header may actually contain multiple security headers, as long as they are addressed to different actors (for SOAP 1.1), or roles (for SOAP 1.2). Their contents may also be referring to each other, but such references present a very complicated logistical problem for determining the proper order of decryptions/signature verifications, and should generally be avoided. WSS security header itself has a loose structure, as the specification itself does not require any elements to be present; so, the minimalist header with an empty message will look like: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 &amp;amp;lt;soap:Envelope xmlns:soap=&amp;quot;http://schemas.xmlsoap.org/soap/envelope/&amp;quot;&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;soap:Header&amp;amp;gt;&lt;br /&gt;
     &amp;amp;lt;wsse:Security xmlns:wsse=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd&amp;quot; xmlns:wsu=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd&amp;quot; soap:mustUnderstand=&amp;quot;1&amp;quot;&amp;amp;gt;&lt;br /&gt;
 &lt;br /&gt;
     &amp;amp;lt;/wsse:Security&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;/soap:Header&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;soap:Body&amp;amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &amp;amp;lt;/soap:Body&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;/soap:Envelope&amp;amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
However, to be useful, it must carry some information, which is going to help securing the message. It means including one or more security tokens (see 0) with references, XML Signature, and XML Encryption elements, if the message is signed and/or encrypted. So, a typical header will look more like the following picture: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 &amp;amp;lt;soap:Envelope xmlns:soap=&amp;quot;http://schemas.xmlsoap.org/soap/envelope/&amp;quot;&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;soap:Header&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;wsse:Security xmlns=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd&amp;quot; xmlns:wsse=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd&amp;quot; xmlns:wsu=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd&amp;quot; soap:mustUnderstand=&amp;quot;1&amp;quot;&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;wsse:BinarySecurityToken EncodingType=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary&amp;quot; ValueType=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3&amp;quot; wsu:Id=&amp;quot;aXhOJ5&amp;quot;&amp;amp;gt;MIICtzCCAi... &lt;br /&gt;
   &amp;amp;lt;/wsse:BinarySecurityToken&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;xenc:EncryptedKey xmlns:xenc=&amp;quot;http://www.w3.org/2001/04/xmlenc#&amp;quot;&amp;amp;gt;&lt;br /&gt;
     &amp;amp;lt;xenc:EncryptionMethod Algorithm=&amp;quot;http://www.w3.org/2001/04/xmlenc#rsa-1_5&amp;quot;/&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;dsig:KeyInfo xmlns:dsig=&amp;quot;http://www.w3.org/2000/09/xmldsig#&amp;quot;&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;wsse:SecurityTokenReference&amp;amp;gt;&lt;br /&gt;
 	    &amp;amp;lt;wsse:Reference URI=&amp;quot;#aXhOJ5&amp;quot; ValueType=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3&amp;quot;/&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;/wsse:SecurityTokenReference&amp;amp;gt;  &lt;br /&gt;
 	&amp;amp;lt;/dsig:KeyInfo&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;xenc:CipherData&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;xenc:CipherValue&amp;amp;gt;Nb0Mf...&amp;amp;lt;/xenc:CipherValue&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;/xenc:CipherData&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;xenc:ReferenceList&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;xenc:DataReference URI=&amp;quot;#aDNa2iD&amp;quot;/&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;/xenc:ReferenceList&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;/xenc:EncryptedKey&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;wsse:SecurityTokenReference wsu:Id=&amp;quot;aZG0sG&amp;quot;&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;wsse:KeyIdentifier ValueType=&amp;quot;http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID&amp;quot; wsu:Id=&amp;quot;a2tv1Uz&amp;quot;&amp;amp;gt; 1106844369755&amp;amp;lt;/wsse:KeyIdentifier&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;/wsse:SecurityTokenReference&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;saml:Assertion AssertionID=&amp;quot;1106844369755&amp;quot; IssueInstant=&amp;quot;2005-01-27T16:46:09.755Z&amp;quot; Issuer=&amp;quot;www.my.com&amp;quot; MajorVersion=&amp;quot;1&amp;quot; MinorVersion=&amp;quot;1&amp;quot; xmlns:saml=&amp;quot;urn:oasis:names:tc:SAML:1.0:assertion&amp;quot;&amp;amp;gt;&lt;br /&gt;
 		...				&lt;br /&gt;
   &amp;amp;lt;/saml:Assertion&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;wsu:Timestamp wsu:Id=&amp;quot;afc6fbe-a7d8-fbf3-9ac4-f884f435a9c1&amp;quot;&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;wsu:Created&amp;amp;gt;2005-01-27T16:46:10Z&amp;amp;lt;/wsu:Created&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;wsu:Expires&amp;amp;gt;2005-01-27T18:46:10Z&amp;amp;lt;/wsu:Expires&amp;amp;gt;&lt;br /&gt;
  &amp;amp;lt;/wsu:Timestamp&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;dsig:Signature xmlns:dsig=&amp;quot;http://www.w3.org/2000/09/xmldsig#&amp;quot; Id=&amp;quot;sb738c7&amp;quot;&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;dsig:SignedInfo Id=&amp;quot;obLkHzaCOrAW4kxC9az0bLA22&amp;quot;&amp;amp;gt;&lt;br /&gt;
 		...&lt;br /&gt;
 	  &amp;amp;lt;dsig:Reference URI=&amp;quot;#s91397860&amp;quot;&amp;amp;gt;&lt;br /&gt;
 		...									&lt;br /&gt;
         &amp;amp;lt;dsig:DigestValue&amp;amp;gt;5R3GSp+OOn17lSdE0knq4GXqgYM=&amp;amp;lt;/dsig:DigestValue&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;/dsig:Reference&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;/dsig:SignedInfo&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;dsig:SignatureValue Id=&amp;quot;a9utKU9UZk&amp;quot;&amp;amp;gt;LIkagbCr5bkXLs8l...&amp;amp;lt;/dsig:SignatureValue&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;dsig:KeyInfo&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;wsse:SecurityTokenReference&amp;amp;gt;&lt;br /&gt;
 	    &amp;amp;lt;wsse:Reference URI=&amp;quot;#aXhOJ5&amp;quot; ValueType=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3&amp;quot;/&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;/wsse:SecurityTokenReference&amp;amp;gt;&lt;br /&gt;
     &amp;amp;lt;/dsig:KeyInfo&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;/dsig:Signature&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;/wsse:Security&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;/soap:Header&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;soap:Body xmlns:wsu=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd&amp;quot; wsu:Id=&amp;quot;s91397860&amp;quot;&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;xenc:EncryptedData xmlns:xenc=&amp;quot;http://www.w3.org/2001/04/xmlenc#&amp;quot; Id=&amp;quot;aDNa2iD&amp;quot; Type=&amp;quot;http://www.w3.org/2001/04/xmlenc#Content&amp;quot;&amp;amp;gt;&lt;br /&gt;
  &amp;amp;lt;xenc:EncryptionMethod Algorithm=&amp;quot;http://www.w3.org/2001/04/xmlenc#tripledes-cbc&amp;quot;/&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;xenc:CipherData&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;xenc:CipherValue&amp;amp;gt;XFM4J6C...&amp;amp;lt;/xenc:CipherValue&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;/xenc:CipherData&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;/xenc:EncryptedData&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;/soap:Body&amp;amp;gt;&lt;br /&gt;
 &amp;amp;lt;/soap:Envelope&amp;amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Types of tokens  ===&lt;br /&gt;
&lt;br /&gt;
A WSS Header may have the following types of security tokens in it: &lt;br /&gt;
&lt;br /&gt;
*Username token&lt;br /&gt;
&lt;br /&gt;
Defines mechanisms to pass username and, optionally, a password - the latter is described in the username profile document. Unless the whole token is encrypted, a message which includes a clear-text password should always be transmitted via a secured channel. In situations where the target Web Service has access to clear-text passwords for verification (this might not be possible with LDAP or some other user directories, which do not return clear-text passwords), using a hashed version with nonce and a timestamp is generally preferable. The profile document defines an unambiguous algorithm for producing password hash: &lt;br /&gt;
&lt;br /&gt;
 Password_Digest = Base64 ( SHA-1 ( nonce + created + password ) )&lt;br /&gt;
&lt;br /&gt;
*Binary token&lt;br /&gt;
&lt;br /&gt;
They are used to convey binary data, such as X.509 certificates, in a text-encoded format, Base64 by default. The core specification defines BinarySecurityToken element, while profile documents specify additional attributes and sub-elements to handle attachment of various tokens. Presently, both the X.509 and the Kerberos profiles have been adopted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
       &amp;amp;lt;wsse:BinarySecurityToken EncodingType=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary&amp;quot; ValueType=&amp;quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3&amp;quot; wsu:Id=&amp;quot;aXhOJ5&amp;quot;&amp;amp;gt;&lt;br /&gt;
     MIICtzCCAi...&lt;br /&gt;
   &amp;amp;lt;/wsse:BinarySecurityToken&amp;amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*XML token&lt;br /&gt;
&lt;br /&gt;
These are meant for any kind of XML-based tokens, but primarily, for SAML assertions. The core specification merely mentions the possibility of inserting such tokens, leaving all details to the profile documents. At the moment, SAML 1.1 profile has been accepted by OASIS. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 	&amp;amp;lt;saml:Assertion AssertionID=&amp;quot;1106844369755&amp;quot; IssueInstant=&amp;quot;2005-01-27T16:46:09.755Z&amp;quot; Issuer=&amp;quot;www.my.com&amp;quot; MajorVersion=&amp;quot;1&amp;quot; MinorVersion=&amp;quot;1&amp;quot; xmlns:saml=&amp;quot;urn:oasis:names:tc:SAML:1.0:assertion&amp;quot;&amp;amp;gt;&lt;br /&gt;
 		...				&lt;br /&gt;
 	&amp;amp;lt;/saml:Assertion&amp;amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Although technically it is not a security token, a Timestamp element may be inserted into a security header to ensure message's freshness. See the further reading section for a design pattern on this. &lt;br /&gt;
&lt;br /&gt;
=== Referencing message parts  ===&lt;br /&gt;
&lt;br /&gt;
In order to retrieve security tokens, passed in the message, or to identify signed and encrypted message parts, the core specification adopts usage of a special attribute, wsu:Id. The only requirement on this attribute is that the values of such IDs should be unique within the scope of XML document where they are defined. Its application has a significant advantage for the intermediate processors, as it does not require understanding of the message's XML Schema. Unfortunately, XML Signature and Encryption specifications do not allow for attribute extensibility (i.e. they have closed schema), so, when trying to locate signature or encryption elements, local IDs of the Signature and Encryption elements must be considered first. &lt;br /&gt;
&lt;br /&gt;
WSS core specification also defines a general mechanism for referencing security tokens via SecurityTokenReference element. An example of such element, referring to a SAML assertion in the same header, is provided below: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 	&amp;amp;lt;wsse:SecurityTokenReference wsu:Id=&amp;quot;aZG0sGbRpXLySzgM1X6aSjg22&amp;quot;&amp;amp;gt;&lt;br /&gt;
 	  &amp;amp;lt;wsse:KeyIdentifier ValueType=&amp;quot;http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID&amp;quot; wsu:Id=&amp;quot;a2tv1Uz&amp;quot;&amp;amp;gt;&lt;br /&gt;
         1106844369755&lt;br /&gt;
       &amp;amp;lt;/wsse:KeyIdentifier&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;/wsse:SecurityTokenReference&amp;amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
As this element was designed to refer to pretty much any possible token type (including encryption keys, certificates, SAML assertions, etc) both internal and external to the WSS Header, it is enormously complicated. The specification recommends using two of its possible four reference types: Direct References (by URI) and Key Identifiers (some kind of token identifier). Profile documents (SAML, X.509 for instance) provide additional extensions to these mechanisms to take advantage of specific qualities of different token types. &lt;br /&gt;
&lt;br /&gt;
== Communication Protection Mechanisms  ==&lt;br /&gt;
&lt;br /&gt;
As was already explained earlier (see 0), channel security, while providing important services, is not a panacea, as it does not solve many of the issues facing Web Service developers. WSS helps addressing some of them at the SOAP message level, using the mechanisms described in the sections below. &lt;br /&gt;
&lt;br /&gt;
=== Integrity  ===&lt;br /&gt;
&lt;br /&gt;
WSS specification makes use of the XML-dsig standard to ensure message integrity, restricting its functionality in certain cases; for instance, only explicitly referenced elements can be signed (i.e. no Embedding or Embedded signature modes are allowed). Prior to signing an XML document, a transformation is required to create its canonical representation, taking into account the fact that XML documents can be represented in a number of semantically equivalent ways. There are two main transformations defined by the XML Digital Signature WG at W3C, Inclusive and Exclusive Canonicalization Transforms (C14N and EXC-C14N), which differ in the way namespace declarations are processed. The WSS core specification specifically recommends using EXC-C14N, as it allows copying signed XML content into other documents without invalidating the signature. &lt;br /&gt;
&lt;br /&gt;
In order to provide a uniform way of addressing signed tokens, WSS adds a Security Token Reference (STR) Dereference Transform option, which is comparable with dereferencing a pointer to an object of specific data type in programming languages. Similarly, in addition to the XML Signature-defined ways of addressing signing keys, WSS allows for references to signing security tokens through the STR mechanism (explained in 0), extended by token profiles to accommodate specific token types. A typical signature example is shown in an earlier sample in the section 0. &lt;br /&gt;
&lt;br /&gt;
Typically, an XML signature is applied to secure elements such as SOAP Body and the timestamp, as well as any user credentials, passed in the request. There is an interesting twist when a particular element is both signed and encrypted, since these operations may follow (even repeatedly) in any order, and knowledge of their ordering is required for signature verification. To address this issue, the WSS core specification requires that each new element is pre-pended to the security header, thus defining the &amp;quot;natural&amp;quot; order of operations. A particularly nasty problem arises when there are several security headers in a single SOAP message, using overlapping signature and encryption blocks, as there is nothing in this case that would point to the right order of operations. &lt;br /&gt;
&lt;br /&gt;
=== Confidentiality  ===&lt;br /&gt;
&lt;br /&gt;
For its confidentiality protection, WSS relies on yet another standard, XML Encryption. Similarly to XML-dsig, this standard operates on selected elements of the SOAP message, but it then replaces the encrypted element's data with a &amp;amp;lt;xenc:EncryptedData&amp;amp;gt; sub-element carrying the encrypted bytes. For encryption efficiency, the specification recommends using a unique key, which is then encrypted by the recipient's public key and pre-pended to the security header in a &amp;amp;lt;xenc:EncryptedKey&amp;amp;gt; element. A SOAP message with encrypted body is shown in the section 0. &lt;br /&gt;
&lt;br /&gt;
=== Freshness  ===&lt;br /&gt;
&lt;br /&gt;
SOAP messages' freshness is addressed via timestamp mechanism, each security header may contain just one such element, which states, in UTC time and using the UTC time format, creation and expiration moments of the security header. It is important to realize that the timestamp is applied to the WSS Header, not to the SOAP message itself, since the latter may contain multiple security headers, each with a different timestamp. There is an unresolved problem with this &amp;quot;single timestampt&amp;quot; approach, since, once the timestamp is created and signed, it is impossible to update it without breaking existing signatures, even in case of a legitimate change in the WSS Header. &lt;br /&gt;
&lt;br /&gt;
       &amp;amp;lt;wsu:Timestamp wsu:Id=&amp;quot;afc6fbe-a7d8-fbf3-9ac4-f884f435a9c1&amp;quot;&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;wsu:Created&amp;amp;gt;2005-01-27T16:46:10Z&amp;amp;lt;/wsu:Created&amp;amp;gt;&lt;br /&gt;
 	&amp;amp;lt;wsu:Expires&amp;amp;gt;2005-01-27T18:46:10Z&amp;amp;lt;/wsu:Expires&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;/wsu:Timestamp&amp;amp;gt;&lt;br /&gt;
&lt;br /&gt;
If a timestamp is included in a message, it is typically signed to prevent tampering and replay attacks. There is no mechanism foreseen to address clock synchronization issue (which, as was already point out earlier, is generally not an issue in modern day systems), this has to be addressed out-of-band as far as the WSS mechanics is concerned. See the further reading section for a design pattern addressing this issue. &lt;br /&gt;
&lt;br /&gt;
== Access Control Mechanisms  ==&lt;br /&gt;
&lt;br /&gt;
When it comes to access control decisions, Web Services do not offer specific protection mechanisms by themselves, they just have the means to carry the tokens and data payloads in a secure manner between source and destination SOAP endpoints. &lt;br /&gt;
&lt;br /&gt;
For more complete description of access control tasks, please, refer to other sections of this Development Guide. &lt;br /&gt;
&lt;br /&gt;
=== Identification  ===&lt;br /&gt;
&lt;br /&gt;
Identification represents a claim to have certain identity, which is expressed by attaching certain information to the message. This can be a username, an SAML assertion, a Kerberos ticket, or any other piece of information, from which the service can infer who the caller claims to be. &lt;br /&gt;
&lt;br /&gt;
WSS represents a very good way to convey this information, as it defines an extensible mechanism for attaching various token types to a message (see 0). It is the receiver's job to extract the attached token and figure out which identity it carries, or to reject the message if it can find no acceptable token in it. &lt;br /&gt;
&lt;br /&gt;
=== Authentication  ===&lt;br /&gt;
&lt;br /&gt;
Authentication can come in two flavors: credentials verification or token validation. The subtle difference between the two is that tokens are issued after some kind of authentication has already happened prior to the current invocation, and they usually contain user's identity along with the proof of its integrity. &lt;br /&gt;
&lt;br /&gt;
WSS offers support for a number of standard authentication protocols by defining binding mechanism for transmitting protocol-specific tokens and reliably linking them to the sender. However, the mechanics of proof that the caller is who he claims to be is completely at the Web Service's discretion. Whether it takes the supplied username and password's hash and checks it against the backend user store, or extracts subject name from the X.509 certificate used for signing the message, verifies the certificate chain and looks up the user in its store, at the moment, there are no requirements or standards which would dictate that it should be done one way or another. &lt;br /&gt;
&lt;br /&gt;
=== Authorization  ===&lt;br /&gt;
&lt;br /&gt;
XACML may be used for expressing authorization rules, but its usage is not Web Service-specific, it has much broader scope. So, whatever policy or role-based authorization mechanism the host server already has in place will most likely be utilized to protect the deployed Web Services deployed as well. &lt;br /&gt;
&lt;br /&gt;
Depending on the implementation, there may be several layers of authorization involved at the server. For instance, JSRs 224 (JAX-RPC 2.0) and 109 (Implementing Enterprise Web Services), which define Java binding for Web Services, specify implementing Web Services in J2EE containers. This means that when a Web Service is accessed, there will be a URL authorization check executed by the J2EE container, followed by a check at the Web Service layer for the Web Service-specific resource. Granularity of such checks is implementation-specific and is not dictated by any standards. In the Windows universe it happens in a similar fashion, since IIS is going to execute its access checks on the incoming HTTP calls before they reach the ASP.NET runtime, where SOAP message is going to be further decomposed and analyzed. &lt;br /&gt;
&lt;br /&gt;
=== Policy Agreement  ===&lt;br /&gt;
&lt;br /&gt;
Normally, Web Services communication is based on the endpoint's public interface, defined in its WSDL file. This descriptor has sufficient details to express SOAP binding requirements, but it does not define any security parameters, leaving Web Service developers struggling to find out-of-band mechanisms to determine the endpoint's security requirements. &lt;br /&gt;
&lt;br /&gt;
To make up for these shortcomings, WS-Policy specification was conceived as a mechanism for expressing complex policy requirements and qualities, sort of WSDL on steroids. Through the published policy SOAP endpoints can advertise their security requirements, and their clients can apply appropriate measures of message protection to construct the requests. The general WS-Policy specification (actually comprised of three separate documents) also has extensions for specific policy types, one of them,&amp;amp;nbsp; for security, WS-SecurityPolicy. &lt;br /&gt;
&lt;br /&gt;
If the requestor does not possess the required tokens, it can try obtaining them via trust mechanism, using WS-Trust-enabled services, which are called to securely exchange various token types for the requested identity. &lt;br /&gt;
&lt;br /&gt;
[[Image:Using Trust Service.gif|Figure 5. Using Trust service]] &lt;br /&gt;
&lt;br /&gt;
Unfortunately, both WS-Policy and WS-Trust specifications have not been submitted for standardization to public bodies, and their development is progressing via private collaboration of several companies, although it was opened up for other participants as well. As a positive factor, there have been several interoperability events conducted for these specifications, so the development process of these critical links in the Web Services' security infrastructure is not a complete black box. &lt;br /&gt;
&lt;br /&gt;
== Forming Web Service Chains  ==&lt;br /&gt;
&lt;br /&gt;
Many existing or planned implementations of SOA or B2B systems rely on dynamic chains of Web Services for accomplishing various business specific tasks, from taking the orders through manufacturing and up to the distribution process. &lt;br /&gt;
&lt;br /&gt;
[[Image:Service Chain.gif|Figure 6: Service chain]] &lt;br /&gt;
&lt;br /&gt;
This is in theory. In practice, there are a lot of obstacles hidden among the way, and one of the major ones among them, security concerns about publicly exposing processing functions to intra- or Internet-based clients. &lt;br /&gt;
&lt;br /&gt;
Here are just a few of the issues that hamper Web Services interaction, incompatible authentication and authorization models for users, amount of trust between services themselves and ways of establishing such trust, maintaining secure connections, and synchronization of user directories or otherwise exchanging users' attributes. These issues will be briefly tackled in the following paragraphs. &lt;br /&gt;
&lt;br /&gt;
=== Incompatible user access control models  ===&lt;br /&gt;
&lt;br /&gt;
As explained earlier, in section 0, Web Services themselves do not include separate extensions for access control, relying instead on the existing security framework. What they do provide, however, are mechanisms for discovering and describing security requirements of a SOAP service (via WS-Policy), and for obtaining appropriate security credentials via WS-Trust based services. &lt;br /&gt;
&lt;br /&gt;
=== Service trust  ===&lt;br /&gt;
&lt;br /&gt;
In order to establish mutual trust between client and service, they have to satisfy each other's policy requirements. A simple and popular model is mutual certificate authentication via SSL, but it is not scalable for open service models, and supports only one authentication type. Services that require more flexibility have to use pretty much the same access control mechanisms as with users to establish each other's identities prior to engaging in a conversation. &lt;br /&gt;
&lt;br /&gt;
=== Secure connections  ===&lt;br /&gt;
&lt;br /&gt;
Once trust is established it would be impractical to require its confirmation on each interaction. Instead, a secure client-server link is formed and maintained the entire time a client's session is active. Again, the most popular mechanism today for maintaining such link is SSL, but it is not a Web Service-specific mechanism, and it has a number of shortcomings when applied to SOAP communication, as explained in 0. &lt;br /&gt;
&lt;br /&gt;
=== Synchronization of user directories  ===&lt;br /&gt;
&lt;br /&gt;
This is a very acute problem when dealing with cross-domain applications, as users' population tends to change frequently among different domains. So, how does a service in domain B decide whether it is going to trust user's claim that he has been already authenticated in domain A? There exist different aspects of this problem. First, a common SSO mechanism, which implies that a user is known in both domains (through synchronization, or by some other means), and authentication tokens from one domain are acceptable in another. In Web Services world, this would be accomplished by passing around a SAML or Kerberos token for a user. &lt;br /&gt;
&lt;br /&gt;
=== Domain federation  ===&lt;br /&gt;
&lt;br /&gt;
Another aspect of the problem is when users are not shared across domains, but merely the fact that a user with certain ID has successfully authenticated in another domain, as would be the case with several large corporations, which would like to form a partnership, but would be reluctant to share customers' details. The decision to accept this request is then based on the inter-domain procedures, establishing special trust relationships and allowing for exchanging such opaque tokens, which would be an example of Federation relationships. Of those efforts, most notable example is Liberty Alliance project, which is now being used as a basis for SAML 2.0 specifications. The work in this area is still far from being completed, and most of the existing deployments are nothing more than POC or internal pilot projects than to real cross-companies deployments, although LA's website does list some case studies of large-scale projects. &lt;br /&gt;
&lt;br /&gt;
== Available Implementations  ==&lt;br /&gt;
&lt;br /&gt;
It is important to realize from the beginning that no security standard by itself is going to provide security to the message exchanges, it is the installed implementations, which will be assessing conformance of the incoming SOAP messages to the applicable standards, as well as appropriately securing the outgoing messages. &lt;br /&gt;
&lt;br /&gt;
=== .NET Web Service Extensions  ===&lt;br /&gt;
&lt;br /&gt;
Since new standards are being developed at a rather quick pace, .NET platform is not trying to catch up immediately, but uses Web Service Extensions (WSE) instead. WSE, currently at the version 2.0, adds development and runtime support for the latest Web Service security standards to the platform and development tools, even while they are still &amp;quot;work in progress&amp;quot;. Once standards mature, their support is incorporated into new releases of the .NET platform, which is what is going to happen when .NET 2.0 finally sees the world. The next release of WSE, 3.0, is going to coincide with VS.2005 release and will take advantages of the latest innovations of .NET 2.0 platform in messaging and Web Application areas. &lt;br /&gt;
&lt;br /&gt;
Considering that Microsoft is one of the most active players in the Web Service security area and recognizing its influence in the industry, its WSE implementation is probably one of the most complete and up to date, and it is strongly advisable to run at least a quick interoperability check with WSE-secured .NET Web Service clients. If you have a Java-based Web Service, and the interoperability is a requirement (which is usually the case), in addition to the questions of security testing one needs to keep in mind the basic interoperability between Java and .NET Web Service data structures. &lt;br /&gt;
&lt;br /&gt;
This is especially important since current versions of .NET Web Service tools frequently do not cleanly handle WS-Security's and related XML schemas as published by OASIS, so some creativity on the part of a Web Service designer is needed. That said, WSE package itself contains very rich and well-structured functionality, which can be utilized both with ASP.NET-based and standalone Web Service clients to check incoming SOAP messages and secure outgoing ones at the infrastructure level, relieving Web Service programmers from knowing these details. Among other things, WSE 2.0 supports the most recent set of WS-Policy and WS-Security profiles, providing for basic message security and WS-Trust with WS-SecureConversation. Those are needed for establishing secure exchanges and sessions - similar to what SSL does at the transport level, but applied to message-based communication. &lt;br /&gt;
&lt;br /&gt;
=== Java toolkits  ===&lt;br /&gt;
&lt;br /&gt;
Most of the publicly available Java toolkits work at the level of XML security, i.e. XML-dsig and XML-enc, such as IBM's XML Security Suite and Apache's XML Security Java project. Java's JSR 105 and JSR 106 (still not finalized) define Java bindings for signatures and encryption, which will allow plugging the implementations as JCA providers once work on those JSRs is completed. &lt;br /&gt;
&lt;br /&gt;
Moving one level up, to address Web Services themselves, the picture becomes muddier, at the moment, there are many implementations in various stages of incompleteness. For instance, Apache is currently working on the WSS4J project, which is moving rather slowly, and there is commercial software package from Phaos (now owned by Oracle), which suffers from a lot of implementation problems. &lt;br /&gt;
&lt;br /&gt;
A popular choice among Web Service developers today is Sun's JWSDP, which includes support for Web Service security. However, its support for Web Service security specifications in the version 1.5 is only limited to implementation of the core WSS standard with username and X.509 certificate profiles. Security features are implemented as part of the JAX-RPC framework and configuration-driven, which allows for clean separation from the Web Service's implementation. &lt;br /&gt;
&lt;br /&gt;
=== Hardware, software systems  ===&lt;br /&gt;
&lt;br /&gt;
This category includes complete systems, rather than toolkits or frameworks. On one hand, they usually provide rich functionality right off the shelf, on the other hand, its usage model is rigidly constrained by the solution's architecture and implementation. This is in contrast to the toolkits, which do not provide any services by themselves, but handing system developers necessary tools to include the desired Web Service security features in their products' or to shoot themselves in the foot by applying them inappropriately. &lt;br /&gt;
&lt;br /&gt;
These systems can be used at the infrastructure layer to verify incoming messages against the effective policy, check signatures, tokens, etc, before passing them on to the target Web Service. When applied to the outgoing SOAP messages, they act as a proxy, now altering the messages to decorate with the required security elements, sign and/or encrypt them. &lt;br /&gt;
&lt;br /&gt;
Software systems are characterized by significant configuration flexibility, but comparatively slow processing. On the bright side, they often provide high level of integration with the existing enterprise infrastructure, relying on the back-end user and policy stores to look at the credentials, extracted from the WSS header, from the broader perspective. An example of such service is TransactionMinder from the former Netegrity, a Policy Enforcement Point for Web Services behind it, layered on top of the Policy Server, which makes policy decisions by checking the extracted credentials against the configured stores and policies. &lt;br /&gt;
&lt;br /&gt;
For hardware systems, performance is the key, they have already broken gigabyte processing threshold, and allow for real-time processing of huge documents, decorated according to the variety of the latest Web Service security standards, not only WSS. The usage simplicity is another attractive point of those systems - in the most trivial cases, the hardware box may be literally dropped in, plugged, and be used right away. These qualities come with a price, however, this performance and simplicity can be achieved as long as the user stays within the pre-configured confines of the hardware box. The moment he tries to integrate with the back-end stores via callbacks (for those solutions that have this capability, since not all of them do), most of the advantages are lost. As an example of such hardware device, Layer 7 Technologies provides a scalable SecureSpan Networking Gateway, which acts both as the inbound firewall and the outbound proxy to handle XML traffic in real time. &lt;br /&gt;
&lt;br /&gt;
== Problems  ==&lt;br /&gt;
&lt;br /&gt;
As is probably clear from the previous sections, Web Services are still experiencing a lot of turbulence, and it will take a while before they can really catch on. Here is a brief look at what problems surround currently existing security standards and their implementations. &lt;br /&gt;
&lt;br /&gt;
=== Immaturity of the standards  ===&lt;br /&gt;
&lt;br /&gt;
Most of the standards are either very recent (couple years old at most), or still being developed. Although standards development is done in committees, which, presumably, reduces risks by going through an exhaustive reviewing and commenting process, some error scenarios still slip in periodically, as no theory can possibly match the testing resulting from pounding by thousands of developers working in the real field. &lt;br /&gt;
&lt;br /&gt;
Additionally, it does not help that for political reasons some of these standards are withheld from public process, which is the case with many standards from the WSA arena (see 0), or that some of the efforts are duplicated, as was the case with LA and WS-Federation specifications. &lt;br /&gt;
&lt;br /&gt;
=== Performance  ===&lt;br /&gt;
&lt;br /&gt;
XML parsing is a slow task, which is an accepted reality, and SOAP processing slows it down even more. Now, with expensive cryptographic and textual conversion operations thrown into the mix, these tasks become a performance bottleneck, even with the latest crypto- and XML-processing hardware solutions offered today. All of the products currently on the market are facing this issue, and they are trying to resolve it with varying degrees of success. &lt;br /&gt;
&lt;br /&gt;
Hardware solutions, while substantially (by orders of magnitude) improving the performance, cannot always be used as an optimal solution, as they cannot be easily integrated with the already existing back-end software infrastructure, at least, not without making performance sacrifices. Another consideration whether hardware-based systems are the right solution, they are usually highly specialized in what they are doing, while modern Application Servers and security frameworks can usually offer a much greater variety of protection mechanisms, protecting not only Web Services, but also other deployed applications in a uniform and consistent way. &lt;br /&gt;
&lt;br /&gt;
=== Complexity and interoperability  ===&lt;br /&gt;
&lt;br /&gt;
As could be deduced from the previous sections, Web Service security standards are fairly complex, and have very steep learning curve associated with them. Most of the current products, dealing with Web Service security, suffer from very mediocre usability due to the complexity of the underlying infrastructure. Configuring all different policies, identities, keys, and protocols takes a lot of time and good understanding of the involved technologies, as most of the times errors that end users are seeing have very cryptic and misleading descriptions. &lt;br /&gt;
&lt;br /&gt;
In order to help administrators and reduce security risks from service misconfigurations, many companies develop policy templates, which group together best practices for protecting incoming and outgoing SOAP messages. Unfortunately, this work is not currently on the radar of any of the standard's bodies, so it appears unlikely that such templates will be released for public use any time soon. Closest to this effort may be WS-I's Basic Security Profile (BSP), which tries to define the rules for better interoperability among Web Services, using a subset of common security features from various security standards like WSS. However, this work is not aimed at supplying the administrators with ready for deployment security templates matching the most popular business use cases, but rather at establishing the least common denominator. &lt;br /&gt;
&lt;br /&gt;
=== Key management  ===&lt;br /&gt;
&lt;br /&gt;
Key management usually lies at the foundation of any other security activity, as most protection mechanisms rely on cryptographic keys one way or another. While Web Services have XKMS protocol for key distribution, local key management still presents a huge challenge in most cases, since PKI mechanism has a lot of well-documented deployment and usability issues. Those systems that opt to use homegrown mechanisms for key management run significant risks in many cases, since questions of storing, updating, and recovering secret and private keys more often than not are not adequately addressed in such solutions. &lt;br /&gt;
&lt;br /&gt;
== Further Reading  ==&lt;br /&gt;
&lt;br /&gt;
*SearchSOA, SOA needs practical operational governance, Toufic Boubez&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;http://searchsoa.techtarget.com/news/interview/0,289202,sid26_gci1288649,00.html?track=NL-110&amp;amp;amp;ad=618937&amp;amp;amp;asrc=EM_NLN_2827289&amp;amp;amp;uid=4724698&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Whitepaper: Securing XML Web Services: XML Firewalls and XML VPNs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;http://forms.layer7tech.com/content/Download?docid=1114&amp;amp;amp;docname=Securing%20XML%20Web%20Services:%20SSL,%20XML%20Firewalling,%20and%20Beyond&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*eBizQ, The Challenges of SOA Security, Peter Schooff&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;http://www.ebizq.net/blogs/news_security/2008/01/the_complexity_of_soa_security.php&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Piliptchouk, D., WS-Security in the Enterprise, O'Reilly ONJava&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;http://www.onjava.com/pub/a/onjava/2005/02/09/wssecurity.html&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;http://www.onjava.com/pub/a/onjava/2005/03/30/wssecurity2.html&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*WS-Security OASIS site&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=wss&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Microsoft, ''What's new with WSE 3.0''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;http://msdn.microsoft.com/webservices/webservices/building/wse/default.aspx?pull=/library/en-us/dnwse/html/newwse3.asp&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Eoin Keary, Preventing DOS attacks on web services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;https://www.threatsandcountermeasures.com/wiki/default.aspx/ThreatsAndCountermeasuresCommunityKB.PreventingDOSAttacksOnWebServices&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Reference  ==&lt;br /&gt;
&lt;br /&gt;
[[Guide Table of Contents|Development Guide Table of Contents]] &lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|broken link]] [[Category:OWASP_Guide_Project]] [[Category:Web_Services]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Tips_for_using_the_project%27s_requirements,_use-cases,_and_user_stories&amp;diff=128119</id>
		<title>Tips for using the project's requirements, use-cases, and user stories</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Tips_for_using_the_project%27s_requirements,_use-cases,_and_user_stories&amp;diff=128119"/>
				<updated>2012-04-19T04:48:04Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This project attempts to present a choice of potential requirements.  Pick what you need, improve what you pick, and don't worry about the rest.&lt;br /&gt;
&lt;br /&gt;
Some of the &amp;quot;requirements&amp;quot; are designed to stimulate questions.  For example, the &amp;quot;compliance with existing contracts&amp;quot; isn't a security requirement per se, but if your organization has a contract in-place dictating certain requirements, you probably ought to figure that out.  The classic example is your company's contract with your Acquiring Bank if you're accepting credit cards.  In addition to being compelled to comply with PCI-DSS standards, you may also be compelled to ask the shopper to identify whether their card is debit or credit etc. &lt;br /&gt;
&lt;br /&gt;
That's not a big security requirement, '''HOWEVER''' if you fail to identify that early, what are the odds that you'll shoehorn it in '''SECURELY''' at a later time?&lt;br /&gt;
&lt;br /&gt;
Other tips:&lt;br /&gt;
&lt;br /&gt;
# Understanding the requirements is the key to success.  If YOU don't understand them and can't explain WHY they're needed, you're doomed.&lt;br /&gt;
# Examples are being collected to help you achieve and communicate understanding.  Look here: [[Useful links to real-world examples of failed web security]]  and if you've got better examples, please add them&lt;br /&gt;
# Overall the project is vendor, platform, and language-agnostic.  Some requirements specific to various scenarios are accumulating haphazardly here: [[Other really good requirements that aren't generic enough to be part of the project but that might be what you're looking for in YOUR environment]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Tips_for_using_the_project%27s_requirements,_use-cases,_and_user_stories&amp;diff=128118</id>
		<title>Tips for using the project's requirements, use-cases, and user stories</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Tips_for_using_the_project%27s_requirements,_use-cases,_and_user_stories&amp;diff=128118"/>
				<updated>2012-04-19T04:47:28Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This project attempts to present a choice of potential requirements.  Pick what you need, improve what you pick, and don't worry about the rest.&lt;br /&gt;
&lt;br /&gt;
Some of the &amp;quot;requirements&amp;quot; are designed to stimulate questions.  For example, the &amp;quot;compliance with existing contracts&amp;quot; isn't a security requirement per se, but if your organization has a contract in-place dictating certain requirements, you probably ought to figure that out.  The classic example is your company's contract with your Acquiring Bank if you're accepting credit cards.  In addition to being compelled to comply with PCI-DSS standards, you may also be compelled to ask the shopper to identify whether their card is debit or credit etc. &lt;br /&gt;
&lt;br /&gt;
 That's not a big security requirement, '''HOWEVER''' if you fail to identify that early, what are the odds that you'll shoehorn it in '''SECURELY''' at a later time?&lt;br /&gt;
&lt;br /&gt;
Other tips:&lt;br /&gt;
&lt;br /&gt;
# Understanding the requirements is the key to success.  If YOU don't understand them and can't explain WHY they're needed, you're doomed.&lt;br /&gt;
# Examples are being collected to help you achieve and communicate understanding.  Look here: [[Useful links to real-world examples of failed web security]]  and if you've got better examples, please add them&lt;br /&gt;
# Overall the project is vendor, platform, and language-agnostic.  Some requirements specific to various scenarios are accumulating haphazardly here: [[Other really good requirements that aren't generic enough to be part of the project but that might be what you're looking for in YOUR environment]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Application_Security_Requirements_Project&amp;diff=128117</id>
		<title>Projects/OWASP Application Security Requirements Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Application_Security_Requirements_Project&amp;diff=128117"/>
				<updated>2012-04-19T03:06:25Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Application Security Requirements Project&lt;br /&gt;
| project_home_page = :Category:OWASP Application Security Requirements Project&lt;br /&gt;
| project_description = &lt;br /&gt;
*The intent of this project is to assemble a useful base of generic/common web application security requirements that could be used in most projects.&lt;br /&gt;
*The product of this project is intended to help all involved in web application security, whether it is project management, risk assessment, software development, testing, etc.&lt;br /&gt;
*The reason d'etre of this project is that, whilst security requirements are sometimes well captured and clearly defined, there are other times when they are not, for any number of reasons.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution ShareAlike 3.0 license]&lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Luis Martinez Bacha&lt;br /&gt;
| leader_email1 = luismartinezbacha@owasp.org&lt;br /&gt;
| leader_username1 = Luis_Armando_Martinez_Bacha&lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Zaki Akhmad&lt;br /&gt;
| contributor_email1 = za@owasp.org&lt;br /&gt;
| contributor_username1 = Zakiakhmad&lt;br /&gt;
&lt;br /&gt;
| contributor_name[1-10] = Zaki Akhmad&lt;br /&gt;
| contributor_email[1-10] = za@owasp.org&lt;br /&gt;
| contributor_username[1-10] = Zakiakhmad&lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
&lt;br /&gt;
| presentation_link =&lt;br /&gt;
&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-appsec-requirements &lt;br /&gt;
&lt;br /&gt;
| project_road_map = &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
# Identify taxonomy/categorization and prioritize&lt;br /&gt;
# Identify industry standards for requirements definition&lt;br /&gt;
# Define detailed work plan&lt;br /&gt;
# Define requirements according to plan&lt;br /&gt;
# Publish first draft&lt;br /&gt;
# Get feedback and adjust plan &lt;br /&gt;
&lt;br /&gt;
| links_url1 = https://www.owasp.org/index.php/High_Level_Requirements_Categories&lt;br /&gt;
| links_name1 = High Level Requirements Categories&lt;br /&gt;
&lt;br /&gt;
| links_url2 = https://www.owasp.org/index.php/Tips_for_using_the_project%27s_requirements,_use-cases,_and_user_stories&lt;br /&gt;
| links_name2 = Tips for using the project's requirements, use-cases, and user stories&lt;br /&gt;
&lt;br /&gt;
| links_url3 = https://www.owasp.org/index.php/Other_really_good_requirements_that_aren%27t_generic_enough_to_be_part_of_the_project_but_that_might_be_what_you%27re_looking_for_in_YOUR_environment&lt;br /&gt;
| links_name3 = Other really good requirements that aren't generic enough to be part of the project but that might be what you're looking for in YOUR environment&lt;br /&gt;
&lt;br /&gt;
| links_url4 = &lt;br /&gt;
| links_name4 = &lt;br /&gt;
&lt;br /&gt;
| links_url[5-10] = &lt;br /&gt;
| links_name[5-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = &lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP Application Security Requirements Project&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Application_Security_Requirements_Project&amp;diff=128116</id>
		<title>Projects/OWASP Application Security Requirements Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Application_Security_Requirements_Project&amp;diff=128116"/>
				<updated>2012-04-19T03:05:51Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Application Security Requirements Project&lt;br /&gt;
| project_home_page = :Category:OWASP Application Security Requirements Project&lt;br /&gt;
| project_description = &lt;br /&gt;
*The intent of this project is to assemble a useful base of generic/common web application security requirements that could be used in most projects.&lt;br /&gt;
*The product of this project is intended to help all involved in web application security, whether it is project management, risk assessment, software development, testing, etc.&lt;br /&gt;
*The reason d'etre of this project is that, whilst security requirements are sometimes well captured and clearly defined, there are other times when they are not, for any number of reasons.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution ShareAlike 3.0 license]&lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Luis Martinez Bacha&lt;br /&gt;
| leader_email1 = luismartinezbacha@owasp.org&lt;br /&gt;
| leader_username1 = Luis_Armando_Martinez_Bacha&lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Zaki Akhmad&lt;br /&gt;
| contributor_email1 = za@owasp.org&lt;br /&gt;
| contributor_username1 = Zakiakhmad&lt;br /&gt;
&lt;br /&gt;
| contributor_name[1-10] = Zaki Akhmad&lt;br /&gt;
| contributor_email[1-10] = za@owasp.org&lt;br /&gt;
| contributor_username[1-10] = Zakiakhmad&lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
&lt;br /&gt;
| presentation_link =&lt;br /&gt;
&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-appsec-requirements &lt;br /&gt;
&lt;br /&gt;
| project_road_map = &lt;br /&gt;
&lt;br /&gt;
# Identify taxonomy/categorization and prioritize&lt;br /&gt;
# Identify industry standards for requirements definition&lt;br /&gt;
# Define detailed work plan&lt;br /&gt;
# Define requirements according to plan&lt;br /&gt;
# Publish first draft&lt;br /&gt;
# Get feedback and adjust plan &lt;br /&gt;
&lt;br /&gt;
| links_url1 = https://www.owasp.org/index.php/High_Level_Requirements_Categories&lt;br /&gt;
| links_name1 = High Level Requirements Categories&lt;br /&gt;
&lt;br /&gt;
| links_url2 = https://www.owasp.org/index.php/Tips_for_using_the_project%27s_requirements,_use-cases,_and_user_stories&lt;br /&gt;
| links_name2 = Tips for using the project's requirements, use-cases, and user stories&lt;br /&gt;
&lt;br /&gt;
| links_url3 = https://www.owasp.org/index.php/Other_really_good_requirements_that_aren%27t_generic_enough_to_be_part_of_the_project_but_that_might_be_what_you%27re_looking_for_in_YOUR_environment&lt;br /&gt;
| links_name3 = Other really good requirements that aren't generic enough to be part of the project but that might be what you're looking for in YOUR environment&lt;br /&gt;
&lt;br /&gt;
| links_url4 = &lt;br /&gt;
| links_name4 = &lt;br /&gt;
&lt;br /&gt;
| links_url[5-10] = &lt;br /&gt;
| links_name[5-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = &lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP Application Security Requirements Project&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Application_Security_Requirements_Project&amp;diff=128115</id>
		<title>Projects/OWASP Application Security Requirements Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Application_Security_Requirements_Project&amp;diff=128115"/>
				<updated>2012-04-19T02:59:26Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Application Security Requirements Project&lt;br /&gt;
| project_home_page = :Category:OWASP Application Security Requirements Project&lt;br /&gt;
| project_description = &lt;br /&gt;
*The intent of this project is to assemble a useful base of generic/common web application security requirements that could be used in most projects.&lt;br /&gt;
*The product of this project is intended to help all involved in web application security, whether it is project management, risk assessment, software development, testing, etc.&lt;br /&gt;
*The reason d'etre of this project is that, whilst security requirements are sometimes well captured and clearly defined, there are other times when they are not, for any number of reasons.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution ShareAlike 3.0 license]&lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Luis Martinez Bacha&lt;br /&gt;
| leader_email1 = luismartinezbacha@owasp.org&lt;br /&gt;
| leader_username1 = Luis_Armando_Martinez_Bacha&lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Zaki Akhmad&lt;br /&gt;
| contributor_email1 = za@owasp.org&lt;br /&gt;
| contributor_username1 = Zakiakhmad&lt;br /&gt;
&lt;br /&gt;
| contributor_name[1-10] = Zaki Akhmad&lt;br /&gt;
| contributor_email[1-10] = za@owasp.org&lt;br /&gt;
| contributor_username[1-10] = Zakiakhmad&lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
&lt;br /&gt;
| presentation_link =&lt;br /&gt;
&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-appsec-requirements &lt;br /&gt;
&lt;br /&gt;
| project_road_map = &lt;br /&gt;
&lt;br /&gt;
| links_url1 = https://www.owasp.org/index.php/High_Level_Requirements_Categories&lt;br /&gt;
| links_name1 = High Level Requirements Categories&lt;br /&gt;
&lt;br /&gt;
| links_url2 = https://www.owasp.org/index.php/Tips_for_using_the_project%27s_requirements,_use-cases,_and_user_stories&lt;br /&gt;
| links_name2 = Tips for using the project's requirements, use-cases, and user stories&lt;br /&gt;
&lt;br /&gt;
| links_url3 = https://www.owasp.org/index.php/Other_really_good_requirements_that_aren%27t_generic_enough_to_be_part_of_the_project_but_that_might_be_what_you%27re_looking_for_in_YOUR_environment&lt;br /&gt;
| links_name3 = Other really good requirements that aren't generic enough to be part of the project but that might be what you're looking for in YOUR environment&lt;br /&gt;
&lt;br /&gt;
| links_url4 = &lt;br /&gt;
| links_name4 = &lt;br /&gt;
&lt;br /&gt;
| links_url[5-10] = &lt;br /&gt;
| links_name[5-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = &lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP Application Security Requirements Project&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012&amp;diff=127810</id>
		<title>AppSecAsiaPac2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012&amp;diff=127810"/>
				<updated>2012-04-13T08:30:50Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[File:Twitter_followus.jpg]]'''[https://twitter.com/#!/AppSecAsia Follow us] or tweet about us using the hashtag #appsecasia'''&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 75%; background: none repeat scroll 0% 0% rgb(255, 255, 255);&amp;quot; | &lt;br /&gt;
[[File:Owasp appsecAsia2012ConfBanner.jpg]]&lt;br /&gt;
| style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(255, 255, 255);&amp;quot; | &lt;br /&gt;
[[File:RegisterForAppsec.png|link=http://www.regonline.com/appsecapac2012]]&lt;br /&gt;
|}&lt;br /&gt;
=Welcome=&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
'''@appsecasia Twitter Feed ([http://twitter.com/appsecasia follow us on Twitter!])''' &amp;lt;twitter&amp;gt;228540661&amp;lt;/twitter&amp;gt; --&amp;gt;&lt;br /&gt;
          &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 35%; background: none repeat scroll 0% 0% rgb(255, 255, 255); color: black;&amp;quot; | &lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Owaspconf2012_small320w.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Welcome to the OWASP 2012 Appsec Asia Pacific Conference.'''&lt;br /&gt;
&lt;br /&gt;
The event is being held in Sydney, Australia from the 11th to the 14th of April 2012 at the Four Points Sheraton Darling Harbour.&lt;br /&gt;
&lt;br /&gt;
The conference consists of 2 days of world class training by OWASP instructor's followed by 2 days of quality presentations and keynotes from industry leaders, OWASP projects and industry consultants. In previous years the OWASP Asia Pacific conference has been rated as one of the &amp;quot;must attend&amp;quot; events of the year, with the conference always filling up quickly.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who should attend this conference:'''&lt;br /&gt;
&lt;br /&gt;
* Application Developers, Testers, Quality Assurance Team Members&lt;br /&gt;
* Chief Information Officers, Security Officers, Technology Officers&lt;br /&gt;
* Security Managers and Staff&lt;br /&gt;
* Executives, Managers and staff responsible for IT Security Governance&lt;br /&gt;
* IT Professionals interested in Improving Information Security&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Conference Highlights:'''&lt;br /&gt;
&lt;br /&gt;
* Alastair MacGibbon: Keynote Presentation (more information available on &amp;quot;Speakers&amp;quot; Tab)&lt;br /&gt;
* Jacob West (Fortify - HP): Keynote Presentation (more information available on &amp;quot;Speakers&amp;quot; Tab)&lt;br /&gt;
* Industry Leading training - Exploiting Web Applications with Samurai-WTF&lt;br /&gt;
* Industry Panel from Finance and Insurance Sectors&lt;br /&gt;
* Networking Opportunities to meet peers and other developers&lt;br /&gt;
* Gain access to resources within OWASP projects as well as leading vendors&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
[[File:RegisterForAppsec.png|link=http://www.regonline.com/appsecapac2012]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(255, 255, 255);&amp;quot; | &lt;br /&gt;
&amp;lt;center&amp;gt;'''Thank you to all of our supporters!'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;&amp;lt;center&amp;gt;Diamond &amp;amp; Platinum Sponsors&amp;lt;/center&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Fortify HP logo.png|link=http://www.fortify.com]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;&amp;lt;center&amp;gt;Gold &amp;amp; Silver Sponsors&amp;lt;/center&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:AppsecureLogo.jpg|link=http://www.appsecure.com/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:CS-LogoWeb.png|link=http://www.contentsecurity.com.au/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:GASystems-logo.jpg|link=http://www.gasystems.com.au/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Imperva 312x54.jpg|link=http://www.imperva.com/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Ionize75H.jpg‎|link=http://www.ionize.com.au/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:SPL-LOGO-LARGE.png|link=http://www.trustwave.com/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;&amp;lt;center&amp;gt; Associations &amp;amp; Supporters&amp;lt;/center&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
We are proudly supported by the following Industry Associations and Media outlets.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Auscert-Header-logo.gif|link=http://www.auscert.org.au/]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:AisaLogo.png|link=http://www.aisa.org.au/]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Registration Costs=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Register}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Training=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Training}}&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule=&lt;br /&gt;
&lt;br /&gt;
'''[https://www.surveymonkey.com/s/Australia2012_Talk40 Click here to take event survey] or click on the talk titles below to rate that individual talk.'''&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 85%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font size=3pt&amp;gt;'''Conference Day 1 - Friday - April 13th''' &amp;lt;br&amp;gt;  &amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | ''(Time Allocated)'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Track 1 - Detect''' &amp;lt;br&amp;gt; (Grand Ballroom 2)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | '''Track 2 - Protect''' &amp;lt;br&amp;gt; (Grand Ballroom 3)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | '''Track 3 - Leadership &amp;amp; OWASP''' &amp;lt;br&amp;gt; (Grand Ballroom 1)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''7:30 - 8:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Conference Registration Open - Coffee &amp;amp; Tea Available '''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:30-8:40 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Conference Opening - Appsec Asia 2012'''&lt;br /&gt;
Speakers: Conference Committee Chair - Mr. Justin Derry&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:40-9:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''[https://www.surveymonkey.com/s/Australia2012_Talk1 KeyNote: Presentation]'''&lt;br /&gt;
Speaker: Alastair MacGibbon&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:30-9:40 AM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:40-10:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''[https://www.surveymonkey.com/s/Australia2012_Talk2 KeyNote: Software Security Goes Mobile]'''&lt;br /&gt;
Speaker: Jacob West&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''10:30-11:00 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Morning Tea - Provided for attendees in main EXPO &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:00-11:50 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk37 You can't filter the stupid!]'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Charles Henderson &amp;amp; Daniel Crowley&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk8 Advanced Mobile Application Code Review Techniques]'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Prashant Vema &amp;amp; Dinesh Shetty&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk14 Effective Software Development in a PCI-DSS Environment]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Bruce Ashton&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:50-12:00 PM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:00-12:50 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk35 The risks that Pen Tests don't find]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Gary Gaskell&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk28 Rethinking Web Application Architecture for Cloud]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Arshad Noor&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk22 OWASP Project - Secure Coding Practices Quick Reference Guide]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Justin Clarke&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:50-1:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Lunch - Provided for attendees in main Expo &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''1:30-2:20 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk20 Overcoming the Quality vs Quantity Problem in Software Security Testing]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Rafal Los&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk18 Mobile Security on iOS and Andriod]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Mike Park&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk34 Effective Education Programs using OWASP]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Sandeep Nain&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:20-2:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:30-3:20 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk25 Pen Testing Mobile Applications]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Tony Liu &amp;amp; Rainman Wu&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk10 Application Security Logging &amp;amp; Monitoring, The Next Frontier]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Peter Freiberg&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk19 Modern Software Security Assurance with OpenSAMM]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Pravir Chandra&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''3:30-4:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Afternoon Tea - Provided for attendees in EXPO &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:00-4:50 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk15 Harder, Better, Faster, Stronger (SQLi)]'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Luke Jahnke &amp;amp; Louis Nyffenegger&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk30 Securing the SSL Channel against Man-in-the-middle Attacks]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Tobias Gondrom&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk23 OWASP Project - ZED Attack Proxy]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Simon Bennetts&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:50-5:00 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''5:00-5:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''[https://www.surveymonkey.com/s/Australia2012_Talk7 Panel Discussion - Application Security Trends in 2012]'''&lt;br /&gt;
Moderator: Christian Frichot, Panelists: Rafal Los, Charles Henderson, Pravir Chandra &amp;amp; Jeremiah Grossman&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''5:30-6:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''OWASP - Afternoon Networking Event - Ground Floor - Four Points Sheraton'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''6:30 - 10:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''OWASP - Gala Dinner - Grand Ballroom. (Inclusive in Conference Fee)&amp;lt;br&amp;gt; [https://www.surveymonkey.com/s/Australia2012_Talk3 Speaker: Tammy Wolffs - Director, Cyber Security at &amp;lt;br&amp;gt; Department of Broadband, Communications and the Digital Economy]'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[https://www.surveymonkey.com/s/Australia2012_Talk40 Click here to take event survey] or click on the talk titles below to rate that individual talk.'''&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 85%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font size=3pt&amp;gt;'''Conference Day 2 - Saturday- April 14th''' &amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | ''(Time Allocated)'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Track 1 - Detect''' &amp;lt;br&amp;gt; (Grand Ballroom 2)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | '''Track 2 - Protect''' &amp;lt;br&amp;gt; (Grand Ballroom 3)&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | '''Track 3 - Leadership &amp;amp; OWASP''' &amp;lt;br&amp;gt; (Grand Ballroom 1)&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''7:30 - 8:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Conference Registration Open - Coffee &amp;amp; Tea Available '''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:30-8:40 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Conference Day 2 Update- Appsec Asia 2012'''&lt;br /&gt;
Speakers: Conference Committee Chair - Mr Justin Derry&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:40-9:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''[https://www.surveymonkey.com/s/Australia2012_Talk6 KeyNote: Presentation]'''&lt;br /&gt;
Speaker: Jeremiah Grossman&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:30-9:40 AM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:40-10:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''[https://www.surveymonkey.com/s/Australia2012_Talk4 KeyNote: OWASP Foundation Update]'''&lt;br /&gt;
Speakers: Justin Searle and Justin Clarke&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''10:30-11:00 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Morning Tea - Provided for attendees in main EXPO &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:00-11:50 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk26 Pentesting iOS Applications]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Jason Haddix&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk24 Password Less Authentication &amp;amp; Authorization &amp;amp; Payments]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Srikar Sagi&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk13 De-Anonymizing Anonymous]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Wayne O'Young&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:50-12:00 PM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement  &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:00-12:50 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk17 HTTP Fingerprinting - Next Generation]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Eldar Marcussen&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk36 Web Crypto for the Developer who has better things to do]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Adrian Hayes&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk33 Static Code Analysis &amp;amp; Governance]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Jonathan Carter&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:50-1:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Lunch - Provided for attendees in main Expo &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''1:30-2:20 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk31 Shake Hooves with BeEF]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Christian Frichot&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk12 Data Breaches - When Application Security Goes Wrong]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Mark Goudie&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt; SPONSOR PRESENTATION&amp;lt;/span&amp;gt; &amp;lt;br&amp;gt;&amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk38 Next Generation WAF]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: GA Systems&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:20-2:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:30-3:20 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk27 Pentesting Smart Grid Web Apps]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Justin Searle&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; |  &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk16 How MITM Proxy has been slaying SSL Dragons]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Jim Cheetham&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; |&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt; SPONSOR PRESENTATION&amp;lt;/span&amp;gt; &amp;lt;br&amp;gt; &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk39 Click here to give feedback]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Trustwave Spiderlabs&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''3:20-3:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''3:30-4:20 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk29 Rise of the Planet of the Anonymous]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Errazudin Ishak&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk9 Anatomy of a Logic Flaw]'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Charles Henderson &amp;amp; Daniel Crowley&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; |&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt; SPONSOR PRESENTATION&amp;lt;/span&amp;gt; &amp;lt;br&amp;gt; &amp;amp;nbsp;'''[https://www.surveymonkey.com/s/Australia2012_Talk5 Websense]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Content Security&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:20-4:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:30-5:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''[https://www.surveymonkey.com/s/Australia2012_Talk40 OWASP Appsec Asia 2012 - Conference Wrap Up]'''&lt;br /&gt;
Speakers: OWASP Appsec Asia Conference Committee&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''5:00-6:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''OWASP Sponsor - Afternoon Networking Event - TBA'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Keynote Speakers=&lt;br /&gt;
&lt;br /&gt;
'''In alphabetical order:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Alastair MacGibbon== &lt;br /&gt;
Alastair MacGibbon is an internationally-respected authority on cybercrime, including Internet fraud, consumer victimisation and a range of Internet security and safety issues.  He is the managing partner of Surete Group, a consultancy dealing with improved customer retention for Internet companies by increasing trust and reducing negative user experiences.  Prior to this for almost 5 years Alastair headed Trust &amp;amp; Safety at eBay Australia and later eBay Asia Pacific.  He was a Federal Agent with the Australian Federal Police for 15 years, his final assignment as the founding Director of the Australian High Tech Crime Centre.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Jacob West== &lt;br /&gt;
Jacob West is Director, Software Security Research for the Enterprise Security Products division of Hewlett-Packard. West is a world-recognized expert on software security and brings a technical understanding of the languages and frameworks used to build software together with extensive knowledge about how real-world systems fail. In 2007, he co-authored the book &amp;quot;Secure Programming with Static Analysis&amp;quot; with colleague and Fortify founder Brian Chess. Today, the book remains the only comprehensive guide to static analysis and how developers can use it to avoid the most prevalent and dangerous vulnerabilities in code. West is a frequent speaker at industry events, including RSA Conference, Black Hat, Defcon, OWASP, and many others. A graduate of the University of California, Berkeley, West holds dual-degrees in Computer Science and French and resides in San Francisco, California. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dr. Jason Smith from CERT Australia==&lt;br /&gt;
Dr Jason Smith  is an assistant director at the national CERT, CERT Australia, which is part of the Attorney-General's Department. He is an experienced cyber security researcher and consultant, having provided consultancy services over the last decade on information infrastructure protection to government and critical infrastructure utilities.&lt;br /&gt;
&lt;br /&gt;
Since joining government Jason has been involved in the development and execution national scale cyber exercises and the advanced cyber security training for control systems conducted by the US Department of Homeland Security.&lt;br /&gt;
&lt;br /&gt;
Jason holds a degree in software engineering and data communications, a PhD in information security and is an Adjunct Associate Professor at the Queensland University of Technology.&lt;br /&gt;
&lt;br /&gt;
[http://www.cert.gov.au/ About CERT Australia] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Jeremiah Grossman==&lt;br /&gt;
Jeremiah Grossman is the Founder and CTO of WhiteHat Security, where he is responsible for Web security R&amp;amp;D and industry outreach. Mr. Grossman has written dozens of articles, white papers, and is a published author. His work has been featured in the Wall Street Journal, NY Times and many other mainstream media outlets. As a well-known security expert and industry veteran, Mr. Grossman has been a guest speaker on five continents at hundreds of events including BlackHat, RSA, ISSA, and others. He has been invited to guest lecture at top universities such as UC Berkeley, Stanford, Harvard, UoW Madison, UCLA, and Carnegie Mellon. Mr. Grossman is also a co-founder of the Web Application Security Consortium (WASC) and previously named one of InfoWorld's Top 25 CTOs. Before founding WhiteHat, Mr. Grossman was an information security officer at Yahoo!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mr. Grossman was recently a speaker at TEDxMaui. [http://tedxmaui.com/2011/12/30/speaker-spotlight-jeremiah-grossman/ Learn more here.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Track Session Speakers=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Talks}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
The Conference Committee is excited to announce that the conference has been openly supported by the following vendors and associations. Without the great support of these companies and organisations the 2012 event would not be what it is today.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Diamond &amp;amp; Platinum Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
The OWASP Conference 2012, welcomes our sponsors for Diamond and Platinum. There are still spaces available for sponsorship, but it's closing fast.&lt;br /&gt;
&lt;br /&gt;
More information is available on our sponsorship packages by viewing the sponsor pack [[File:AppSec AsiaPac 2012 Sponsorship.pdf]]. Contact our Committee for more information.&lt;br /&gt;
&lt;br /&gt;
[[File:Fortify HP logo.png|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Gold &amp;amp; Silver Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
The OWASP Conference 2012, welcomes our sponsors for Gold and Silver. The conference still has availability for other Gold and Silver sponsors.&lt;br /&gt;
&lt;br /&gt;
[[File:AppsecureTransLogo.png|link=http://www.appsecure.com/]]&lt;br /&gt;
[[File:Imperva 312x54.jpg|link=http://www.imperva.com/]]&lt;br /&gt;
[[File:Ionize75H.jpg‎|link=http://www.ionize.com.au/]]&lt;br /&gt;
[[File:CS-LogoWeb.png|link=http://www.contentsecurity.com.au/]]&lt;br /&gt;
[[File:Trustwave small.png|link=http://www.trustwave.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; Associations &amp;amp; Supporters&amp;lt;/h2&amp;gt; &lt;br /&gt;
We are proudly supported by the following Industry Associations and Media outlets.&lt;br /&gt;
&lt;br /&gt;
[[File:Auscert-Header-logo.gif|link=http://www.auscert.org.au/]]&lt;br /&gt;
[[File:AisaLogo.png|link=http://www.aisa.org.au/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapters Workshop=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Chapters_Workshop}}&lt;br /&gt;
&lt;br /&gt;
=Venue=&lt;br /&gt;
&lt;br /&gt;
We're excited to announce that the location of the OWASP Conference for Appsec Asia 2012 will be held at:&lt;br /&gt;
&lt;br /&gt;
'''Four Points Sheraton, Darling Harbour'''&amp;lt;br&amp;gt;&lt;br /&gt;
161 Sussex Street&amp;lt;br&amp;gt;&lt;br /&gt;
Sydney, New South Wales 2000&amp;lt;br&amp;gt;&lt;br /&gt;
Australia &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The facility provides hotel rooms and conference facilities, OWASP has secured cheap room rates directly in the hotel for the duration of the event.&lt;br /&gt;
&lt;br /&gt;
If you don't know your way around Sydney, here's the Google Maps link to the Hotel.&lt;br /&gt;
&lt;br /&gt;
http://maps.google.com.au/maps/place?q=Four+Points+by+Sheraton+Sydney,+Sussex+Street,+Sydney,+New+South+Wales&amp;amp;hl=en&amp;amp;cid=7369128618339939693&lt;br /&gt;
&lt;br /&gt;
[[File:FourPointsSheratonDarlingHarbour.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We are using both the Ground and upper levels. The majority of the event will be held on the ground level, including all breaks etc. Attendees will find the registration and conference desk located at the Ground level near Hotel Reception. (You're not going to get lost, as we take up most of the ground level for this event.)&lt;br /&gt;
&lt;br /&gt;
Further details about venue locations will be posted when they become available.&lt;br /&gt;
&lt;br /&gt;
=Travel and Accommodations=&lt;br /&gt;
For assistance with any of the items below, feel free to utilize OWASP's preferred travel agency:&amp;lt;br&amp;gt;&lt;br /&gt;
Segale Travel Service contact information is:  +1-800-841-2276 &amp;lt;br&amp;gt;&lt;br /&gt;
Sr. Travel Consultants:  &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:mariam@segaletravel.com Maria Martinez]...ext 524 &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:linnv@segaletravel.com Linn Vander Molen]...ext 520&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Additionally, the [mailto:appsecasia2012@owasp.org Conference Planning Team] is available to answer any questions!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
We've been able to arrange for accommodation within the Four Points Sheraton Hotel(where the training and conference will be held) for attendees. These rooms have been allocated at a special rate, and available strictly for a limited time. To book these rooms at the special rate, you need to use the booking link shown below. These rooms are available one night either side of the event ensuring that if you are travelling interstate or international it's easy to find a room at a good rate. The room rate allocated for the event is $200 AUD Inclusive per night.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Four Points Sheraton, Darling Harbour'''&amp;lt;br&amp;gt;&lt;br /&gt;
161 Sussex Street&amp;lt;br&amp;gt;&lt;br /&gt;
Sydney, New South Wales 2000&amp;lt;br&amp;gt;&lt;br /&gt;
Australia &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.starwoodmeeting.com/Book/OWASP http://www.starwoodmeeting.com/Book/OWASP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Travel Domestic==&lt;br /&gt;
&lt;br /&gt;
The OWASP Conference is to be held in Sydney at the Darling Harbour precinct. Hotel Location, http://maps.google.com.au/maps/place?q=Four+Points+by+Sheraton+Sydney,+Sussex+Street,+Sydney,+New+South+Wales&amp;amp;hl=en&amp;amp;cid=7369128618339939693&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==International Travel==&lt;br /&gt;
&lt;br /&gt;
The Sydney International Airport is located adjacent to the Domestic terminal. Similar taxi fares to the city and hotel venue apply.&lt;br /&gt;
If you are travelling by train, you can ride the train from the International terminal all the way to the Town Hall station as above.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Airport Transportation==&lt;br /&gt;
&lt;br /&gt;
*Any major Airline carrier will fly you into Sydney Airport, from here, you can take a Taxi (Approx $35-40 AUD).&lt;br /&gt;
*[http://www.kst.com.au KST Sydney Airport Shuttle] -- $18AUD oneway/ $32AUD roundtrip&lt;br /&gt;
* Another option is the train from the Airport, which you can ride all the way into the closest station which is Town Hall. From this stop the hotel is a small downhill walk (no more then 5-10mins) from the station.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Driving Instructions==&lt;br /&gt;
&lt;br /&gt;
''From Sydney Airport (South)'' &lt;br /&gt;
&lt;br /&gt;
Travel along Southern Cross Drive and take the South Dowling Street exit.&lt;br /&gt;
&lt;br /&gt;
Turn right onto Dacey Avenue.&lt;br /&gt;
&lt;br /&gt;
At the second set of traffic lights turn left onto Anzac Parade.&lt;br /&gt;
&lt;br /&gt;
Follow Anzac Parade past Moore Park on your right; Anzac Parade will become Flinders Street.&lt;br /&gt;
&lt;br /&gt;
Turn left onto Oxford Street and follow to Liverpool Street; Hyde Park will be on your right.&lt;br /&gt;
&lt;br /&gt;
Continue along Liverpool Street and turn right onto Kent Street.&lt;br /&gt;
&lt;br /&gt;
Travel five blocks and turn left onto Erskine Street.&lt;br /&gt;
&lt;br /&gt;
Immediately turn left again onto Sussex Street. The hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''From East'' &lt;br /&gt;
&lt;br /&gt;
Proceed along New South Head Road. Continue onto William Street and then onto Park Street; Hyde Park will be on your right.&lt;br /&gt;
&lt;br /&gt;
Proceed along Park Street as it becomes Druitt Street and turn right onto Kent Street.&lt;br /&gt;
&lt;br /&gt;
Travel approximately three blocks and turn left onto Erskine Street.&lt;br /&gt;
&lt;br /&gt;
Immediately turn left again onto Sussex Street. The hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''From West'' &lt;br /&gt;
&lt;br /&gt;
Proceed along the Western Distributor towards the city taking the City North exit followed by the Sussex Street South Exit.&lt;br /&gt;
&lt;br /&gt;
Turn right onto Sussex Street, the hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''From North'' &lt;br /&gt;
&lt;br /&gt;
Take the Pacific Highway/Warringah Highway and proceed over the Sydney Harbour Bridge.&lt;br /&gt;
&lt;br /&gt;
Take the York street exit off the bridge and continue along before turning right into Erskine Street .&lt;br /&gt;
&lt;br /&gt;
Proceed approximately three blocks before turning left into Sussex Street. The hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Contact Us=&lt;br /&gt;
&lt;br /&gt;
Justin Derry - Planning Committee Co-Chair&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew van der Stock - Planning Committee Co-Chair&amp;lt;br&amp;gt;&lt;br /&gt;
Christian Frichot - Planning Committee Member&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Mueller - Planning Committee Member&amp;lt;br&amp;gt;&lt;br /&gt;
Mohd Fazli Azran - Global Conference Committee Liaison&amp;lt;br&amp;gt;&lt;br /&gt;
Sarah Baso - OWASP Operational Support&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping out with this conference or have any questions, please contact us at: appsecasia2012@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Archives=&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/AppSecAsiaPac2012/CFP Call for Papers]&lt;br /&gt;
*[[Speaker Agreement]]&lt;br /&gt;
*[https://www.owasp.org/index.php/AppSecAsiaPac2012/CFT Call for Trainers]&lt;br /&gt;
*[https://www.owasp.org/images/8/80/APAC2012_Training_Instructor_Agreement.pdf Training Instructor Agreement]&lt;br /&gt;
*Information about the [https://www.owasp.org/index.php/AppSecAsiaPac2012/OWASP_Track OWASP Track]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Security_Testing&amp;diff=127574</id>
		<title>Projects/OWASP Mobile Security Project - Security Testing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Security_Testing&amp;diff=127574"/>
				<updated>2012-04-09T07:49:42Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Network Traffic Analysis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mobile Security Testing  ==&lt;br /&gt;
&lt;br /&gt;
A major priority of the OWASP Mobile Security Project is to help standardize and disseminate mobile application testing methodologies. While specific techniques exist for individual platforms, the general &amp;quot;mobile&amp;quot; threat model can be used to create a generic testing methodology. &lt;br /&gt;
&lt;br /&gt;
The below outline describes a general mobile application assessment methodology. &lt;br /&gt;
&lt;br /&gt;
# Dynamic Analysis &lt;br /&gt;
## Debug the running app (on device or in emulator) &lt;br /&gt;
## Analyze network traffic &lt;br /&gt;
## Analyze remote services (HTTP/SOAP/etc) &lt;br /&gt;
# Static Analysis &lt;br /&gt;
## Get Application&lt;br /&gt;
### Extract application from device &lt;br /&gt;
### Receive application package from developers &lt;br /&gt;
## Source Code Review &lt;br /&gt;
## Reverse Engineering &lt;br /&gt;
## Disassembly &lt;br /&gt;
## Patching&lt;br /&gt;
&lt;br /&gt;
== Testing Tools ==&lt;br /&gt;
&lt;br /&gt;
=== Network Traffic Analysis ===&lt;br /&gt;
&lt;br /&gt;
* [http://intrepidusgroup.com/insight/mallory/ Mallory]&amp;amp;nbsp;- Mallory is an open source transparent tcp/udp proxy that allows a tester to step through network traffic bytes at a time. Mallory is designed to function as a network gateway, thus facillitating the testing of embedded devices and applications that cannot easily be proxified.&lt;br /&gt;
* [http://mitmproxy.org/index.html mitmproxy]&lt;br /&gt;
&lt;br /&gt;
=== Disassembly Tools &amp;amp; Resources ===&lt;br /&gt;
&lt;br /&gt;
Disassembling applications provides a wealth of information for a security researcher.  Platform differences lead to different toolsets for investigation of application internals.&lt;br /&gt;
&lt;br /&gt;
==== Android ====&lt;br /&gt;
&lt;br /&gt;
[http://code.google.com/p/smali/ smali/basksmali]&amp;amp;nbsp;- smali and baksmali are an assembler/disassembler pair that can be used to analyze the Dalvik byte code of an Android application.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
[http://jack-mannino.blogspot.com/2010/09/reversing-android-apps-101.html Reversing Android Apps 101] - Blog post describing the process of disassembling / reversing Android applications&lt;br /&gt;
&lt;br /&gt;
==== RIM ====&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==== iOS ====&lt;br /&gt;
&lt;br /&gt;
''(This page is a work in progress so check back regularly...)''&lt;br /&gt;
&lt;br /&gt;
The approach is somewhat different (in comparison to others platforms) when carrying out dynamic and static analysis on iOS applications.  One approach is to become a registered Apple Developer to gain access to the goodness that is Xcode, Simulator, etc. and the other is jail breaking your phone.  We will look at this from the perspective of being a registered Apple Developer for and using Apple's Simulator for now.  You will need to be running a recent version of Snow Leopard to carry out testing using this route.&lt;br /&gt;
&lt;br /&gt;
'''Methodology'''&lt;br /&gt;
&lt;br /&gt;
First download the iOS Software Development Kit - inside this contains Xcode, the iPhone and iPad simulators and some other goodies.&lt;br /&gt;
&lt;br /&gt;
Using Mallory with airbase-ng.&lt;br /&gt;
&lt;br /&gt;
... TO DO.&lt;br /&gt;
&lt;br /&gt;
'''Tool dump''':&lt;br /&gt;
&lt;br /&gt;
* Charles Proxy - transparent proxy tool even with cert support.&lt;br /&gt;
* otool - Mach-O Object file reader.  Use to disassemble and inspect iOS applications&lt;br /&gt;
* class-dump-x - read class declarations and structs&lt;br /&gt;
* clang analyzer - static analysis for C, C++, and Objective-C source code&lt;br /&gt;
* Instruments - the sysinternals for Mac OS X&lt;br /&gt;
* Shark - analyze assembly level operations&lt;br /&gt;
* Mallory - to perform MiTM on iOS applications&lt;br /&gt;
* IDA Pro - Commercial disassembler and debugger.&lt;br /&gt;
* Hex Rays Decompiler - IDA Pro plug-in for decompilation of ARM assembly&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Security_Testing&amp;diff=127573</id>
		<title>Projects/OWASP Mobile Security Project - Security Testing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Security_Testing&amp;diff=127573"/>
				<updated>2012-04-09T07:48:55Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Network Traffic Analysis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mobile Security Testing  ==&lt;br /&gt;
&lt;br /&gt;
A major priority of the OWASP Mobile Security Project is to help standardize and disseminate mobile application testing methodologies. While specific techniques exist for individual platforms, the general &amp;quot;mobile&amp;quot; threat model can be used to create a generic testing methodology. &lt;br /&gt;
&lt;br /&gt;
The below outline describes a general mobile application assessment methodology. &lt;br /&gt;
&lt;br /&gt;
# Dynamic Analysis &lt;br /&gt;
## Debug the running app (on device or in emulator) &lt;br /&gt;
## Analyze network traffic &lt;br /&gt;
## Analyze remote services (HTTP/SOAP/etc) &lt;br /&gt;
# Static Analysis &lt;br /&gt;
## Get Application&lt;br /&gt;
### Extract application from device &lt;br /&gt;
### Receive application package from developers &lt;br /&gt;
## Source Code Review &lt;br /&gt;
## Reverse Engineering &lt;br /&gt;
## Disassembly &lt;br /&gt;
## Patching&lt;br /&gt;
&lt;br /&gt;
== Testing Tools ==&lt;br /&gt;
&lt;br /&gt;
=== Network Traffic Analysis ===&lt;br /&gt;
&lt;br /&gt;
* [http://intrepidusgroup.com/insight/mallory/ Mallory]&amp;amp;nbsp;- Mallory is an open source transparent tcp/udp proxy that allows a tester to step through network traffic bytes at a time. Mallory is designed to function as a network gateway, thus facillitating the testing of embedded devices and applications that cannot easily be proxified.&lt;br /&gt;
 * [http://mitmproxy.org/index.html mitmproxy]&lt;br /&gt;
&lt;br /&gt;
=== Disassembly Tools &amp;amp; Resources ===&lt;br /&gt;
&lt;br /&gt;
Disassembling applications provides a wealth of information for a security researcher.  Platform differences lead to different toolsets for investigation of application internals.&lt;br /&gt;
&lt;br /&gt;
==== Android ====&lt;br /&gt;
&lt;br /&gt;
[http://code.google.com/p/smali/ smali/basksmali]&amp;amp;nbsp;- smali and baksmali are an assembler/disassembler pair that can be used to analyze the Dalvik byte code of an Android application.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
[http://jack-mannino.blogspot.com/2010/09/reversing-android-apps-101.html Reversing Android Apps 101] - Blog post describing the process of disassembling / reversing Android applications&lt;br /&gt;
&lt;br /&gt;
==== RIM ====&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==== iOS ====&lt;br /&gt;
&lt;br /&gt;
''(This page is a work in progress so check back regularly...)''&lt;br /&gt;
&lt;br /&gt;
The approach is somewhat different (in comparison to others platforms) when carrying out dynamic and static analysis on iOS applications.  One approach is to become a registered Apple Developer to gain access to the goodness that is Xcode, Simulator, etc. and the other is jail breaking your phone.  We will look at this from the perspective of being a registered Apple Developer for and using Apple's Simulator for now.  You will need to be running a recent version of Snow Leopard to carry out testing using this route.&lt;br /&gt;
&lt;br /&gt;
'''Methodology'''&lt;br /&gt;
&lt;br /&gt;
First download the iOS Software Development Kit - inside this contains Xcode, the iPhone and iPad simulators and some other goodies.&lt;br /&gt;
&lt;br /&gt;
Using Mallory with airbase-ng.&lt;br /&gt;
&lt;br /&gt;
... TO DO.&lt;br /&gt;
&lt;br /&gt;
'''Tool dump''':&lt;br /&gt;
&lt;br /&gt;
* Charles Proxy - transparent proxy tool even with cert support.&lt;br /&gt;
* otool - Mach-O Object file reader.  Use to disassemble and inspect iOS applications&lt;br /&gt;
* class-dump-x - read class declarations and structs&lt;br /&gt;
* clang analyzer - static analysis for C, C++, and Objective-C source code&lt;br /&gt;
* Instruments - the sysinternals for Mac OS X&lt;br /&gt;
* Shark - analyze assembly level operations&lt;br /&gt;
* Mallory - to perform MiTM on iOS applications&lt;br /&gt;
* IDA Pro - Commercial disassembler and debugger.&lt;br /&gt;
* Hex Rays Decompiler - IDA Pro plug-in for decompilation of ARM assembly&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Security_Testing&amp;diff=127572</id>
		<title>Projects/OWASP Mobile Security Project - Security Testing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Security_Testing&amp;diff=127572"/>
				<updated>2012-04-09T06:12:18Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Mobile Security Testing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mobile Security Testing  ==&lt;br /&gt;
&lt;br /&gt;
A major priority of the OWASP Mobile Security Project is to help standardize and disseminate mobile application testing methodologies. While specific techniques exist for individual platforms, the general &amp;quot;mobile&amp;quot; threat model can be used to create a generic testing methodology. &lt;br /&gt;
&lt;br /&gt;
The below outline describes a general mobile application assessment methodology. &lt;br /&gt;
&lt;br /&gt;
# Dynamic Analysis &lt;br /&gt;
## Debug the running app (on device or in emulator) &lt;br /&gt;
## Analyze network traffic &lt;br /&gt;
## Analyze remote services (HTTP/SOAP/etc) &lt;br /&gt;
# Static Analysis &lt;br /&gt;
## Get Application&lt;br /&gt;
### Extract application from device &lt;br /&gt;
### Receive application package from developers &lt;br /&gt;
## Source Code Review &lt;br /&gt;
## Reverse Engineering &lt;br /&gt;
## Disassembly &lt;br /&gt;
## Patching&lt;br /&gt;
&lt;br /&gt;
== Testing Tools ==&lt;br /&gt;
&lt;br /&gt;
=== Network Traffic Analysis ===&lt;br /&gt;
&lt;br /&gt;
[http://intrepidusgroup.com/insight/mallory/ Mallory]&amp;amp;nbsp;- Mallory is an open source transparent tcp/udp proxy that allows a tester to step through network traffic bytes at a time. Mallory is designed to function as a network gateway, thus facillitating the testing of embedded devices and applications that cannot easily be proxified.&lt;br /&gt;
&lt;br /&gt;
=== Disassembly Tools &amp;amp; Resources ===&lt;br /&gt;
&lt;br /&gt;
Disassembling applications provides a wealth of information for a security researcher.  Platform differences lead to different toolsets for investigation of application internals.&lt;br /&gt;
&lt;br /&gt;
==== Android ====&lt;br /&gt;
&lt;br /&gt;
[http://code.google.com/p/smali/ smali/basksmali]&amp;amp;nbsp;- smali and baksmali are an assembler/disassembler pair that can be used to analyze the Dalvik byte code of an Android application.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
[http://jack-mannino.blogspot.com/2010/09/reversing-android-apps-101.html Reversing Android Apps 101] - Blog post describing the process of disassembling / reversing Android applications&lt;br /&gt;
&lt;br /&gt;
==== RIM ====&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==== iOS ====&lt;br /&gt;
&lt;br /&gt;
''(This page is a work in progress so check back regularly...)''&lt;br /&gt;
&lt;br /&gt;
The approach is somewhat different (in comparison to others platforms) when carrying out dynamic and static analysis on iOS applications.  One approach is to become a registered Apple Developer to gain access to the goodness that is Xcode, Simulator, etc. and the other is jail breaking your phone.  We will look at this from the perspective of being a registered Apple Developer for and using Apple's Simulator for now.  You will need to be running a recent version of Snow Leopard to carry out testing using this route.&lt;br /&gt;
&lt;br /&gt;
'''Methodology'''&lt;br /&gt;
&lt;br /&gt;
First download the iOS Software Development Kit - inside this contains Xcode, the iPhone and iPad simulators and some other goodies.&lt;br /&gt;
&lt;br /&gt;
Using Mallory with airbase-ng.&lt;br /&gt;
&lt;br /&gt;
... TO DO.&lt;br /&gt;
&lt;br /&gt;
'''Tool dump''':&lt;br /&gt;
&lt;br /&gt;
* Charles Proxy - transparent proxy tool even with cert support.&lt;br /&gt;
* otool - Mach-O Object file reader.  Use to disassemble and inspect iOS applications&lt;br /&gt;
* class-dump-x - read class declarations and structs&lt;br /&gt;
* clang analyzer - static analysis for C, C++, and Objective-C source code&lt;br /&gt;
* Instruments - the sysinternals for Mac OS X&lt;br /&gt;
* Shark - analyze assembly level operations&lt;br /&gt;
* Mallory - to perform MiTM on iOS applications&lt;br /&gt;
* IDA Pro - Commercial disassembler and debugger.&lt;br /&gt;
* Hex Rays Decompiler - IDA Pro plug-in for decompilation of ARM assembly&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012&amp;diff=127239</id>
		<title>AppSecAsiaPac2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012&amp;diff=127239"/>
				<updated>2012-04-02T09:56:12Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 75%; background: none repeat scroll 0% 0% rgb(255, 255, 255);&amp;quot; | &lt;br /&gt;
[[File:Owasp appsecAsia2012ConfBanner.jpg]]&lt;br /&gt;
| style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(255, 255, 255);&amp;quot; | &lt;br /&gt;
[[File:RegisterForAppsec.png|link=http://www.regonline.com/appsecapac2012]]&lt;br /&gt;
|}&lt;br /&gt;
=Welcome=&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
'''@appsecasia Twitter Feed ([http://twitter.com/appsecasia follow us on Twitter!])''' &amp;lt;twitter&amp;gt;228540661&amp;lt;/twitter&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 35%; background: none repeat scroll 0% 0% rgb(255, 255, 255); color: black;&amp;quot; | &lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Owaspconf2012_small320w.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Welcome to the OWASP 2012 Appsec Asia Pacific Conference.'''&lt;br /&gt;
&lt;br /&gt;
The event is being held in Sydney, Australia from the 11th to the 14th of April 2012 at the Four Points Sheraton Darling Harbour.&lt;br /&gt;
&lt;br /&gt;
The conference consists of 2 days of world class training by OWASP instructor's followed by 2 days of quality presentations and keynotes from industry leaders, OWASP projects and industry consultants. In previous years the OWASP Asia Pacific conference has been rated as one of the &amp;quot;must attend&amp;quot; events of the year, with the conference always filling up quickly.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who should attend this conference:'''&lt;br /&gt;
&lt;br /&gt;
* Application Developers, Testers, Quality Assurance Team Members&lt;br /&gt;
* Chief Information Officers, Security Officers, Technology Officers&lt;br /&gt;
* Security Managers and Staff&lt;br /&gt;
* Executives, Managers and staff responsible for IT Security Governance&lt;br /&gt;
* IT Professionals interested in Improving Information Security&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Conference Highlights:'''&lt;br /&gt;
&lt;br /&gt;
* Alastair MacGibbon: Keynote Presentation (more information available on &amp;quot;Speakers&amp;quot; Tab)&lt;br /&gt;
* Jacob West (Fortify - HP): Keynote Presentation (more information available on &amp;quot;Speakers&amp;quot; Tab)&lt;br /&gt;
* Industry Leading training - Exploiting Web Applications with Samurai-WTF&lt;br /&gt;
* Industry Panel from Finance and Insurance Sectors&lt;br /&gt;
* Networking Opportunities to meet peers and other developers&lt;br /&gt;
* Gain access to resources within OWASP projects as well as leading vendors&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
[[File:RegisterForAppsec.png|link=http://www.regonline.com/appsecapac2012]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(255, 255, 255);&amp;quot; | &lt;br /&gt;
&amp;lt;center&amp;gt;'''Thank you to all of our supporters!'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;&amp;lt;center&amp;gt;Diamond &amp;amp; Platinum Sponsors&amp;lt;/center&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Fortify HP logo.png|link=http://www.fortify.com]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;&amp;lt;center&amp;gt;Gold &amp;amp; Silver Sponsors&amp;lt;/center&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:AppsecureLogo.jpg|link=http://www.appsecure.com/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:CS-LogoWeb.png|link=http://www.contentsecurity.com.au/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:GASystems-logo.jpg|link=http://www.gasystems.com.au/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Imperva 312x54.jpg|link=http://www.imperva.com/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Ionize75H.jpg‎|link=http://www.ionize.com.au/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:SPL-LOGO-LARGE.png|link=http://www.trustwave.com/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;&amp;lt;center&amp;gt; Associations &amp;amp; Supporters&amp;lt;/center&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
We are proudly supported by the following Industry Associations and Media outlets.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Auscert-Header-logo.gif|link=http://www.auscert.org.au/]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:AisaLogo.png|link=http://www.aisa.org.au/]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Registration Costs=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Register}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Training=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Training}}&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule=&lt;br /&gt;
&lt;br /&gt;
NOTE: Conference is scheduled to change as required by the conference committee, check back for updates prior to the conference.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 75%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font size=3pt&amp;gt;'''Conference Day 1 - Friday - April 13th''' &amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | ''(Time Allocated)'' &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Track 1 - Detect''' &amp;lt;br&amp;gt; (Grand Ballroom 1 &amp;amp; 2)&lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | '''Track 2 - Protect''' &amp;lt;br&amp;gt; (Grand Ballroom 3)&lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | '''Track 3 - Leadership &amp;amp; OWASP''' &amp;lt;br&amp;gt; (Wharf &amp;amp; Bridge Rooms Level 1)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''7:30 - 8:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Conference Registration Open - Coffee &amp;amp; Tea Available '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:30-8:40 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Conference Opening - Appsec Asia 2012'''&lt;br /&gt;
Speakers: Conference Committee Chair - Mr Justin Derry&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:40-9:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''KeyNote: Presentation'''&lt;br /&gt;
Speaker: Alastair MacGibbon&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:30-9:40 AM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:40-10:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''KeyNote: Presentation'''&lt;br /&gt;
Speaker:Jacob West&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''10:30-11:00 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Morning Tea - Provided for attendees in main EXPO &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:00-11:50 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: You can't filter the stupid!'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Charles Henderson &amp;amp; David Byrne&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Advanced Mobile Application Code Review Techniques'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Prashant Vema &amp;amp; Dinesh Shetty&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Effective Software Development in a PCI-DSS Environment'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Bruce Ashton&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:50-12:00 PM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:00-12:50 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Testing from the Cloud. Is the Sky Falling?'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Matt Tesauro&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Rethinking Web Application Architecture for Cloud'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Arshad Noor&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: OWASP Project - Secure Coding Practices Quick Reference Guide'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Justin Clarke&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:50-1:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Lunch - Provided for attendees in main Expo &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''1:30-2:20 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Overcoming the Quality vs Quantity Problem in Software Security Testing'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Rafal Los&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Mobile Security on iOS and Andriod'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Mike Park (Trustwave)&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: De-Anonymizing Anonymous'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Wayne O'Young&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:20-2:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:30-3:20 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Pen Testing Mobile Applications'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Frank Fan&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Application Security Logging &amp;amp; Monitoring, The Next Frontier'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Peter Freiberg&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Modern Software Security Assurance with OpenSAMM'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Pravir Chandra&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''3:30-4:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Afternoon Tea - Provided for attendees in EXPO &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:00-4:50 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Harder, Better, Faster, Stronger (SQLi)'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Luke Jahnke&amp;lt;br&amp;gt; &amp;amp; Louis Nyffenegger&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Securing the SSL Channel against Man-in-the-middle Attacks'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Tobias Gondrom&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: The risks that Pen Tests don't find'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Gary Gaskell&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:50-5:00 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''5:00-5:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Panel Discussion - Application Security Trends in 2012'''&lt;br /&gt;
Panelists: To be Announced&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''5:30-6:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''OWASP - Afternoon Networking Event - Ground Floor - Four Points Sheraton'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''6:30 - 10:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''OWASP - Gala Dinner - Grand Ballroom. (Inclusive in Conference Fee) - Speaker: Sabeena Oberoi - Assistant Secretary Cyber Security and Asia Pacific Engagement.'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 75%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font size=3pt&amp;gt;'''Conference Day 2 - Saturday- April 14th''' &amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | ''(Time Allocated)'' &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Track 1 - Detect''' &amp;lt;br&amp;gt; (Grand Ballroom 1 &amp;amp; 2)&lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | '''Track 2 - Protect''' &amp;lt;br&amp;gt; (Grand Ballroom 3)&lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | '''Track 3 - Leadership &amp;amp; OWASP''' &amp;lt;br&amp;gt; (Wharf &amp;amp; Bridge Rooms Level 1)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''7:30 - 8:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Conference Registration Open - Coffee &amp;amp; Tea Available '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:30-8:40 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Conference Day 2 Update- Appsec Asia 2012'''&lt;br /&gt;
Speakers: Conference Committee Chair - Mr Justin Derry&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:40-9:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''KeyNote: Presentation'''&lt;br /&gt;
Speaker: Jeremiah Grossman&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:30-9:40 AM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:40-10:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''KeyNote: Presentation'''&lt;br /&gt;
Speaker: Dr Jason Smith&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''10:30-11:00 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Morning Tea - Provided for attendees in main EXPO &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:00-11:50 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation:Pentesting iOS Applications:'''&lt;br /&gt;
&amp;amp;nbsp;Speaker:Jason Haddix&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Password Less Authentication &amp;amp; Authorization &amp;amp; Payments'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Srikar Sagi&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: [[OWASP_Zed_Attack_Proxy_Project OWASP Project - Zed Attack Proxy (ZAP)]]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Simon Bennetts&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:50-12:00 PM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:00-12:50 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: HTTP Fingerprinting - Next Generation'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Eldar Marcussen&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Web Crypto for the Developer who has better things to do.'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Adrian Hayes&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Static Code Analysis &amp;amp; Governance'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Jonathan Carter&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:50-1:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Lunch - Provided for attendees in main Expo &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''1:30-2:20 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Shake Hooves with BeEF'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Christian Frichot&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Software Security Goes Mobile'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Jacob West&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Data Breaches - When Application Security Goes Wrong'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Mark Goudie&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:20-2:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:30-3:20 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Pentesting Smart Grid Web Apps'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Justin Searle&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Breaking is Easy, Preventing is Hard'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Matias Madou&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: How MITM Proxy has been slaying SSL Dragons'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Jim Cheetham&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''3:20-3:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''3:30-4:20 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Rise of the Planet of the Anonymous'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Errazudin Ishak&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Anatomy of a Logic Flaw'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Charles Henderson &amp;amp; David Byrne&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: DSD - Cyber Security Australia'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Chris Clarke - Cyber Security Analyst&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:20-4:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:30-5:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''OWASP Appsec Asia 2012 - Conference Wrap Up'''&lt;br /&gt;
Speakers: OWASP Board, OWASP Appsec Asia Conference Committee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''5:00-6:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''OWASP Sponsor - Afternoon Networking Event - TBA'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Keynote Speakers=&lt;br /&gt;
&lt;br /&gt;
'''In alphabetical order:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Alastair MacGibbon== &lt;br /&gt;
Alastair MacGibbon is an internationally-respected authority on cybercrime, including Internet fraud, consumer victimisation and a range of Internet security and safety issues.  He is the managing partner of Surete Group, a consultancy dealing with improved customer retention for Internet companies by increasing trust and reducing negative user experiences.  Prior to this for almost 5 years Alastair headed Trust &amp;amp; Safety at eBay Australia and later eBay Asia Pacific.  He was a Federal Agent with the Australian Federal Police for 15 years, his final assignment as the founding Director of the Australian High Tech Crime Centre.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Jacob West== &lt;br /&gt;
Jacob West is Director, Software Security Research for the Enterprise Security Products division of Hewlett-Packard. West is a world-recognized expert on software security and brings a technical understanding of the languages and frameworks used to build software together with extensive knowledge about how real-world systems fail. In 2007, he co-authored the book &amp;quot;Secure Programming with Static Analysis&amp;quot; with colleague and Fortify founder Brian Chess. Today, the book remains the only comprehensive guide to static analysis and how developers can use it to avoid the most prevalent and dangerous vulnerabilities in code. West is a frequent speaker at industry events, including RSA Conference, Black Hat, Defcon, OWASP, and many others. A graduate of the University of California, Berkeley, West holds dual-degrees in Computer Science and French and resides in San Francisco, California. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dr. Jason Smith from CERT Australia==&lt;br /&gt;
Dr Jason Smith  is an assistant director at the national CERT, CERT Australia, which is part of the Attorney-General's Department. He is an experienced cyber security researcher and consultant, having provided consultancy services over the last decade on information infrastructure protection to government and critical infrastructure utilities.&lt;br /&gt;
&lt;br /&gt;
Since joining government Jason has been involved in the development and execution national scale cyber exercises and the advanced cyber security training for control systems conducted by the US Department of Homeland Security.&lt;br /&gt;
&lt;br /&gt;
Jason holds a degree in software engineering and data communications, a PhD in information security and is an Adjunct Associate Professor at the Queensland University of Technology.&lt;br /&gt;
&lt;br /&gt;
[http://www.cert.gov.au/ About CERT Australia] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Jeremiah Grossman==&lt;br /&gt;
Jeremiah Grossman is the Founder and CTO of WhiteHat Security, where he is responsible for Web security R&amp;amp;D and industry outreach. Mr. Grossman has written dozens of articles, white papers, and is a published author. His work has been featured in the Wall Street Journal, NY Times and many other mainstream media outlets. As a well-known security expert and industry veteran, Mr. Grossman has been a guest speaker on five continents at hundreds of events including BlackHat, RSA, ISSA, and others. He has been invited to guest lecture at top universities such as UC Berkeley, Stanford, Harvard, UoW Madison, UCLA, and Carnegie Mellon. Mr. Grossman is also a co-founder of the Web Application Security Consortium (WASC) and previously named one of InfoWorld's Top 25 CTOs. Before founding WhiteHat, Mr. Grossman was an information security officer at Yahoo!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mr. Grossman was recently a speaker at TEDxMaui. [http://tedxmaui.com/2011/12/30/speaker-spotlight-jeremiah-grossman/ Learn more here.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Track Session Speakers=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Talks}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
The Conference Committee is excited to announce that the conference has been openly supported by the following vendors and associations. Without the great support of these companies and organisations the 2012 event would not be what it is today.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Diamond &amp;amp; Platinum Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
The OWASP Conference 2012, welcomes our sponsors for Diamond and Platinum. There are still spaces available for sponsorship, but it's closing fast.&lt;br /&gt;
&lt;br /&gt;
More information is available on our sponsorship packages by viewing the sponsor pack [[File:AppSec AsiaPac 2012 Sponsorship.pdf]]. Contact our Committee for more information.&lt;br /&gt;
&lt;br /&gt;
[[File:Fortify HP logo.png|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Gold &amp;amp; Silver Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
The OWASP Conference 2012, welcomes our sponsors for Gold and Silver. The conference still has availability for other Gold and Silver sponsors.&lt;br /&gt;
&lt;br /&gt;
[[File:AppsecureTransLogo.png|link=http://www.appsecure.com/]]&lt;br /&gt;
[[File:Imperva 312x54.jpg|link=http://www.imperva.com/]]&lt;br /&gt;
[[File:Ionize75H.jpg‎|link=http://www.ionize.com.au/]]&lt;br /&gt;
[[File:CS-LogoWeb.png|link=http://www.contentsecurity.com.au/]]&lt;br /&gt;
[[File:Trustwave small.png|link=http://www.trustwave.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; Associations &amp;amp; Supporters&amp;lt;/h2&amp;gt; &lt;br /&gt;
We are proudly supported by the following Industry Associations and Media outlets.&lt;br /&gt;
&lt;br /&gt;
[[File:Auscert-Header-logo.gif|link=http://www.auscert.org.au/]]&lt;br /&gt;
[[File:AisaLogo.png|link=http://www.aisa.org.au/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapters Workshop=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Chapters_Workshop}}&lt;br /&gt;
&lt;br /&gt;
=Venue=&lt;br /&gt;
&lt;br /&gt;
We're excited to announce that the location of the OWASP Conference for Appsec Asia 2012 will be held at:&lt;br /&gt;
&lt;br /&gt;
'''Four Points Sheraton, Darling Harbour'''&amp;lt;br&amp;gt;&lt;br /&gt;
161 Sussex Street&amp;lt;br&amp;gt;&lt;br /&gt;
Sydney, New South Wales 2000&amp;lt;br&amp;gt;&lt;br /&gt;
Australia &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The facility provides hotel rooms and conference facilities, OWASP has secured cheap room rates directly in the hotel for the duration of the event.&lt;br /&gt;
&lt;br /&gt;
If you don't know your way around Sydney, here's the Google Maps link to the Hotel.&lt;br /&gt;
&lt;br /&gt;
http://maps.google.com.au/maps/place?q=Four+Points+by+Sheraton+Sydney,+Sussex+Street,+Sydney,+New+South+Wales&amp;amp;hl=en&amp;amp;cid=7369128618339939693&lt;br /&gt;
&lt;br /&gt;
[[File:FourPointsSheratonDarlingHarbour.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We are using both the Ground and upper levels. The majority of the event will be held on the ground level, including all breaks etc. Attendees will find the registration and conference desk located at the Ground level near Hotel Reception. (You're not going to get lost, as we take up most of the ground level for this event.)&lt;br /&gt;
&lt;br /&gt;
Further details about venue locations will be posted when they become available.&lt;br /&gt;
&lt;br /&gt;
=Travel and Accommodations=&lt;br /&gt;
For assistance with any of the items below, feel free to utilize OWASP's preferred travel agency:&amp;lt;br&amp;gt;&lt;br /&gt;
Segale Travel Service contact information is:  +1-800-841-2276 &amp;lt;br&amp;gt;&lt;br /&gt;
Sr. Travel Consultants:  &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:mariam@segaletravel.com Maria Martinez]...ext 524 &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:linnv@segaletravel.com Linn Vander Molen]...ext 520&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Additionally, the [mailto:appsecasia2012@owasp.org Conference Planning Team] is available to answer any questions!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
We've been able to arrange for accommodation within the Four Points Sheraton Hotel(where the training and conference will be held) for attendees. These rooms have been allocated at a special rate, and available strictly for a limited time. To book these rooms at the special rate, you need to use the booking link shown below. These rooms are available one night either side of the event ensuring that if you are travelling interstate or international it's easy to find a room at a good rate. The room rate allocated for the event is $200 AUD Inclusive per night.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Four Points Sheraton, Darling Harbour'''&amp;lt;br&amp;gt;&lt;br /&gt;
161 Sussex Street&amp;lt;br&amp;gt;&lt;br /&gt;
Sydney, New South Wales 2000&amp;lt;br&amp;gt;&lt;br /&gt;
Australia &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.starwoodmeeting.com/Book/OWASP http://www.starwoodmeeting.com/Book/OWASP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Travel Domestic==&lt;br /&gt;
&lt;br /&gt;
The OWASP Conference is to be held in Sydney at the Darling Harbour precinct. Hotel Location, http://maps.google.com.au/maps/place?q=Four+Points+by+Sheraton+Sydney,+Sussex+Street,+Sydney,+New+South+Wales&amp;amp;hl=en&amp;amp;cid=7369128618339939693&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==International Travel==&lt;br /&gt;
&lt;br /&gt;
The Sydney International Airport is located adjacent to the Domestic terminal. Similar taxi fares to the city and hotel venue apply.&lt;br /&gt;
If you are travelling by train, you can ride the train from the International terminal all the way to the Town Hall station as above.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Airport Transportation==&lt;br /&gt;
&lt;br /&gt;
*Any major Airline carrier will fly you into Sydney Airport, from here, you can take a Taxi (Approx $35-40 AUD).&lt;br /&gt;
*[http://www.kst.com.au KST Sydney Airport Shuttle] -- $18AUD oneway/ $32AUD roundtrip&lt;br /&gt;
* Another option is the train from the Airport, which you can ride all the way into the closest station which is Town Hall. From this stop the hotel is a small downhill walk (no more then 5-10mins) from the station.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Driving Instructions==&lt;br /&gt;
&lt;br /&gt;
''From Sydney Airport (South)'' &lt;br /&gt;
&lt;br /&gt;
Travel along Southern Cross Drive and take the South Dowling Street exit.&lt;br /&gt;
&lt;br /&gt;
Turn right onto Dacey Avenue.&lt;br /&gt;
&lt;br /&gt;
At the second set of traffic lights turn left onto Anzac Parade.&lt;br /&gt;
&lt;br /&gt;
Follow Anzac Parade past Moore Park on your right; Anzac Parade will become Flinders Street.&lt;br /&gt;
&lt;br /&gt;
Turn left onto Oxford Street and follow to Liverpool Street; Hyde Park will be on your right.&lt;br /&gt;
&lt;br /&gt;
Continue along Liverpool Street and turn right onto Kent Street.&lt;br /&gt;
&lt;br /&gt;
Travel five blocks and turn left onto Erskine Street.&lt;br /&gt;
&lt;br /&gt;
Immediately turn left again onto Sussex Street. The hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''From East'' &lt;br /&gt;
&lt;br /&gt;
Proceed along New South Head Road. Continue onto William Street and then onto Park Street; Hyde Park will be on your right.&lt;br /&gt;
&lt;br /&gt;
Proceed along Park Street as it becomes Druitt Street and turn right onto Kent Street.&lt;br /&gt;
&lt;br /&gt;
Travel approximately three blocks and turn left onto Erskine Street.&lt;br /&gt;
&lt;br /&gt;
Immediately turn left again onto Sussex Street. The hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''From West'' &lt;br /&gt;
&lt;br /&gt;
Proceed along the Western Distributor towards the city taking the City North exit followed by the Sussex Street South Exit.&lt;br /&gt;
&lt;br /&gt;
Turn right onto Sussex Street, the hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''From North'' &lt;br /&gt;
&lt;br /&gt;
Take the Pacific Highway/Warringah Highway and proceed over the Sydney Harbour Bridge.&lt;br /&gt;
&lt;br /&gt;
Take the York street exit off the bridge and continue along before turning right into Erskine Street .&lt;br /&gt;
&lt;br /&gt;
Proceed approximately three blocks before turning left into Sussex Street. The hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Contact Us=&lt;br /&gt;
&lt;br /&gt;
Justin Derry - Planning Committee Co-Chair&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew van der Stock - Planning Committee Co-Chair&amp;lt;br&amp;gt;&lt;br /&gt;
Christian Frichot - Planning Committee Member&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Mueller - Planning Committee Member&amp;lt;br&amp;gt;&lt;br /&gt;
Mohd Fazli Azran - Global Conference Committee Liaison&amp;lt;br&amp;gt;&lt;br /&gt;
Sarah Baso - OWASP Operational Support&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping out with this conference or have any questions, please contact us at: appsecasia2012@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Archives=&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/AppSecAsiaPac2012/CFP Call for Papers]&lt;br /&gt;
*[[Speaker Agreement]]&lt;br /&gt;
*[https://www.owasp.org/index.php/AppSecAsiaPac2012/CFT Call for Trainers]&lt;br /&gt;
*[https://www.owasp.org/images/8/80/APAC2012_Training_Instructor_Agreement.pdf Training Instructor Agreement]&lt;br /&gt;
*Information about the [https://www.owasp.org/index.php/AppSecAsiaPac2012/OWASP_Track OWASP Track]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012&amp;diff=127237</id>
		<title>AppSecAsiaPac2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012&amp;diff=127237"/>
				<updated>2012-04-02T09:49:21Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 75%; background: none repeat scroll 0% 0% rgb(255, 255, 255);&amp;quot; | &lt;br /&gt;
[[File:Owasp appsecAsia2012ConfBanner.jpg]]&lt;br /&gt;
| style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(255, 255, 255);&amp;quot; | &lt;br /&gt;
[[File:RegisterForAppsec.png|link=http://www.regonline.com/appsecapac2012]]&lt;br /&gt;
|}&lt;br /&gt;
=Welcome=&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
'''@appsecasia Twitter Feed ([http://twitter.com/appsecasia follow us on Twitter!])''' &amp;lt;twitter&amp;gt;228540661&amp;lt;/twitter&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 35%; background: none repeat scroll 0% 0% rgb(255, 255, 255); color: black;&amp;quot; | &lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Owaspconf2012_small320w.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Welcome to the OWASP 2012 Appsec Asia Pacific Conference.'''&lt;br /&gt;
&lt;br /&gt;
The event is being held in Sydney, Australia from the 11th to the 14th of April 2012 at the Four Points Sheraton Darling Harbour.&lt;br /&gt;
&lt;br /&gt;
The conference consists of 2 days of world class training by OWASP instructor's followed by 2 days of quality presentations and keynotes from industry leaders, OWASP projects and industry consultants. In previous years the OWASP Asia Pacific conference has been rated as one of the &amp;quot;must attend&amp;quot; events of the year, with the conference always filling up quickly.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who should attend this conference:'''&lt;br /&gt;
&lt;br /&gt;
* Application Developers, Testers, Quality Assurance Team Members&lt;br /&gt;
* Chief Information Officers, Security Officers, Technology Officers&lt;br /&gt;
* Security Managers and Staff&lt;br /&gt;
* Executives, Managers and staff responsible for IT Security Governance&lt;br /&gt;
* IT Professionals interested in Improving Information Security&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Conference Highlights:'''&lt;br /&gt;
&lt;br /&gt;
* Alastair MacGibbon: Keynote Presentation (more information available on &amp;quot;Speakers&amp;quot; Tab)&lt;br /&gt;
* Jacob West (Fortify - HP): Keynote Presentation (more information available on &amp;quot;Speakers&amp;quot; Tab)&lt;br /&gt;
* Industry Leading training - Exploiting Web Applications with Samurai-WTF&lt;br /&gt;
* Industry Panel from Finance and Insurance Sectors&lt;br /&gt;
* Networking Opportunities to meet peers and other developers&lt;br /&gt;
* Gain access to resources within OWASP projects as well as leading vendors&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
[[File:RegisterForAppsec.png|link=http://www.regonline.com/appsecapac2012]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(255, 255, 255);&amp;quot; | &lt;br /&gt;
&amp;lt;center&amp;gt;'''Thank you to all of our supporters!'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;&amp;lt;center&amp;gt;Diamond &amp;amp; Platinum Sponsors&amp;lt;/center&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Fortify HP logo.png|link=http://www.fortify.com]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;&amp;lt;center&amp;gt;Gold &amp;amp; Silver Sponsors&amp;lt;/center&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:AppsecureLogo.jpg|link=http://www.appsecure.com/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:CS-LogoWeb.png|link=http://www.contentsecurity.com.au/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:GASystems-logo.jpg|link=http://www.gasystems.com.au/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Imperva 312x54.jpg|link=http://www.imperva.com/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Ionize75H.jpg‎|link=http://www.ionize.com.au/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:SPL-LOGO-LARGE.png|link=http://www.trustwave.com/]]&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;&amp;lt;center&amp;gt; Associations &amp;amp; Supporters&amp;lt;/center&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
We are proudly supported by the following Industry Associations and Media outlets.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:Auscert-Header-logo.gif|link=http://www.auscert.org.au/]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:AisaLogo.png|link=http://www.aisa.org.au/]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Registration Costs=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Register}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Training=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Training}}&lt;br /&gt;
&lt;br /&gt;
= Conference Schedule=&lt;br /&gt;
&lt;br /&gt;
NOTE: Conference is scheduled to change as required by the conference committee, check back for updates prior to the conference.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 75%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font size=3pt&amp;gt;'''Conference Day 1 - Friday - April 13th''' &amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | ''(Time Allocated)'' &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Track 1 - Detect''' &amp;lt;br&amp;gt; (Grand Ballroom 1 &amp;amp; 2)&lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | '''Track 2 - Protect''' &amp;lt;br&amp;gt; (Grand Ballroom 3)&lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | '''Track 3 - Leadership &amp;amp; OWASP''' &amp;lt;br&amp;gt; (Wharf &amp;amp; Bridge Rooms Level 1)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''7:30 - 8:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Conference Registration Open - Coffee &amp;amp; Tea Available '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:30-8:40 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Conference Opening - Appsec Asia 2012'''&lt;br /&gt;
Speakers: Conference Committee Chair - Mr Justin Derry&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:40-9:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''KeyNote: Presentation'''&lt;br /&gt;
Speaker: Alastair MacGibbon&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:30-9:40 AM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:40-10:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''KeyNote: Presentation'''&lt;br /&gt;
Speaker:Jacob West&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''10:30-11:00 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Morning Tea - Provided for attendees in main EXPO &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:00-11:50 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: You can't filter the stupid!'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Charles Henderson &amp;amp; David Byrne&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Advanced Mobile Application Code Review Techniques'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Prashant Vema &amp;amp; Dinesh Shetty&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Effective Software Development in a PCI-DSS Environment'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Bruce Ashton&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:50-12:00 PM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:00-12:50 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Testing from the Cloud. Is the Sky Falling?'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Matt Tesauro&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Rethinking Web Application Architecture for Cloud'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Arshad Noor&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: OWASP Project - Secure Coding Practices Quick Reference Guide'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Justin Clarke&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:50-1:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Lunch - Provided for attendees in main Expo &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''1:30-2:20 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Overcoming the Quality vs Quantity Problem in Software Security Testing'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Rafal Los&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Mobile Security on iOS and Andriod'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Mike Park (Trustwave)&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: De-Anonymizing Anonymous'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Wayne O'Young&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:20-2:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:30-3:20 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Pen Testing Mobile Applications'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Frank Fan&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Application Security Logging &amp;amp; Monitoring, The Next Frontier'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Peter Freiberg&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Modern Software Security Assurance with OpenSAMM'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Pravir Chandra&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''3:30-4:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Afternoon Tea - Provided for attendees in EXPO &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:00-4:50 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Harder, Better, Faster, Stronger (SQLi)'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Luke Jahnke&amp;lt;br&amp;gt; &amp;amp; Louis Nyffenegger&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Securing the SSL Channel against Man-in-the-middle Attacks'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Tobias Gondrom&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: The risks that Pen Tests don't find'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Gary Gaskell&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:50-5:00 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''5:00-5:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Panel Discussion - Application Security Trends in 2012'''&lt;br /&gt;
Panelists: To be Announced&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''5:30-6:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''OWASP - Afternoon Networking Event - Ground Floor - Four Points Sheraton'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''6:30 - 10:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''OWASP - Gala Dinner - Grand Ballroom. (Inclusive in Conference Fee) - Speaker: Sabeena Oberoi - Assistant Secretary Cyber Security and Asia Pacific Engagement.'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 75%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font size=3pt&amp;gt;'''Conference Day 2 - Saturday- April 14th''' &amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | ''(Time Allocated)'' &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Track 1 - Detect''' &amp;lt;br&amp;gt; (Grand Ballroom 1 &amp;amp; 2)&lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | '''Track 2 - Protect''' &amp;lt;br&amp;gt; (Grand Ballroom 3)&lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | '''Track 3 - Leadership &amp;amp; OWASP''' &amp;lt;br&amp;gt; (Wharf &amp;amp; Bridge Rooms Level 1)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''7:30 - 8:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Conference Registration Open - Coffee &amp;amp; Tea Available '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:30-8:40 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''Conference Day 2 Update- Appsec Asia 2012'''&lt;br /&gt;
Speakers: Conference Committee Chair - Mr Justin Derry&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''8:40-9:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''KeyNote: Presentation'''&lt;br /&gt;
Speaker: Jeremiah Grossman&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:30-9:40 AM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''9:40-10:30 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''KeyNote: Presentation'''&lt;br /&gt;
Speaker: Dr Jason Smith&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''10:30-11:00 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Morning Tea - Provided for attendees in main EXPO &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:00-11:50 AM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation:Pentesting iOS Applications:'''&lt;br /&gt;
&amp;amp;nbsp;Speaker:Jason Haddix&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Password Less Authentication &amp;amp; Authorization &amp;amp; Payments'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Srikar Sagi&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: [[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Project - Zed Attack Proxy (ZAP)]]'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Simon Bennetts&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''11:50-12:00 PM'' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:00-12:50 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: HTTP Fingerprinting - Next Generation'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Eldar Marcussen&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Web Crypto for the Developer who has better things to do.'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Adrian Hayes&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Static Code Analysis &amp;amp; Governance'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Jonathan Carter&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''12:50-1:30 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''Break - Lunch - Provided for attendees in main Expo &amp;amp; Conference Hall - Ground Level'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''1:30-2:20 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Shake Hooves with BeEF'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Christian Frichot&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Software Security Goes Mobile'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Jacob West&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Data Breaches - When Application Security Goes Wrong'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Mark Goudie&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:20-2:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''2:30-3:20 PM'' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Pentesting Smart Grid Web Apps'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Justin Searle&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Breaking is Easy, Preventing is Hard'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Matias Madou&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: How MITM Proxy has been slaying SSL Dragons'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Jim Cheetham&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''3:20-3:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''3:30-4:20 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Rise of the Planet of the Anonymous'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Errazudin Ishak&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: Anatomy of a Logic Flaw'''&lt;br /&gt;
&amp;amp;nbsp;Speakers: Charles Henderson &amp;amp; David Byrne&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(204, 255, 122);&amp;quot; | &amp;amp;nbsp;'''Presentation: DSD - Cyber Security Australia'''&lt;br /&gt;
&amp;amp;nbsp;Speaker: Chris Clarke - Cyber Security Analyst&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:20-4:30 PM''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(246, 246, 246);&amp;quot; | Short Break - Conference Movement&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''4:30-5:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | '''OWASP Appsec Asia 2012 - Conference Wrap Up'''&lt;br /&gt;
Speakers: OWASP Board, OWASP Appsec Asia Conference Committee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;amp;nbsp;''5:00-6:00 PM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | '''OWASP Sponsor - Afternoon Networking Event - TBA'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Keynote Speakers=&lt;br /&gt;
&lt;br /&gt;
'''In alphabetical order:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Alastair MacGibbon== &lt;br /&gt;
Alastair MacGibbon is an internationally-respected authority on cybercrime, including Internet fraud, consumer victimisation and a range of Internet security and safety issues.  He is the managing partner of Surete Group, a consultancy dealing with improved customer retention for Internet companies by increasing trust and reducing negative user experiences.  Prior to this for almost 5 years Alastair headed Trust &amp;amp; Safety at eBay Australia and later eBay Asia Pacific.  He was a Federal Agent with the Australian Federal Police for 15 years, his final assignment as the founding Director of the Australian High Tech Crime Centre.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Jacob West== &lt;br /&gt;
Jacob West is Director, Software Security Research for the Enterprise Security Products division of Hewlett-Packard. West is a world-recognized expert on software security and brings a technical understanding of the languages and frameworks used to build software together with extensive knowledge about how real-world systems fail. In 2007, he co-authored the book &amp;quot;Secure Programming with Static Analysis&amp;quot; with colleague and Fortify founder Brian Chess. Today, the book remains the only comprehensive guide to static analysis and how developers can use it to avoid the most prevalent and dangerous vulnerabilities in code. West is a frequent speaker at industry events, including RSA Conference, Black Hat, Defcon, OWASP, and many others. A graduate of the University of California, Berkeley, West holds dual-degrees in Computer Science and French and resides in San Francisco, California. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dr. Jason Smith from CERT Australia==&lt;br /&gt;
Dr Jason Smith  is an assistant director at the national CERT, CERT Australia, which is part of the Attorney-General's Department. He is an experienced cyber security researcher and consultant, having provided consultancy services over the last decade on information infrastructure protection to government and critical infrastructure utilities.&lt;br /&gt;
&lt;br /&gt;
Since joining government Jason has been involved in the development and execution national scale cyber exercises and the advanced cyber security training for control systems conducted by the US Department of Homeland Security.&lt;br /&gt;
&lt;br /&gt;
Jason holds a degree in software engineering and data communications, a PhD in information security and is an Adjunct Associate Professor at the Queensland University of Technology.&lt;br /&gt;
&lt;br /&gt;
[http://www.cert.gov.au/ About CERT Australia] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Jeremiah Grossman==&lt;br /&gt;
Jeremiah Grossman is the Founder and CTO of WhiteHat Security, where he is responsible for Web security R&amp;amp;D and industry outreach. Mr. Grossman has written dozens of articles, white papers, and is a published author. His work has been featured in the Wall Street Journal, NY Times and many other mainstream media outlets. As a well-known security expert and industry veteran, Mr. Grossman has been a guest speaker on five continents at hundreds of events including BlackHat, RSA, ISSA, and others. He has been invited to guest lecture at top universities such as UC Berkeley, Stanford, Harvard, UoW Madison, UCLA, and Carnegie Mellon. Mr. Grossman is also a co-founder of the Web Application Security Consortium (WASC) and previously named one of InfoWorld's Top 25 CTOs. Before founding WhiteHat, Mr. Grossman was an information security officer at Yahoo!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mr. Grossman was recently a speaker at TEDxMaui. [http://tedxmaui.com/2011/12/30/speaker-spotlight-jeremiah-grossman/ Learn more here.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Track Session Speakers=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Talks}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
The Conference Committee is excited to announce that the conference has been openly supported by the following vendors and associations. Without the great support of these companies and organisations the 2012 event would not be what it is today.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Diamond &amp;amp; Platinum Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
The OWASP Conference 2012, welcomes our sponsors for Diamond and Platinum. There are still spaces available for sponsorship, but it's closing fast.&lt;br /&gt;
&lt;br /&gt;
More information is available on our sponsorship packages by viewing the sponsor pack [[File:AppSec AsiaPac 2012 Sponsorship.pdf]]. Contact our Committee for more information.&lt;br /&gt;
&lt;br /&gt;
[[File:Fortify HP logo.png|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Gold &amp;amp; Silver Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
The OWASP Conference 2012, welcomes our sponsors for Gold and Silver. The conference still has availability for other Gold and Silver sponsors.&lt;br /&gt;
&lt;br /&gt;
[[File:AppsecureTransLogo.png|link=http://www.appsecure.com/]]&lt;br /&gt;
[[File:Imperva 312x54.jpg|link=http://www.imperva.com/]]&lt;br /&gt;
[[File:Ionize75H.jpg‎|link=http://www.ionize.com.au/]]&lt;br /&gt;
[[File:CS-LogoWeb.png|link=http://www.contentsecurity.com.au/]]&lt;br /&gt;
[[File:Trustwave small.png|link=http://www.trustwave.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; Associations &amp;amp; Supporters&amp;lt;/h2&amp;gt; &lt;br /&gt;
We are proudly supported by the following Industry Associations and Media outlets.&lt;br /&gt;
&lt;br /&gt;
[[File:Auscert-Header-logo.gif|link=http://www.auscert.org.au/]]&lt;br /&gt;
[[File:AisaLogo.png|link=http://www.aisa.org.au/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapters Workshop=&lt;br /&gt;
&lt;br /&gt;
{{:AppSecAsiaPac2012/Chapters_Workshop}}&lt;br /&gt;
&lt;br /&gt;
=Venue=&lt;br /&gt;
&lt;br /&gt;
We're excited to announce that the location of the OWASP Conference for Appsec Asia 2012 will be held at:&lt;br /&gt;
&lt;br /&gt;
'''Four Points Sheraton, Darling Harbour'''&amp;lt;br&amp;gt;&lt;br /&gt;
161 Sussex Street&amp;lt;br&amp;gt;&lt;br /&gt;
Sydney, New South Wales 2000&amp;lt;br&amp;gt;&lt;br /&gt;
Australia &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The facility provides hotel rooms and conference facilities, OWASP has secured cheap room rates directly in the hotel for the duration of the event.&lt;br /&gt;
&lt;br /&gt;
If you don't know your way around Sydney, here's the Google Maps link to the Hotel.&lt;br /&gt;
&lt;br /&gt;
http://maps.google.com.au/maps/place?q=Four+Points+by+Sheraton+Sydney,+Sussex+Street,+Sydney,+New+South+Wales&amp;amp;hl=en&amp;amp;cid=7369128618339939693&lt;br /&gt;
&lt;br /&gt;
[[File:FourPointsSheratonDarlingHarbour.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We are using both the Ground and upper levels. The majority of the event will be held on the ground level, including all breaks etc. Attendees will find the registration and conference desk located at the Ground level near Hotel Reception. (You're not going to get lost, as we take up most of the ground level for this event.)&lt;br /&gt;
&lt;br /&gt;
Further details about venue locations will be posted when they become available.&lt;br /&gt;
&lt;br /&gt;
=Travel and Accommodations=&lt;br /&gt;
For assistance with any of the items below, feel free to utilize OWASP's preferred travel agency:&amp;lt;br&amp;gt;&lt;br /&gt;
Segale Travel Service contact information is:  +1-800-841-2276 &amp;lt;br&amp;gt;&lt;br /&gt;
Sr. Travel Consultants:  &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:mariam@segaletravel.com Maria Martinez]...ext 524 &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:linnv@segaletravel.com Linn Vander Molen]...ext 520&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Additionally, the [mailto:appsecasia2012@owasp.org Conference Planning Team] is available to answer any questions!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
We've been able to arrange for accommodation within the Four Points Sheraton Hotel(where the training and conference will be held) for attendees. These rooms have been allocated at a special rate, and available strictly for a limited time. To book these rooms at the special rate, you need to use the booking link shown below. These rooms are available one night either side of the event ensuring that if you are travelling interstate or international it's easy to find a room at a good rate. The room rate allocated for the event is $200 AUD Inclusive per night.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Four Points Sheraton, Darling Harbour'''&amp;lt;br&amp;gt;&lt;br /&gt;
161 Sussex Street&amp;lt;br&amp;gt;&lt;br /&gt;
Sydney, New South Wales 2000&amp;lt;br&amp;gt;&lt;br /&gt;
Australia &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.starwoodmeeting.com/Book/OWASP http://www.starwoodmeeting.com/Book/OWASP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Travel Domestic==&lt;br /&gt;
&lt;br /&gt;
The OWASP Conference is to be held in Sydney at the Darling Harbour precinct. Hotel Location, http://maps.google.com.au/maps/place?q=Four+Points+by+Sheraton+Sydney,+Sussex+Street,+Sydney,+New+South+Wales&amp;amp;hl=en&amp;amp;cid=7369128618339939693&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==International Travel==&lt;br /&gt;
&lt;br /&gt;
The Sydney International Airport is located adjacent to the Domestic terminal. Similar taxi fares to the city and hotel venue apply.&lt;br /&gt;
If you are travelling by train, you can ride the train from the International terminal all the way to the Town Hall station as above.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Airport Transportation==&lt;br /&gt;
&lt;br /&gt;
*Any major Airline carrier will fly you into Sydney Airport, from here, you can take a Taxi (Approx $35-40 AUD).&lt;br /&gt;
*[http://www.kst.com.au KST Sydney Airport Shuttle] -- $18AUD oneway/ $32AUD roundtrip&lt;br /&gt;
* Another option is the train from the Airport, which you can ride all the way into the closest station which is Town Hall. From this stop the hotel is a small downhill walk (no more then 5-10mins) from the station.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Driving Instructions==&lt;br /&gt;
&lt;br /&gt;
''From Sydney Airport (South)'' &lt;br /&gt;
&lt;br /&gt;
Travel along Southern Cross Drive and take the South Dowling Street exit.&lt;br /&gt;
&lt;br /&gt;
Turn right onto Dacey Avenue.&lt;br /&gt;
&lt;br /&gt;
At the second set of traffic lights turn left onto Anzac Parade.&lt;br /&gt;
&lt;br /&gt;
Follow Anzac Parade past Moore Park on your right; Anzac Parade will become Flinders Street.&lt;br /&gt;
&lt;br /&gt;
Turn left onto Oxford Street and follow to Liverpool Street; Hyde Park will be on your right.&lt;br /&gt;
&lt;br /&gt;
Continue along Liverpool Street and turn right onto Kent Street.&lt;br /&gt;
&lt;br /&gt;
Travel five blocks and turn left onto Erskine Street.&lt;br /&gt;
&lt;br /&gt;
Immediately turn left again onto Sussex Street. The hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''From East'' &lt;br /&gt;
&lt;br /&gt;
Proceed along New South Head Road. Continue onto William Street and then onto Park Street; Hyde Park will be on your right.&lt;br /&gt;
&lt;br /&gt;
Proceed along Park Street as it becomes Druitt Street and turn right onto Kent Street.&lt;br /&gt;
&lt;br /&gt;
Travel approximately three blocks and turn left onto Erskine Street.&lt;br /&gt;
&lt;br /&gt;
Immediately turn left again onto Sussex Street. The hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''From West'' &lt;br /&gt;
&lt;br /&gt;
Proceed along the Western Distributor towards the city taking the City North exit followed by the Sussex Street South Exit.&lt;br /&gt;
&lt;br /&gt;
Turn right onto Sussex Street, the hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''From North'' &lt;br /&gt;
&lt;br /&gt;
Take the Pacific Highway/Warringah Highway and proceed over the Sydney Harbour Bridge.&lt;br /&gt;
&lt;br /&gt;
Take the York street exit off the bridge and continue along before turning right into Erskine Street .&lt;br /&gt;
&lt;br /&gt;
Proceed approximately three blocks before turning left into Sussex Street. The hotel will be on your right.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Contact Us=&lt;br /&gt;
&lt;br /&gt;
Justin Derry - Planning Committee Co-Chair&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew van der Stock - Planning Committee Co-Chair&amp;lt;br&amp;gt;&lt;br /&gt;
Christian Frichot - Planning Committee Member&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Mueller - Planning Committee Member&amp;lt;br&amp;gt;&lt;br /&gt;
Mohd Fazli Azran - Global Conference Committee Liaison&amp;lt;br&amp;gt;&lt;br /&gt;
Sarah Baso - OWASP Operational Support&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in helping out with this conference or have any questions, please contact us at: appsecasia2012@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Archives=&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/AppSecAsiaPac2012/CFP Call for Papers]&lt;br /&gt;
*[[Speaker Agreement]]&lt;br /&gt;
*[https://www.owasp.org/index.php/AppSecAsiaPac2012/CFT Call for Trainers]&lt;br /&gt;
*[https://www.owasp.org/images/8/80/APAC2012_Training_Instructor_Agreement.pdf Training Instructor Agreement]&lt;br /&gt;
*Information about the [https://www.owasp.org/index.php/AppSecAsiaPac2012/OWASP_Track OWASP Track]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Man_vs._Code&amp;diff=125744</id>
		<title>Man vs. Code</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Man_vs._Code&amp;diff=125744"/>
				<updated>2012-03-08T08:22:18Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''UPDATE: I have proposed a &amp;quot;Sticky&amp;quot; Marking When Smart Highlighting enhancement to the Notepad++ team: when one is selecting a word character-by-character, allow one to do this multiple times, without clearing the previous selected (and now smart-highlighted) sets of words. Then, clear all marks when double click on any other word. Double-click smart-highlighting functionality remains the same as it was before. This allows one to follow variable assignments through the code more easily. This change allows one to select the original variable, then select a new variable that the old variable is now assigned to, and so on. If you're interested in the details contact mike.boberski@owasp.org. If you'd like an already built version with the changes to copy over after you've installed, you can find it [http://www.owasp.org/index.php/File:Notepad%2B%2B.zip here]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Man-v-code.gif|right]]&lt;br /&gt;
Tools such as source code review tools are expensive. Let me rephrase. They cost as much as a house! Feeling like you just stepped into a survivalist reality show, after being asked to perform a review using for example [http://www.owasp.org/index.php/ASVS OWASP ASVS]? You need tools, and you need them now. You also need tools more useful than for example RATS (Rough Auditing Tool for Security). &lt;br /&gt;
&lt;br /&gt;
Tools such as RATS even if their rules are beefed up are still not a fast way to do a code review. If you accept the premise that when performing a code review, one should do at least a minimal check for both false positives and false negatives, then regardless of tool, you still need to go through each and every source file even if only for a cursory inspection. This is where source code review tools shine, their IDE-like GUIs allow you to jump through the code interactively in a very efficient way. This is why tools such as RATS are pretty much useless. You need to be able to easily jump through the code and follow data from sources to sinks a lot more than you need an initial count of some huge number of potential findings! &lt;br /&gt;
&lt;br /&gt;
With the above in mind, here's one way to fashion a basic, efficient source code review tool (in this case, for PHP source) using a little bit of research and some freely-available tools in perhaps unexpected ways. The basic idea is to use Notepad++ and Its “User Defined Language” Feature. It can be downloaded here: http://notepad-plus.sourceforge.net So, go and do that. The ability to define one’s language using Notepad++ configuration interfaces,  its syntax highlighting, and the ability to highlight variables throughout by default after selecting them, provides the basis for a way to search file-by-file for security-related flaws. E.g. create a new “PHP 4, 5 SCA” language. You'll also want to use a grep tool and also open up the PHP web site so you can search for function/language definitions http://us2.php.net/manual/en/ Also, install the “Explorer” plugin (copy to its plugins directory, download from http://sourceforge.net/project/showfiles.php?group_id=189927&amp;amp;package_id=223667 then enable it using the “Plugins” menu&lt;br /&gt;
&lt;br /&gt;
Then, based on looking for function and other keywords related to input, SQL, sessions, URLs, files, etc. one can mine documents for relevant keywords, e.g.:&lt;br /&gt;
&lt;br /&gt;
* http://us2.php.net/manual/en/reserved.variables.php&lt;br /&gt;
* http://us2.php.net/manual/en/book.mysql.php&lt;br /&gt;
* http://us2.php.net/manual/en/book.hash.php&lt;br /&gt;
* http://us2.php.net/manual/en/refs.fileprocess.file.php&lt;br /&gt;
* http://us2.php.net/manual/en/book.mail.php&lt;br /&gt;
* http://us2.php.net/manual/en/book.session.php&lt;br /&gt;
* http://us2.php.net/manual/en/features.cookies.php&lt;br /&gt;
* http://us2.php.net/manual/en/ref.url.php&lt;br /&gt;
* Chris Shiflett, Essential PHP Security (O’Reilly Media, Inc., 2005).&lt;br /&gt;
* http://www.fortify.com/vulncat/en/vulncat/index.html&lt;br /&gt;
&lt;br /&gt;
Next, configure Notepad++ to create a new PHP static analysis language:&lt;br /&gt;
&lt;br /&gt;
Select “View” menu, then “User Define Dialog” menu item, then “Dock” button&lt;br /&gt;
&lt;br /&gt;
Ext:&lt;br /&gt;
*Set to php (no period!)&lt;br /&gt;
&lt;br /&gt;
Folder &amp;amp; Default&lt;br /&gt;
* Font name – Consolas&lt;br /&gt;
&lt;br /&gt;
Keywords Lists - Use your research here!&lt;br /&gt;
&lt;br /&gt;
1st Group - Use this to find potential problems&lt;br /&gt;
* Foreground color – red&lt;br /&gt;
* Background color – white&lt;br /&gt;
* Font style - bold&lt;br /&gt;
* Prefix mode – make sure this is set (checked)&lt;br /&gt;
&lt;br /&gt;
PHP Example:&lt;br /&gt;
* $GLOBALS $_SERVER $_GET $_POST $_FILES $_REQUEST $_SESSION $_ENV $_COOKIE $php_errormsg $HTTP_RAW_POST_DATA $http_response_header $argc $argv mysql_ hash_ basename chgrp chmod chown clearstatcache copy delete dirname disk_free_space disk_total_space diskfreespace fclose feof fflush fgetc fgetcsv fgets fgetss file_exists file_get_contents file_put_contents file fileatime filectime filegroup fileinode filemtime fileowner fileperms filesize filetype flock fnmatch fopen fpassthru fputcsv fputs fread fscanf fseek fstat ftell ftruncate fwrite glob is_dir is_executable is_file is_link is_readable is_uploaded_file is_writable is_writeable lchgrp lchown link linkinfo lstat mkdir move_uploaded_file parse_ini_file parse_ini_string pathinfo pclose popen readfile readlink realpath rename rewind rmdir set_file_buffer stat symlink tempnam tmpfile touch umask  unlink mail session_ setcookie setrawcookie header ob_ output_ base64_ get_headers get_meta_tags http_build_query parse_url rawurlecode urldecode urlencode ini_set error_log allow_url_fopen disable_functions display_errors enable_dl error_reporting file_uploads log_errors magic_quotes_gpc memory_limit open_basedir register_globals safe_mode eval exec file file_get_contents fopen include passthru phpinfo popen preg_replace proc_open readfile require shell_exec system $password mcrypt_ return echo &amp;lt;?php &amp;lt;? md5 ldap_ @ trigger_error print error_reporting display_errors &amp;lt;form Ajax.Request preg_replace htmlspecialchars hidden &amp;lt;input rand srand mt_srand mt_rand file extract href mysqli &lt;br /&gt;
&lt;br /&gt;
NSS (v3.12.4) Example:&lt;br /&gt;
&lt;br /&gt;
* NSS_GetClientAuthData NSS_SetDomesticPolicy NSS_SetExportPolicy NSS_SetFrancePolicy NSSSSL_VersionCheck SSL_AuthCertificate SSL_AuthCertificateHook SSL_BadCertHook SSL_CertDBHandleSet SSL_CipherPolicyGet SSL_CipherPolicySet SSL_CipherPrefGet SSL_CipherPrefGetDefault SSL_CipherPrefSet SSL_CipherPrefSetDefault SSL_ClearSessionCache SSL_ConfigMPServerSIDCache SSL_ConfigSecureServer SSL_ConfigServerSessionIDCache SSL_DataPending SSL_ForceHandshake SSL_ForceHandshakeWithTimeout SSL_GetChannelInfo SSL_GetCipherSuiteInfo SSL_GetClientAuthDataHook SSL_GetMaxServerCacheLocks SSL_GetSessionID SSL_GetStatistics SSL_HandshakeCallback SSL_ImportFD SSL_InheritMPServerSIDCache SSL_InvalidateSession SSL_LocalCertificate SSL_OptionGet SSL_OptionGetDefault SSL_OptionSet SSL_OptionSetDefault SSL_PeerCertificate SSL_PreencryptedFileToStream SSL_PreencryptedStreamToFile SSL_ReHandshake SSL_ReHandshakeWithTimeout SSL_ResetHandshake SSL_RestartHandshakeAfterCertReq SSL_RestartHandshakeAfterServerCert SSL_RevealCert SSL_RevealPinArg SSL_RevealURL SSL_SecurityStatus SSL_SetMaxServerCacheLocks SSL_SetPKCS11PinArg SSL_SetSockPeerID SSL_SetURL SSL_ShutdownServerSessionIDCache SSL_Enable SSL_EnableCipher SSL_EnableDefault SSL_RedoHandshake SSL_SetPolicy CERT_AddCertToListTail CERT_AddExtension CERT_AddOCSPAcceptableResponses CERT_AddOKDomainName CERT_AddRDN CERT_AsciiToName CERT_CacheCRL CERT_CertChainFromCert CERT_CertListFromCert CERT_CertTimesValid CERT_ChangeCertTrust CERT_CheckCertValidTimes CERT_CheckCertUsage CERT_CompareName CERT_CompareValidityTimes CERT_CompleteCRLDecodeEntries CERT_ConvertAndDecodeCertificate CERT_CopyName CERT_CopyRDN CERT_CreateAVA CERT_CreateCertificate CERT_CreateCertificateRequest CERT_CreateName CERT_CreateOCSPCertID CERT_CreateOCSPRequest CERT_CreateRDN CERT_CreateSubjectCertList CERT_CreateValidity CERT_CRLCacheRefreshIssuer CERT_DecodeAltNameExtension CERT_DecodeAuthInfoAccessExtension CERT_DecodeAuthKeyID CERT_DecodeAVAValue CERT_DecodeBasicConstraintValue CERT_DecodeCertFromPackage CERT_DecodeCertificatePoliciesExtension CERT_DecodeCertPackage CERT_DecodeCRLDistributionPoints CERT_DecodeDERCrl CERT_DecodeDERCrlWithFlags CERT_DecodeGeneralName CERT_DecodeNameConstraintsExtension CERT_DecodeOCSPResponse CERT_DecodeOidSequence CERT_DecodePrivKeyUsagePeriodExtension CERT_DecodeTrustString CERT_DecodeUserNotice CERT_DerNameToAscii CERT_DestroyCertArray CERT_DestroyCertificate CERT_DestroyCertificateList CERT_DestroyCertificatePoliciesExtension CERT_DestroyCertificateRequest CERT_DestroyCertList CERT_DestroyName CERT_DestroyOCSPCertID CERT_DestroyOCSPRequest CERT_DestroyOCSPResponse CERT_DestroyOidSequence CERT_DestroyUserNotice CERT_DestroyValidity CERT_DupCertificate CERT_DupCertList CERT_EnableOCSPChecking CERT_EncodeAltNameExtension CERT_EncodeAndAddBitStrExtension CERT_EncodeAuthKeyID CERT_EncodeBasicConstraintValue CERT_EncodeCRLDistributionPoints CERT_EncodeGeneralName CERT_EncodeOCSPRequest CERT_ExtractPublicKey CERT_FindCertByName CERT_FilterCertListByCANames CERT_FilterCertListByUsage CERT_FilterCertListForUserCerts CERT_FindCertByDERCert CERT_FindCertByIssuerAndSN CERT_FindCertByNickname CERT_FindCertByNicknameOrEmailAddr CERT_FindCertBySubjectKeyID CERT_FindCertExtension CERT_FindCertIssuer CERT_FindKeyUsageExtension CERT_FindSMimeProfile CERT_FindSubjectKeyIDExtension CERT_FindUserCertByUsage CERT_FindUserCertsByUsage CERT_FinishCertificateRequestAttributes CERT_FinishExtensions CERT_FormatName CERT_FreeDistNames CERT_FreeNicknames CERT_GetAVATag CERT_GetCertChainFromCert CERT_GetCertEmailAddress CERT_GetCertificateNames CERT_GetCertificateRequestExtensions CERT_GetCertIssuerAndSN CERT_GetCertNicknames CERT_GetCertTrust CERT_GetCertUid CERT_GetCommonName CERT_GetCountryName CERT_GetDBContentVersion CERT_GetDefaultCertDB CERT_GetDomainComponentName CERT_GetFirstEmailAddress CERT_GetLocalityName CERT_GetNextEmailAddress CERT_GetNextGeneralName CERT_GetNextNameConstraint CERT_GetOCSPResponseStatus CERT_GetOCSPStatusForCertID CERT_GetOidString CERT_GetOrgName CERT_GetOrgUnitName CERT_GetOCSPAuthorityInfoAccessLocation CERT_GetPrevGeneralName CERT_GetPrevNameConstraint CERT_GetSlopTime CERT_GetSSLCACerts CERT_GetStateName CERT_GenTime2FormattedAscii CERT_Hexify CERT_ImportCAChain CERT_ImportCerts CERT_IsRootDERCert CERT_IsUserCert CERT_KeyFromDERCrl CERT_MakeCANickname CERT_MergeExtensions CERT_NameToAscii CERT_NewCertList CERT_NicknameStringsFromCertList CERT_OpenCertDBFilename CERT_RemoveCertListNode CERT_RFC1485_EscapeAndQuote CERT_SaveSMimeProfile CERT_SetSlopTime CERT_StartCertExtensions CERT_StartCertificateRequestAttributes CERT_StartCRLEntryExtensions CERT_StartCRLExtensions CERT_UncacheCRL CERT_VerifyCertName CERT_VerifyCACertForUsage CERT_VerifyCert CERT_VerifyCertificate CERT_VerifyCertificateNow CERT_VerifyCertNow CERT_VerifyOCSPResponseSignature CERT_VerifySignedData CERT_VerifySignedDataWithPublicKey CERT_VerifySignedDataWithPublicKeyInfo NSS_CmpCertChainWCANames NSS_FindCertKEAType PK11_AlgtagToMechanism PK11_Authenticate PK11_BlockData PK11_ChangePW PK11_CheckUserPassword PK11_CipherOp PK11_CloneContext PK11_ConfigurePKCS11 PK11_ConvertSessionPrivKeyToTokenPrivKey PK11_ConvertSessionSymKeyToTokenSymKey PK11_CopyTokenPrivKeyToSessionPrivKey PK11_CreateContextBySymKey PK11_CreateDigestContext PK11_CreatePBEAlgorithmID PK11_DeleteTokenPrivateKey PK11_DeleteTokenPublicKey PK11_DeleteTokenSymKey PK11_Derive PK11_DeriveWithFlags PK11_DeriveWithFlagsPerm PK11_DestroyContext PK11_DestroyGenericObject PK11_DestroyGenericObjects PK11_DestroyObject PK11_DestroyTokenObject PK11_DigestBegin PK11_DigestKey PK11_DigestOp PK11_DigestFinal PK11_DoesMechanism PK11_ExportEncryptedPrivateKeyInfo PK11_ExportEncryptedPrivKeyInfo PK11_ExportPrivateKeyInfo PK11_Finalize PK11_FindBestKEAMatch PK11_FindCertAndKeyByRecipientList PK11_FindCertAndKeyByRecipientListNew PK11_FindCertByIssuerAndSN PK11_FindCertFromDERCert PK11_FindCertFromNickname PK11_FindCertInSlot PK11_FindGenericObjects PK11_FindFixedKey PK11_FindKeyByAnyCert PK11_FindKeyByDERCert PK11_FindPrivateKeyFromCert PK11_FindSlotByName PK11_FindSlotsByNames PK11_FortezzaHasKEA PK11_FortezzaMapSig PK11_FreeSlot PK11_FreeSlotList PK11_FreeSlotListElement PK11_FreeSymKey PK11_GenerateFortezzaIV PK11_GenerateKeyPair PK11_GenerateKeyPairWithFlags PK11_GenerateNewParam PK11_GenerateRandom PK11_GenerateRandomOnSlot PK11_GetAllTokens PK11_GetBestKeyLength PK11_GetBestSlot PK11_GetBestSlotMultiple PK11_GetBestWrapMechanism PK11_GetBlockSize PK11_GetCertFromPrivateKey PK11_GetCurrentWrapIndex PK11_GetDefaultArray PK11_GetDefaultFlags PK11_GetDisabledReason PK11_GetFirstSafe PK11_GetInternalKeySlot PK11_GetInternalSlot PK11_GetKeyGen PK11_GetKeyLength PK11_GetKeyStrength PK11_GetMechanism PK11_GetMinimumPwdLength PK11_GetModInfo PK11_GetModule PK11_GetModuleID PK11_GetNextGenericObject PK11_GetNextSafe PK11_GetNextSymKey PK11_GetPadMechanism PK11_GetPBEIV PK11_GetPQGParamsFromPrivateKey PK11_GetPrevGenericObject PK11_GetPrivateKeyNickname PK11_GetPrivateModulusLen PK11_GetPublicKeyNickname PK11_GetSlotFromKey PK11_GetSlotFromPrivateKey PK11_GetSlotID PK11_GetSlotInfo PK11_GetSlotName PK11_GetSlotSeries PK11_GetSymKeyNickname PK11_GetSymKeyType PK11_GetSymKeyUserData PK11_GetTokenInfo PK11_GetTokenName PK11_GetWindow PK11_GetWrapKey PK11_HashBuf PK11_HasRootCerts PK11_ImportCert PK11_ImportCertForKeyToSlot PK11_ImportCRL PK11_ImportDERCert PK11_ImportDERPrivateKeyInfoAndReturnKey PK11_ImportEncryptedPrivateKeyInfo PK11_ImportPrivateKeyInfo PK11_ImportPrivateKeyInfoAndReturnKey PK11_ImportPublicKey PK11_ImportSymKeyWithFlags PK11_InitPin PK11_IsFIPS PK11_IsDisabled PK11_IsFriendly PK11_IsHW PK11_IsInternal PK11_IsPresent PK11_IsReadOnly PK11_IVFromParam PK11_KeyGen PK11_LinkGenericObject PK11_ListCerts PK11_ListFixedKeysInSlot PK11_ListPrivKeysInSlot PK11_ListPublicKeysInSlot PK11_LoadPrivKey PK11_LogoutAll PK11_MakeKEAPubKey PK11_MapPBEMechanismToCryptoMechanism PK11_MapSignKeyType PK11_MechanismToAlgtag PK11_MoveSymKey PK11_NeedLogin PK11_NeedUserInit PK11_ParamFromIV PK11_ParamFromAlgid PK11_ParamToAlgid PK11_PBEKeyGen PK11_PrivDecryptPKCS1 PK11_ProtectedAuthenticationPath PK11_PubDecryptRaw PK11_PubDerive PK11_PubDeriveWithKDF PK11_PubEncryptPKCS1 PK11_PubEncryptRaw PK11_PubUnwrapSymKey PK11_PubUnwrapSymKeyWithFlags PK11_PubUnwrapSymKeyWithFlagsPerm PK11_PubWrapSymKey PK11_RandomUpdate PK11_ReadRawAttribute PK11_ReferenceSymKey PK11_ResetToken PK11_RestoreContext PK11_SaveContext PK11_SaveContextAlloc PK11_SetFortezzaHack PK11_SetPasswordFunc PK11_SetPrivateKeyNickname PK11_SetPublicKeyNickname PK11_SetSlotPWValues PK11_SetSymKeyNickname PK11_SetSymKeyUserData PK11_SetWrapKey PK11_Sign PK11_SignatureLen PK11_SymKeyFromHandle PK11_TokenExists PK11_TokenKeyGen PK11_TokenKeyGenWithFlags PK11_TokenRefresh PK11_TraverseCertsForNicknameInSlot PK11_TraverseCertsForSubjectInSlot PK11_TraverseSlotCerts PK11_UnlinkGenericObject PK11_UnwrapSymKey PK11_UnwrapSymKeyWithFlags PK11_UnwrapSymKeyWithFlagsPerm PK11_UpdateSlotAttribute PK11_UserEnableSlot PK11_UserDisableSlot PK11_Verify PK11_VerifyKeyOK PK11_WaitForTokenEvent PK11_WrapSymKey PK11SDR_Encrypt PK11SDR_Decrypt SEC_DeletePermCertificate SEC_DeletePermCRL SEC_DerSignData SEC_DestroyCrl SEC_FindCrlByDERCert SEC_FindCrlByName SEC_LookupCrls SEC_NewCrl SEC_QuickDERDecodeItem SECKEY_CacheStaticFlags SECKEY_ConvertToPublicKey SECKEY_CopyPrivateKey SECKEY_CopyPublicKey SECKEY_CopySubjectPublicKeyInfo SECKEY_CreateDHPrivateKey SECKEY_CreateECPrivateKey SECKEY_CreateSubjectPublicKeyInfo SECKEY_DecodeDERSubjectPublicKeyInfo SECKEY_DestroyPrivateKey SECKEY_DestroyPublicKeyList SECKEY_DestroySubjectPublicKeyInfo SECKEY_GetPublicKeyType SECKEY_PublicKeyStrengthInBits SECKEY_SignatureLen ATOB_AsciiToData ATOB_ConvertAsciiToItem BTOA_ConvertItemToAscii BTOA_DataToAscii DER_AsciiToTime DER_DecodeTimeChoice DER_Encode DER_EncodeTimeChoice DER_GeneralizedTimeToTime DER_GetInteger DER_Lengths DER_TimeToUTCTime DER_UTCDayToAscii DER_UTCTimeToAscii DER_UTCTimeToTime DSAU_DecodeDerSig DSAU_DecodeDerSigToLen DSAU_EncodeDerSig DSAU_EncodeDerSigWithLen HASH_Begin HASH_Clone HASH_Create HASH_Destroy HASH_End HASH_GetHashObject HASH_GetHashObjectByOidTag HASH_GetHashTypeByOidTag HASH_HashBuf HASH_ResultLen HASH_ResultLenByOidTag HASH_ResultLenContext HASH_Update NSS_Init NSS_Initialize NSS_InitReadWrite NSS_IsInitialized NSS_NoDBInit NSS_PutEnv NSS_RegisterShutdown NSS_Shutdown NSS_UnregisterShutdown NSS_VersionCheck NSSBase64_DecodeBuffer NSSBase64Decoder_Create NSSBase64Decoder_Destroy NSSBase64Decoder_Update NSSBase64_EncodeItem NSSBase64Encoder_Create NSSBase64Encoder_Destroy NSSBase64Encoder_Update NSSRWLock_Destroy NSSRWLock_HaveWriteLock NSSRWLock_LockRead NSSRWLock_LockWrite NSSRWLock_New NSSRWLock_UnlockRead NSSRWLock_UnlockWrite NSSSMIME_VersionCheck PORT_Alloc PORT_ArenaAlloc PORT_ArenaGrow PORT_ArenaMark PORT_ArenaRelease PORT_ArenaStrdup PORT_ArenaUnmark PORT_ArenaZAlloc PORT_Free PORT_FreeArena PORT_GetError PORT_NewArena PORT_Realloc PORT_SetError PORT_SetUCS2_ASCIIConversionFunction PORT_SetUCS2_UTF8ConversionFunction PORT_SetUCS4_UTF8ConversionFunction PORT_Strdup PORT_UCS2_ASCIIConversion PORT_UCS2_UTF8Conversion PORT_ZAlloc PORT_ZFree RSA_FormatBlock SEC_ASN1Decode SEC_ASN1DecodeInteger SEC_ASN1DecodeItem SEC_ASN1DecoderAbort SEC_ASN1DecoderClearFilterProc SEC_ASN1DecoderClearNotifyProc SEC_ASN1DecoderFinish SEC_ASN1DecoderSetFilterProc SEC_ASN1DecoderSetNotifyProc SEC_ASN1DecoderStart SEC_ASN1DecoderUpdate SEC_ASN1Encode SEC_ASN1EncodeInteger SEC_ASN1EncodeItem SEC_ASN1EncoderAbort SEC_ASN1EncoderClearNotifyProc SEC_ASN1EncoderClearStreaming SEC_ASN1EncoderClearTakeFromBuf SEC_ASN1EncoderFinish SEC_ASN1EncoderSetNotifyProc SEC_ASN1EncoderSetStreaming SEC_ASN1EncoderSetTakeFromBuf SEC_ASN1EncoderStart SEC_ASN1EncoderUpdate SEC_ASN1EncodeUnsignedInteger SEC_ASN1LengthLength SEC_DupCrl SEC_GetSignatureAlgorithmOidTag SEC_PKCS5GetCryptoAlgorithm SEC_PKCS5GetKeyLength SEC_PKCS5GetPBEAlgorithm SEC_PKCS5IsAlgorithmPBEAlg SEC_RegisterDefaultHttpClient SEC_SignData SECITEM_AllocItem SECITEM_ArenaDupItem SECITEM_CompareItem SECITEM_CopyItem SECITEM_DupItem SECITEM_FreeItem SECITEM_ItemsAreEqual SECITEM_ZfreeItem SECKEY_CopyEncryptedPrivateKeyInfo SECKEY_CopyPrivateKeyInfo SECKEY_CreateRSAPrivateKey SECKEY_DestroyEncryptedPrivateKeyInfo SECKEY_DestroyPrivateKeyInfo SECKEY_DestroyPublicKey SECKEY_PublicKeyStrength SECKEY_UpdateCertPQG SECMOD_AddNewModule SECMOD_AddNewModuleEx SECMOD_CancelWait SECMOD_CanDeleteInternalModule SECMOD_CreateModule SECMOD_DeleteModule SECMOD_FindModule SECMOD_FindSlot SECMOD_FreeModuleSpecList SECMOD_GetDBModuleList SECMOD_GetDeadModuleList SECMOD_GetModuleSpecList SECMOD_HasRemovableSlots SECMOD_IsModulePresent SECMOD_LoadModule SECMOD_LoadUserModule SECMOD_LookupSlot SECMOD_PubCipherFlagstoInternal SECMOD_PubMechFlagstoInternal SECMOD_UnloadUserModule SECMOD_UpdateModule SECMOD_UpdateSlotList SECMOD_WaitForAnyTokenEvent SECOID_AddEntry SECOID_CompareAlgorithmID SECOID_CopyAlgorithmID SECOID_DestroyAlgorithmID SECOID_FindOID SECOID_FindOIDByTag SECOID_FindOIDTag SECOID_FindOIDTagDescription SECOID_GetAlgorithmTag SECOID_SetAlgorithmID SGN_Begin SGN_CompareDigestInfo SGN_CopyDigestInfo SGN_CreateDigestInfo SGN_DestroyContext SGN_DestroyDigestInfo SGN_Digest SGN_End SGN_NewContext SGN_Update VFY_Begin VFY_CreateContext VFY_DestroyContext VFY_End VFY_Update VFY_VerifyData VFY_VerifyDigest NSS_CMSContentInfo_GetBulkKey NSS_CMSContentInfo_GetBulkKeySize NSS_CMSContentInfo_GetContent NSS_CMSContentInfo_GetContentEncAlgTag NSS_CMSContentInfo_GetContentTypeTag NSS_CMSContentInfo_SetBulkKey NSS_CMSContentInfo_SetContent NSS_CMSContentInfo_SetContent_Data NSS_CMSContentInfo_SetContentEncAlg NSS_CMSContentInfo_SetContent_DigestedData NSS_CMSContentInfo_SetContent_EncryptedData NSS_CMSContentInfo_SetContent_EnvelopedData NSS_CMSContentInfo_SetContent_SignedData NSS_CMSDecoder_Cancel NSS_CMSDecoder_Finish NSS_CMSDecoder_Start NSS_CMSDecoder_Update NSS_CMSDigestContext_Cancel NSS_CMSDigestContext_FinishMultiple NSS_CMSDigestContext_FinishSingle NSS_CMSDigestContext_StartMultiple NSS_CMSDigestContext_StartSingle NSS_CMSDigestContext_Update NSS_CMSDigestedData_Create NSS_CMSDigestedData_Destroy NSS_CMSDigestedData_GetContentInfo NSS_CMSDEREncode NSS_CMSEncoder_Cancel NSS_CMSEncoder_Finish NSS_CMSEncoder_Start NSS_CMSEncoder_Update NSS_CMSEncryptedData_Create NSS_CMSEncryptedData_Destroy NSS_CMSEncryptedData_GetContentInfo NSS_CMSEnvelopedData_AddRecipient NSS_CMSEnvelopedData_Create NSS_CMSEnvelopedData_Destroy NSS_CMSEnvelopedData_GetContentInfo NSS_CMSMessage_ContentLevel NSS_CMSMessage_ContentLevelCount NSS_CMSMessage_Copy NSS_CMSMessage_Create NSS_CMSMessage_CreateFromDER NSS_CMSMessage_Destroy NSS_CMSMessage_GetContent NSS_CMSMessage_GetContentInfo NSS_CMSMessage_IsEncrypted NSS_CMSMessage_IsSigned NSS_CMSRecipientInfo_Create NSS_CMSRecipientInfo_CreateFromDER NSS_CMSRecipientInfo_CreateNew NSS_CMSRecipientInfo_CreateWithSubjKeyID NSS_CMSRecipientInfo_CreateWithSubjKeyIDFromCert NSS_CMSRecipientInfo_Destroy NSS_CMSRecipientInfo_Encode NSS_CMSRecipientInfo_GetCertAndKey NSS_CMSRecipientInfo_UnwrapBulkKey NSS_CMSRecipientInfo_WrapBulkKey NSS_CMSSignedData_AddCertChain NSS_CMSSignedData_AddCertList NSS_CMSSignedData_AddCertificate NSS_CMSSignedData_AddDigest NSS_CMSSignedData_AddSignerInfo NSS_CMSSignedData_Create NSS_CMSSignedData_CreateCertsOnly NSS_CMSSignedData_Destroy NSS_CMSSignedData_GetContentInfo NSS_CMSSignedData_GetDigestAlgs NSS_CMSSignedData_GetSignerInfo NSS_CMSSignedData_HasDigests NSS_CMSSignedData_ImportCerts NSS_CMSSignedData_SetDigests NSS_CMSSignedData_SetDigestValue NSS_CMSSignedData_SignerInfoCount NSS_CMSSignedData_VerifyCertsOnly NSS_CMSSignedData_VerifySignerInfo NSS_CMSSignerInfo_AddMSSMIMEEncKeyPrefs NSS_CMSSignerInfo_AddSMIMECaps NSS_CMSSignerInfo_AddSMIMEEncKeyPrefs NSS_CMSSignerInfo_AddSigningTime NSS_CMSSignerInfo_Create NSS_CMSSignerInfo_CreateWithSubjKeyID NSS_CMSSignerInfo_Destroy NSS_CMSSignerInfo_GetCertList NSS_CMSSignerInfo_GetSignerCommonName NSS_CMSSignerInfo_GetSignerEmailAddress NSS_CMSSignerInfo_GetSigningCertificate NSS_CMSSignerInfo_GetSigningTime NSS_CMSSignerInfo_GetVerificationStatus NSS_CMSSignerInfo_GetVersion NSS_CMSSignerInfo_IncludeCerts NSS_CMSUtil_VerificationStatusToString NSS_SMIMESignerInfo_SaveSMIMEProfile NSS_SMIMEUtil_FindBulkAlgForRecipients SEC_PKCS7AddCertificate SEC_PKCS7AddRecipient SEC_PKCS7AddSigningTime SEC_PKCS7ContainsCertsOrCrls SEC_PKCS7ContentIsEncrypted SEC_PKCS7ContentIsSigned SEC_PKCS7ContentType SEC_PKCS7CopyContentInfo SEC_PKCS7CreateCertsOnly SEC_PKCS7CreateData SEC_PKCS7CreateEncryptedData SEC_PKCS7CreateEnvelopedData SEC_PKCS7CreateSignedData SEC_PKCS7DecodeItem SEC_PKCS7DecoderAbort SEC_PKCS7DecoderFinish SEC_PKCS7DecoderStart SEC_PKCS7DecoderUpdate SEC_PKCS7DecryptContents SEC_PKCS7DestroyContentInfo SEC_PKCS7Encode SEC_PKCS7EncodeItem SEC_PKCS7EncoderAbort SEC_PKCS7EncoderFinish SEC_PKCS7EncoderStart SEC_PKCS7EncoderUpdate SEC_PKCS7GetCertificateList SEC_PKCS7GetContent SEC_PKCS7GetEncryptionAlgorithm SEC_PKCS7GetSignerCommonName SEC_PKCS7GetSignerEmailAddress SEC_PKCS7GetSigningTime SEC_PKCS7IncludeCertChain SEC_PKCS7IsContentEmpty SEC_PKCS7SetContent SEC_PKCS7VerifyDetachedSignature SEC_PKCS7VerifySignature SECMIME_DecryptionAllowed SEC_PKCS12AddCertAndKey SEC_PKCS12AddPasswordIntegrity SEC_PKCS12CreateExportContext SEC_PKCS12CreatePasswordPrivSafe SEC_PKCS12CreateUnencryptedSafe SEC_PKCS12DecoderFinish SEC_PKCS12DecoderGetCerts SEC_PKCS12DecoderImportBags SEC_PKCS12DecoderIterateInit SEC_PKCS12DecoderIterateNext SEC_PKCS12DecoderSetTargetTokenCAs SEC_PKCS12DecoderStart SEC_PKCS12DecoderUpdate SEC_PKCS12DecoderValidateBags SEC_PKCS12DecoderVerify SEC_PKCS12DestroyExportContext SEC_PKCS12EnableCipher SEC_PKCS12Encode SEC_PKCS12IsEncryptionAllowed&lt;br /&gt;
&lt;br /&gt;
2nd Group – Use this to highlight fixes&lt;br /&gt;
* Foreground color – green&lt;br /&gt;
* Font style - bold&lt;br /&gt;
* Background color – white&lt;br /&gt;
* Prefix mode – make sure this is set (checked)&lt;br /&gt;
* mysql_real_escape_string&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Comment &amp;amp; Number&lt;br /&gt;
* Comment line&lt;br /&gt;
* Foreground color – light grey&lt;br /&gt;
* Treat keyword as symbol&lt;br /&gt;
* // #&lt;br /&gt;
&lt;br /&gt;
Comment Block&lt;br /&gt;
* Foreground color – light grey&lt;br /&gt;
* Treat keyword as symbol&lt;br /&gt;
* Comment open - /*&lt;br /&gt;
* Comment close - */&lt;br /&gt;
&lt;br /&gt;
Save As&lt;br /&gt;
* PHP4, 5 SCA&lt;br /&gt;
&lt;br /&gt;
Then, when one opens a file using the new &amp;quot;language&amp;quot;, starting from the suspected highlighted finding, one can double click on the parameters and return values of suspect functions, then keep selecting variables and return values as you trace through the code, using the highlighting all instances function and so on to expidite your review.&lt;br /&gt;
&lt;br /&gt;
Here it is in action:&lt;br /&gt;
&lt;br /&gt;
[[Image:Npp-eg.JPG]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Verification Standard Project]]&lt;br /&gt;
[[Category:How To]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Man_vs._Code&amp;diff=125743</id>
		<title>Man vs. Code</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Man_vs._Code&amp;diff=125743"/>
				<updated>2012-03-08T08:21:20Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''UPDATE: I have proposed a &amp;quot;Sticky&amp;quot; Marking When Smart Highlighting enhancement to the Notepad++ team: when one is selecting a word character-by-character, allow one to do this multiple times, without clearing the previous selected (and now smart-highlighted) sets of words. Then, clear all marks when double click on any other word. Double-click smart-highlighting functionality remains the same as it was before. This allows one to follow variable assignments through the code more easily. This change allows one to select the original variable, then select a new variable that the old variable is now assigned to, and so on. If you're interested in the details contact mike.boberski@owasp.org. If you'd like an already built version with the changes to copy over after you've installed, you can find it [http://www.owasp.org/index.php/File:Notepad%2B%2B.zip here]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Man-v-code.gif|right]]&lt;br /&gt;
Tools such as source code review tools are expensive. Let me rephrase. They cost as much as a house! Feeling like you just stepped into a survivalist reality show, after being asked to perform a review using for example [http://www.owasp.org/index.php/ASVS OWASP ASVS]? You need tools, and you need them now. You also need tools more useful than for example RATS (Rough Auditing Tool for Security). &lt;br /&gt;
&lt;br /&gt;
Tools such as RATS even if their rules are beefed up are still not a fast way to do a code review. If you accept the premise that when performing a code review, one should do at least a minimal check for both false positives and false negatives, then regardless of tool, you still need to go through each and every source file even if only for a cursory inspection. This is where source code review tools shine, their IDE-like GUIs allow you to jump through the code interactively in a very efficient way. This is why tools such as RATS are pretty much useless. You need to be able to easily jump through the code and follow data from sources to sinks a lot more than you need an initial count of some huge number of potential findings! &lt;br /&gt;
&lt;br /&gt;
With the above in mind, here's one way to fashion a basic, efficient source code review tool (in this case, for PHP source) using a little bit of research and some freely-available tools in perhaps unexpected ways. The basic idea is to use Notepad++ and Its “User Defined Language” Feature. It can be downloaded here: http://notepad-plus.sourceforge.net So, go and do that. The ability to define one’s language using Notepad++ configuration interfaces,  its syntax highlighting, and the ability to highlight variables throughout by default after selecting them, provides the basis for a way to search file-by-file for security-related flaws. E.g. create a new “PHP 4, 5 SCA” language. You'll also want to use a grep tool and also open up the PHP web site so you can search for function/language definitions http://us2.php.net/manual/en/ Also, install the “Explorer” plugin (copy to its plugins directory, download from http://sourceforge.net/project/showfiles.php?group_id=189927&amp;amp;package_id=223667 then enable it using the “Plugins” menu&lt;br /&gt;
&lt;br /&gt;
Then, based on looking for function and other keywords related to input, SQL, sessions, URLs, files, etc. one can mine documents for relevant keywords, e.g.:&lt;br /&gt;
&lt;br /&gt;
* http://us2.php.net/manual/en/reserved.variables.php&lt;br /&gt;
* http://us2.php.net/manual/en/book.mysql.php&lt;br /&gt;
* http://us2.php.net/manual/en/book.hash.php&lt;br /&gt;
* http://us2.php.net/manual/en/refs.fileprocess.file.php&lt;br /&gt;
* http://us2.php.net/manual/en/book.mail.php&lt;br /&gt;
* http://us2.php.net/manual/en/book.session.php&lt;br /&gt;
* http://us2.php.net/manual/en/features.cookies.php&lt;br /&gt;
* http://us2.php.net/manual/en/ref.url.php&lt;br /&gt;
* Chris Shiflett, Essential PHP Security (O’Reilly Media, Inc., 2005).&lt;br /&gt;
* http://www.fortify.com/vulncat/en/vulncat/index.html&lt;br /&gt;
&lt;br /&gt;
Next, configure Notepad++ to create a new PHP static analysis language:&lt;br /&gt;
&lt;br /&gt;
Select “View” menu, then “User Define Dialog” menu item, then “Dock” button&lt;br /&gt;
&lt;br /&gt;
Ext:&lt;br /&gt;
*Set to php (no period!)&lt;br /&gt;
&lt;br /&gt;
Folder &amp;amp; Default&lt;br /&gt;
* Font name – Consolas&lt;br /&gt;
&lt;br /&gt;
Keywords Lists - Use your research here!&lt;br /&gt;
&lt;br /&gt;
1st Group - Use this to find potential problems&lt;br /&gt;
* Foreground color – red&lt;br /&gt;
* Background color – white&lt;br /&gt;
* Font style - bold&lt;br /&gt;
* Prefix mode – make sure this is set (checked)&lt;br /&gt;
&lt;br /&gt;
PHP Example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$GLOBALS $_SERVER $_GET $_POST $_FILES $_REQUEST $_SESSION $_ENV $_COOKIE $php_errormsg $HTTP_RAW_POST_DATA $http_response_header $argc $argv mysql_ hash_ basename chgrp chmod chown clearstatcache copy delete dirname disk_free_space disk_total_space diskfreespace fclose feof fflush fgetc fgetcsv fgets fgetss file_exists file_get_contents file_put_contents file fileatime filectime filegroup fileinode filemtime fileowner fileperms filesize filetype flock fnmatch fopen fpassthru fputcsv fputs fread fscanf fseek fstat ftell ftruncate fwrite glob is_dir is_executable is_file is_link is_readable is_uploaded_file is_writable is_writeable lchgrp lchown link linkinfo lstat mkdir move_uploaded_file parse_ini_file parse_ini_string pathinfo pclose popen readfile readlink realpath rename rewind rmdir set_file_buffer stat symlink tempnam tmpfile touch umask  unlink mail session_ setcookie setrawcookie header ob_ output_ base64_ get_headers get_meta_tags http_build_query parse_url rawurlecode urldecode urlencode ini_set error_log allow_url_fopen disable_functions display_errors enable_dl error_reporting file_uploads log_errors magic_quotes_gpc memory_limit open_basedir register_globals safe_mode eval exec file file_get_contents fopen include passthru phpinfo popen preg_replace proc_open readfile require shell_exec system $password mcrypt_ return echo &amp;lt;?php &amp;lt;? md5 ldap_ @ trigger_error print error_reporting display_errors &amp;lt;form Ajax.Request preg_replace htmlspecialchars hidden &amp;lt;input rand srand mt_srand mt_rand file extract href mysqli &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NSS (v3.12.4) Example:&lt;br /&gt;
&lt;br /&gt;
* NSS_GetClientAuthData NSS_SetDomesticPolicy NSS_SetExportPolicy NSS_SetFrancePolicy NSSSSL_VersionCheck SSL_AuthCertificate SSL_AuthCertificateHook SSL_BadCertHook SSL_CertDBHandleSet SSL_CipherPolicyGet SSL_CipherPolicySet SSL_CipherPrefGet SSL_CipherPrefGetDefault SSL_CipherPrefSet SSL_CipherPrefSetDefault SSL_ClearSessionCache SSL_ConfigMPServerSIDCache SSL_ConfigSecureServer SSL_ConfigServerSessionIDCache SSL_DataPending SSL_ForceHandshake SSL_ForceHandshakeWithTimeout SSL_GetChannelInfo SSL_GetCipherSuiteInfo SSL_GetClientAuthDataHook SSL_GetMaxServerCacheLocks SSL_GetSessionID SSL_GetStatistics SSL_HandshakeCallback SSL_ImportFD SSL_InheritMPServerSIDCache SSL_InvalidateSession SSL_LocalCertificate SSL_OptionGet SSL_OptionGetDefault SSL_OptionSet SSL_OptionSetDefault SSL_PeerCertificate SSL_PreencryptedFileToStream SSL_PreencryptedStreamToFile SSL_ReHandshake SSL_ReHandshakeWithTimeout SSL_ResetHandshake SSL_RestartHandshakeAfterCertReq SSL_RestartHandshakeAfterServerCert SSL_RevealCert SSL_RevealPinArg SSL_RevealURL SSL_SecurityStatus SSL_SetMaxServerCacheLocks SSL_SetPKCS11PinArg SSL_SetSockPeerID SSL_SetURL SSL_ShutdownServerSessionIDCache SSL_Enable SSL_EnableCipher SSL_EnableDefault SSL_RedoHandshake SSL_SetPolicy CERT_AddCertToListTail CERT_AddExtension CERT_AddOCSPAcceptableResponses CERT_AddOKDomainName CERT_AddRDN CERT_AsciiToName CERT_CacheCRL CERT_CertChainFromCert CERT_CertListFromCert CERT_CertTimesValid CERT_ChangeCertTrust CERT_CheckCertValidTimes CERT_CheckCertUsage CERT_CompareName CERT_CompareValidityTimes CERT_CompleteCRLDecodeEntries CERT_ConvertAndDecodeCertificate CERT_CopyName CERT_CopyRDN CERT_CreateAVA CERT_CreateCertificate CERT_CreateCertificateRequest CERT_CreateName CERT_CreateOCSPCertID CERT_CreateOCSPRequest CERT_CreateRDN CERT_CreateSubjectCertList CERT_CreateValidity CERT_CRLCacheRefreshIssuer CERT_DecodeAltNameExtension CERT_DecodeAuthInfoAccessExtension CERT_DecodeAuthKeyID CERT_DecodeAVAValue CERT_DecodeBasicConstraintValue CERT_DecodeCertFromPackage CERT_DecodeCertificatePoliciesExtension CERT_DecodeCertPackage CERT_DecodeCRLDistributionPoints CERT_DecodeDERCrl CERT_DecodeDERCrlWithFlags CERT_DecodeGeneralName CERT_DecodeNameConstraintsExtension CERT_DecodeOCSPResponse CERT_DecodeOidSequence CERT_DecodePrivKeyUsagePeriodExtension CERT_DecodeTrustString CERT_DecodeUserNotice CERT_DerNameToAscii CERT_DestroyCertArray CERT_DestroyCertificate CERT_DestroyCertificateList CERT_DestroyCertificatePoliciesExtension CERT_DestroyCertificateRequest CERT_DestroyCertList CERT_DestroyName CERT_DestroyOCSPCertID CERT_DestroyOCSPRequest CERT_DestroyOCSPResponse CERT_DestroyOidSequence CERT_DestroyUserNotice CERT_DestroyValidity CERT_DupCertificate CERT_DupCertList CERT_EnableOCSPChecking CERT_EncodeAltNameExtension CERT_EncodeAndAddBitStrExtension CERT_EncodeAuthKeyID CERT_EncodeBasicConstraintValue CERT_EncodeCRLDistributionPoints CERT_EncodeGeneralName CERT_EncodeOCSPRequest CERT_ExtractPublicKey CERT_FindCertByName CERT_FilterCertListByCANames CERT_FilterCertListByUsage CERT_FilterCertListForUserCerts CERT_FindCertByDERCert CERT_FindCertByIssuerAndSN CERT_FindCertByNickname CERT_FindCertByNicknameOrEmailAddr CERT_FindCertBySubjectKeyID CERT_FindCertExtension CERT_FindCertIssuer CERT_FindKeyUsageExtension CERT_FindSMimeProfile CERT_FindSubjectKeyIDExtension CERT_FindUserCertByUsage CERT_FindUserCertsByUsage CERT_FinishCertificateRequestAttributes CERT_FinishExtensions CERT_FormatName CERT_FreeDistNames CERT_FreeNicknames CERT_GetAVATag CERT_GetCertChainFromCert CERT_GetCertEmailAddress CERT_GetCertificateNames CERT_GetCertificateRequestExtensions CERT_GetCertIssuerAndSN CERT_GetCertNicknames CERT_GetCertTrust CERT_GetCertUid CERT_GetCommonName CERT_GetCountryName CERT_GetDBContentVersion CERT_GetDefaultCertDB CERT_GetDomainComponentName CERT_GetFirstEmailAddress CERT_GetLocalityName CERT_GetNextEmailAddress CERT_GetNextGeneralName CERT_GetNextNameConstraint CERT_GetOCSPResponseStatus CERT_GetOCSPStatusForCertID CERT_GetOidString CERT_GetOrgName CERT_GetOrgUnitName CERT_GetOCSPAuthorityInfoAccessLocation CERT_GetPrevGeneralName CERT_GetPrevNameConstraint CERT_GetSlopTime CERT_GetSSLCACerts CERT_GetStateName CERT_GenTime2FormattedAscii CERT_Hexify CERT_ImportCAChain CERT_ImportCerts CERT_IsRootDERCert CERT_IsUserCert CERT_KeyFromDERCrl CERT_MakeCANickname CERT_MergeExtensions CERT_NameToAscii CERT_NewCertList CERT_NicknameStringsFromCertList CERT_OpenCertDBFilename CERT_RemoveCertListNode CERT_RFC1485_EscapeAndQuote CERT_SaveSMimeProfile CERT_SetSlopTime CERT_StartCertExtensions CERT_StartCertificateRequestAttributes CERT_StartCRLEntryExtensions CERT_StartCRLExtensions CERT_UncacheCRL CERT_VerifyCertName CERT_VerifyCACertForUsage CERT_VerifyCert CERT_VerifyCertificate CERT_VerifyCertificateNow CERT_VerifyCertNow CERT_VerifyOCSPResponseSignature CERT_VerifySignedData CERT_VerifySignedDataWithPublicKey CERT_VerifySignedDataWithPublicKeyInfo NSS_CmpCertChainWCANames NSS_FindCertKEAType PK11_AlgtagToMechanism PK11_Authenticate PK11_BlockData PK11_ChangePW PK11_CheckUserPassword PK11_CipherOp PK11_CloneContext PK11_ConfigurePKCS11 PK11_ConvertSessionPrivKeyToTokenPrivKey PK11_ConvertSessionSymKeyToTokenSymKey PK11_CopyTokenPrivKeyToSessionPrivKey PK11_CreateContextBySymKey PK11_CreateDigestContext PK11_CreatePBEAlgorithmID PK11_DeleteTokenPrivateKey PK11_DeleteTokenPublicKey PK11_DeleteTokenSymKey PK11_Derive PK11_DeriveWithFlags PK11_DeriveWithFlagsPerm PK11_DestroyContext PK11_DestroyGenericObject PK11_DestroyGenericObjects PK11_DestroyObject PK11_DestroyTokenObject PK11_DigestBegin PK11_DigestKey PK11_DigestOp PK11_DigestFinal PK11_DoesMechanism PK11_ExportEncryptedPrivateKeyInfo PK11_ExportEncryptedPrivKeyInfo PK11_ExportPrivateKeyInfo PK11_Finalize PK11_FindBestKEAMatch PK11_FindCertAndKeyByRecipientList PK11_FindCertAndKeyByRecipientListNew PK11_FindCertByIssuerAndSN PK11_FindCertFromDERCert PK11_FindCertFromNickname PK11_FindCertInSlot PK11_FindGenericObjects PK11_FindFixedKey PK11_FindKeyByAnyCert PK11_FindKeyByDERCert PK11_FindPrivateKeyFromCert PK11_FindSlotByName PK11_FindSlotsByNames PK11_FortezzaHasKEA PK11_FortezzaMapSig PK11_FreeSlot PK11_FreeSlotList PK11_FreeSlotListElement PK11_FreeSymKey PK11_GenerateFortezzaIV PK11_GenerateKeyPair PK11_GenerateKeyPairWithFlags PK11_GenerateNewParam PK11_GenerateRandom PK11_GenerateRandomOnSlot PK11_GetAllTokens PK11_GetBestKeyLength PK11_GetBestSlot PK11_GetBestSlotMultiple PK11_GetBestWrapMechanism PK11_GetBlockSize PK11_GetCertFromPrivateKey PK11_GetCurrentWrapIndex PK11_GetDefaultArray PK11_GetDefaultFlags PK11_GetDisabledReason PK11_GetFirstSafe PK11_GetInternalKeySlot PK11_GetInternalSlot PK11_GetKeyGen PK11_GetKeyLength PK11_GetKeyStrength PK11_GetMechanism PK11_GetMinimumPwdLength PK11_GetModInfo PK11_GetModule PK11_GetModuleID PK11_GetNextGenericObject PK11_GetNextSafe PK11_GetNextSymKey PK11_GetPadMechanism PK11_GetPBEIV PK11_GetPQGParamsFromPrivateKey PK11_GetPrevGenericObject PK11_GetPrivateKeyNickname PK11_GetPrivateModulusLen PK11_GetPublicKeyNickname PK11_GetSlotFromKey PK11_GetSlotFromPrivateKey PK11_GetSlotID PK11_GetSlotInfo PK11_GetSlotName PK11_GetSlotSeries PK11_GetSymKeyNickname PK11_GetSymKeyType PK11_GetSymKeyUserData PK11_GetTokenInfo PK11_GetTokenName PK11_GetWindow PK11_GetWrapKey PK11_HashBuf PK11_HasRootCerts PK11_ImportCert PK11_ImportCertForKeyToSlot PK11_ImportCRL PK11_ImportDERCert PK11_ImportDERPrivateKeyInfoAndReturnKey PK11_ImportEncryptedPrivateKeyInfo PK11_ImportPrivateKeyInfo PK11_ImportPrivateKeyInfoAndReturnKey PK11_ImportPublicKey PK11_ImportSymKeyWithFlags PK11_InitPin PK11_IsFIPS PK11_IsDisabled PK11_IsFriendly PK11_IsHW PK11_IsInternal PK11_IsPresent PK11_IsReadOnly PK11_IVFromParam PK11_KeyGen PK11_LinkGenericObject PK11_ListCerts PK11_ListFixedKeysInSlot PK11_ListPrivKeysInSlot PK11_ListPublicKeysInSlot PK11_LoadPrivKey PK11_LogoutAll PK11_MakeKEAPubKey PK11_MapPBEMechanismToCryptoMechanism PK11_MapSignKeyType PK11_MechanismToAlgtag PK11_MoveSymKey PK11_NeedLogin PK11_NeedUserInit PK11_ParamFromIV PK11_ParamFromAlgid PK11_ParamToAlgid PK11_PBEKeyGen PK11_PrivDecryptPKCS1 PK11_ProtectedAuthenticationPath PK11_PubDecryptRaw PK11_PubDerive PK11_PubDeriveWithKDF PK11_PubEncryptPKCS1 PK11_PubEncryptRaw PK11_PubUnwrapSymKey PK11_PubUnwrapSymKeyWithFlags PK11_PubUnwrapSymKeyWithFlagsPerm PK11_PubWrapSymKey PK11_RandomUpdate PK11_ReadRawAttribute PK11_ReferenceSymKey PK11_ResetToken PK11_RestoreContext PK11_SaveContext PK11_SaveContextAlloc PK11_SetFortezzaHack PK11_SetPasswordFunc PK11_SetPrivateKeyNickname PK11_SetPublicKeyNickname PK11_SetSlotPWValues PK11_SetSymKeyNickname PK11_SetSymKeyUserData PK11_SetWrapKey PK11_Sign PK11_SignatureLen PK11_SymKeyFromHandle PK11_TokenExists PK11_TokenKeyGen PK11_TokenKeyGenWithFlags PK11_TokenRefresh PK11_TraverseCertsForNicknameInSlot PK11_TraverseCertsForSubjectInSlot PK11_TraverseSlotCerts PK11_UnlinkGenericObject PK11_UnwrapSymKey PK11_UnwrapSymKeyWithFlags PK11_UnwrapSymKeyWithFlagsPerm PK11_UpdateSlotAttribute PK11_UserEnableSlot PK11_UserDisableSlot PK11_Verify PK11_VerifyKeyOK PK11_WaitForTokenEvent PK11_WrapSymKey PK11SDR_Encrypt PK11SDR_Decrypt SEC_DeletePermCertificate SEC_DeletePermCRL SEC_DerSignData SEC_DestroyCrl SEC_FindCrlByDERCert SEC_FindCrlByName SEC_LookupCrls SEC_NewCrl SEC_QuickDERDecodeItem SECKEY_CacheStaticFlags SECKEY_ConvertToPublicKey SECKEY_CopyPrivateKey SECKEY_CopyPublicKey SECKEY_CopySubjectPublicKeyInfo SECKEY_CreateDHPrivateKey SECKEY_CreateECPrivateKey SECKEY_CreateSubjectPublicKeyInfo SECKEY_DecodeDERSubjectPublicKeyInfo SECKEY_DestroyPrivateKey SECKEY_DestroyPublicKeyList SECKEY_DestroySubjectPublicKeyInfo SECKEY_GetPublicKeyType SECKEY_PublicKeyStrengthInBits SECKEY_SignatureLen ATOB_AsciiToData ATOB_ConvertAsciiToItem BTOA_ConvertItemToAscii BTOA_DataToAscii DER_AsciiToTime DER_DecodeTimeChoice DER_Encode DER_EncodeTimeChoice DER_GeneralizedTimeToTime DER_GetInteger DER_Lengths DER_TimeToUTCTime DER_UTCDayToAscii DER_UTCTimeToAscii DER_UTCTimeToTime DSAU_DecodeDerSig DSAU_DecodeDerSigToLen DSAU_EncodeDerSig DSAU_EncodeDerSigWithLen HASH_Begin HASH_Clone HASH_Create HASH_Destroy HASH_End HASH_GetHashObject HASH_GetHashObjectByOidTag HASH_GetHashTypeByOidTag HASH_HashBuf HASH_ResultLen HASH_ResultLenByOidTag HASH_ResultLenContext HASH_Update NSS_Init NSS_Initialize NSS_InitReadWrite NSS_IsInitialized NSS_NoDBInit NSS_PutEnv NSS_RegisterShutdown NSS_Shutdown NSS_UnregisterShutdown NSS_VersionCheck NSSBase64_DecodeBuffer NSSBase64Decoder_Create NSSBase64Decoder_Destroy NSSBase64Decoder_Update NSSBase64_EncodeItem NSSBase64Encoder_Create NSSBase64Encoder_Destroy NSSBase64Encoder_Update NSSRWLock_Destroy NSSRWLock_HaveWriteLock NSSRWLock_LockRead NSSRWLock_LockWrite NSSRWLock_New NSSRWLock_UnlockRead NSSRWLock_UnlockWrite NSSSMIME_VersionCheck PORT_Alloc PORT_ArenaAlloc PORT_ArenaGrow PORT_ArenaMark PORT_ArenaRelease PORT_ArenaStrdup PORT_ArenaUnmark PORT_ArenaZAlloc PORT_Free PORT_FreeArena PORT_GetError PORT_NewArena PORT_Realloc PORT_SetError PORT_SetUCS2_ASCIIConversionFunction PORT_SetUCS2_UTF8ConversionFunction PORT_SetUCS4_UTF8ConversionFunction PORT_Strdup PORT_UCS2_ASCIIConversion PORT_UCS2_UTF8Conversion PORT_ZAlloc PORT_ZFree RSA_FormatBlock SEC_ASN1Decode SEC_ASN1DecodeInteger SEC_ASN1DecodeItem SEC_ASN1DecoderAbort SEC_ASN1DecoderClearFilterProc SEC_ASN1DecoderClearNotifyProc SEC_ASN1DecoderFinish SEC_ASN1DecoderSetFilterProc SEC_ASN1DecoderSetNotifyProc SEC_ASN1DecoderStart SEC_ASN1DecoderUpdate SEC_ASN1Encode SEC_ASN1EncodeInteger SEC_ASN1EncodeItem SEC_ASN1EncoderAbort SEC_ASN1EncoderClearNotifyProc SEC_ASN1EncoderClearStreaming SEC_ASN1EncoderClearTakeFromBuf SEC_ASN1EncoderFinish SEC_ASN1EncoderSetNotifyProc SEC_ASN1EncoderSetStreaming SEC_ASN1EncoderSetTakeFromBuf SEC_ASN1EncoderStart SEC_ASN1EncoderUpdate SEC_ASN1EncodeUnsignedInteger SEC_ASN1LengthLength SEC_DupCrl SEC_GetSignatureAlgorithmOidTag SEC_PKCS5GetCryptoAlgorithm SEC_PKCS5GetKeyLength SEC_PKCS5GetPBEAlgorithm SEC_PKCS5IsAlgorithmPBEAlg SEC_RegisterDefaultHttpClient SEC_SignData SECITEM_AllocItem SECITEM_ArenaDupItem SECITEM_CompareItem SECITEM_CopyItem SECITEM_DupItem SECITEM_FreeItem SECITEM_ItemsAreEqual SECITEM_ZfreeItem SECKEY_CopyEncryptedPrivateKeyInfo SECKEY_CopyPrivateKeyInfo SECKEY_CreateRSAPrivateKey SECKEY_DestroyEncryptedPrivateKeyInfo SECKEY_DestroyPrivateKeyInfo SECKEY_DestroyPublicKey SECKEY_PublicKeyStrength SECKEY_UpdateCertPQG SECMOD_AddNewModule SECMOD_AddNewModuleEx SECMOD_CancelWait SECMOD_CanDeleteInternalModule SECMOD_CreateModule SECMOD_DeleteModule SECMOD_FindModule SECMOD_FindSlot SECMOD_FreeModuleSpecList SECMOD_GetDBModuleList SECMOD_GetDeadModuleList SECMOD_GetModuleSpecList SECMOD_HasRemovableSlots SECMOD_IsModulePresent SECMOD_LoadModule SECMOD_LoadUserModule SECMOD_LookupSlot SECMOD_PubCipherFlagstoInternal SECMOD_PubMechFlagstoInternal SECMOD_UnloadUserModule SECMOD_UpdateModule SECMOD_UpdateSlotList SECMOD_WaitForAnyTokenEvent SECOID_AddEntry SECOID_CompareAlgorithmID SECOID_CopyAlgorithmID SECOID_DestroyAlgorithmID SECOID_FindOID SECOID_FindOIDByTag SECOID_FindOIDTag SECOID_FindOIDTagDescription SECOID_GetAlgorithmTag SECOID_SetAlgorithmID SGN_Begin SGN_CompareDigestInfo SGN_CopyDigestInfo SGN_CreateDigestInfo SGN_DestroyContext SGN_DestroyDigestInfo SGN_Digest SGN_End SGN_NewContext SGN_Update VFY_Begin VFY_CreateContext VFY_DestroyContext VFY_End VFY_Update VFY_VerifyData VFY_VerifyDigest NSS_CMSContentInfo_GetBulkKey NSS_CMSContentInfo_GetBulkKeySize NSS_CMSContentInfo_GetContent NSS_CMSContentInfo_GetContentEncAlgTag NSS_CMSContentInfo_GetContentTypeTag NSS_CMSContentInfo_SetBulkKey NSS_CMSContentInfo_SetContent NSS_CMSContentInfo_SetContent_Data NSS_CMSContentInfo_SetContentEncAlg NSS_CMSContentInfo_SetContent_DigestedData NSS_CMSContentInfo_SetContent_EncryptedData NSS_CMSContentInfo_SetContent_EnvelopedData NSS_CMSContentInfo_SetContent_SignedData NSS_CMSDecoder_Cancel NSS_CMSDecoder_Finish NSS_CMSDecoder_Start NSS_CMSDecoder_Update NSS_CMSDigestContext_Cancel NSS_CMSDigestContext_FinishMultiple NSS_CMSDigestContext_FinishSingle NSS_CMSDigestContext_StartMultiple NSS_CMSDigestContext_StartSingle NSS_CMSDigestContext_Update NSS_CMSDigestedData_Create NSS_CMSDigestedData_Destroy NSS_CMSDigestedData_GetContentInfo NSS_CMSDEREncode NSS_CMSEncoder_Cancel NSS_CMSEncoder_Finish NSS_CMSEncoder_Start NSS_CMSEncoder_Update NSS_CMSEncryptedData_Create NSS_CMSEncryptedData_Destroy NSS_CMSEncryptedData_GetContentInfo NSS_CMSEnvelopedData_AddRecipient NSS_CMSEnvelopedData_Create NSS_CMSEnvelopedData_Destroy NSS_CMSEnvelopedData_GetContentInfo NSS_CMSMessage_ContentLevel NSS_CMSMessage_ContentLevelCount NSS_CMSMessage_Copy NSS_CMSMessage_Create NSS_CMSMessage_CreateFromDER NSS_CMSMessage_Destroy NSS_CMSMessage_GetContent NSS_CMSMessage_GetContentInfo NSS_CMSMessage_IsEncrypted NSS_CMSMessage_IsSigned NSS_CMSRecipientInfo_Create NSS_CMSRecipientInfo_CreateFromDER NSS_CMSRecipientInfo_CreateNew NSS_CMSRecipientInfo_CreateWithSubjKeyID NSS_CMSRecipientInfo_CreateWithSubjKeyIDFromCert NSS_CMSRecipientInfo_Destroy NSS_CMSRecipientInfo_Encode NSS_CMSRecipientInfo_GetCertAndKey NSS_CMSRecipientInfo_UnwrapBulkKey NSS_CMSRecipientInfo_WrapBulkKey NSS_CMSSignedData_AddCertChain NSS_CMSSignedData_AddCertList NSS_CMSSignedData_AddCertificate NSS_CMSSignedData_AddDigest NSS_CMSSignedData_AddSignerInfo NSS_CMSSignedData_Create NSS_CMSSignedData_CreateCertsOnly NSS_CMSSignedData_Destroy NSS_CMSSignedData_GetContentInfo NSS_CMSSignedData_GetDigestAlgs NSS_CMSSignedData_GetSignerInfo NSS_CMSSignedData_HasDigests NSS_CMSSignedData_ImportCerts NSS_CMSSignedData_SetDigests NSS_CMSSignedData_SetDigestValue NSS_CMSSignedData_SignerInfoCount NSS_CMSSignedData_VerifyCertsOnly NSS_CMSSignedData_VerifySignerInfo NSS_CMSSignerInfo_AddMSSMIMEEncKeyPrefs NSS_CMSSignerInfo_AddSMIMECaps NSS_CMSSignerInfo_AddSMIMEEncKeyPrefs NSS_CMSSignerInfo_AddSigningTime NSS_CMSSignerInfo_Create NSS_CMSSignerInfo_CreateWithSubjKeyID NSS_CMSSignerInfo_Destroy NSS_CMSSignerInfo_GetCertList NSS_CMSSignerInfo_GetSignerCommonName NSS_CMSSignerInfo_GetSignerEmailAddress NSS_CMSSignerInfo_GetSigningCertificate NSS_CMSSignerInfo_GetSigningTime NSS_CMSSignerInfo_GetVerificationStatus NSS_CMSSignerInfo_GetVersion NSS_CMSSignerInfo_IncludeCerts NSS_CMSUtil_VerificationStatusToString NSS_SMIMESignerInfo_SaveSMIMEProfile NSS_SMIMEUtil_FindBulkAlgForRecipients SEC_PKCS7AddCertificate SEC_PKCS7AddRecipient SEC_PKCS7AddSigningTime SEC_PKCS7ContainsCertsOrCrls SEC_PKCS7ContentIsEncrypted SEC_PKCS7ContentIsSigned SEC_PKCS7ContentType SEC_PKCS7CopyContentInfo SEC_PKCS7CreateCertsOnly SEC_PKCS7CreateData SEC_PKCS7CreateEncryptedData SEC_PKCS7CreateEnvelopedData SEC_PKCS7CreateSignedData SEC_PKCS7DecodeItem SEC_PKCS7DecoderAbort SEC_PKCS7DecoderFinish SEC_PKCS7DecoderStart SEC_PKCS7DecoderUpdate SEC_PKCS7DecryptContents SEC_PKCS7DestroyContentInfo SEC_PKCS7Encode SEC_PKCS7EncodeItem SEC_PKCS7EncoderAbort SEC_PKCS7EncoderFinish SEC_PKCS7EncoderStart SEC_PKCS7EncoderUpdate SEC_PKCS7GetCertificateList SEC_PKCS7GetContent SEC_PKCS7GetEncryptionAlgorithm SEC_PKCS7GetSignerCommonName SEC_PKCS7GetSignerEmailAddress SEC_PKCS7GetSigningTime SEC_PKCS7IncludeCertChain SEC_PKCS7IsContentEmpty SEC_PKCS7SetContent SEC_PKCS7VerifyDetachedSignature SEC_PKCS7VerifySignature SECMIME_DecryptionAllowed SEC_PKCS12AddCertAndKey SEC_PKCS12AddPasswordIntegrity SEC_PKCS12CreateExportContext SEC_PKCS12CreatePasswordPrivSafe SEC_PKCS12CreateUnencryptedSafe SEC_PKCS12DecoderFinish SEC_PKCS12DecoderGetCerts SEC_PKCS12DecoderImportBags SEC_PKCS12DecoderIterateInit SEC_PKCS12DecoderIterateNext SEC_PKCS12DecoderSetTargetTokenCAs SEC_PKCS12DecoderStart SEC_PKCS12DecoderUpdate SEC_PKCS12DecoderValidateBags SEC_PKCS12DecoderVerify SEC_PKCS12DestroyExportContext SEC_PKCS12EnableCipher SEC_PKCS12Encode SEC_PKCS12IsEncryptionAllowed&lt;br /&gt;
&lt;br /&gt;
2nd Group – Use this to highlight fixes&lt;br /&gt;
* Foreground color – green&lt;br /&gt;
* Font style - bold&lt;br /&gt;
* Background color – white&lt;br /&gt;
* Prefix mode – make sure this is set (checked)&lt;br /&gt;
* mysql_real_escape_string&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Comment &amp;amp; Number&lt;br /&gt;
* Comment line&lt;br /&gt;
* Foreground color – light grey&lt;br /&gt;
* Treat keyword as symbol&lt;br /&gt;
* // #&lt;br /&gt;
&lt;br /&gt;
Comment Block&lt;br /&gt;
* Foreground color – light grey&lt;br /&gt;
* Treat keyword as symbol&lt;br /&gt;
* Comment open - /*&lt;br /&gt;
* Comment close - */&lt;br /&gt;
&lt;br /&gt;
Save As&lt;br /&gt;
* PHP4, 5 SCA&lt;br /&gt;
&lt;br /&gt;
Then, when one opens a file using the new &amp;quot;language&amp;quot;, starting from the suspected highlighted finding, one can double click on the parameters and return values of suspect functions, then keep selecting variables and return values as you trace through the code, using the highlighting all instances function and so on to expidite your review.&lt;br /&gt;
&lt;br /&gt;
Here it is in action:&lt;br /&gt;
&lt;br /&gt;
[[Image:Npp-eg.JPG]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Verification Standard Project]]&lt;br /&gt;
[[Category:How To]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=125562</id>
		<title>AppSecAsiaPac2012/Chapters Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=125562"/>
				<updated>2012-03-05T03:35:11Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Remote Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
As part of [[AppSecAsiaPac2012|AppSec APAC 2012]], on '''Thursday, April 12 at 1:30PM-5:00PM''', the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
We plan to start with a 1.5 hour session run by experienced leaders (panel) on how to run a successful chapter. The second part of the workshop will be a roundtable discussion on regional issues and challenges, with a goal of working together to create solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Are there other topics you would like to discuss?  Please add them below:&lt;br /&gt;
* Best practices of Chapter organization &lt;br /&gt;
* How long should a leader lead a chapter?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec APAC, please submit a request to [mailto:josh.sokol@owasp.org Josh Sokol] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''March 1, 2012'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec Asia Pacific in Sydney, Australia.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. Priority of sponsorships will be given to those not covered by a sponsorship to attend a workshop in 2011.  Additionally, we are looking for new or struggling chapter leaders who need assistance kick starting their chapter. &lt;br /&gt;
&lt;br /&gt;
After March 1, the Global Chapters Committee will make funding decision in a fair and transparent manner. When you apply for funding, please let us know '''why we should sponsor you'''.  While we prefer that chapter leaders use their own chapter's funds before requesting a sponsorship, this is not a requirement for application.  If your chapter has fund but will not be using them to sponsor your attendance, please include why you will not be using the funds for this purpose (i.e. what are the other plans for those funds?).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
* Sarah Baso (OWASP Operational Support)&lt;br /&gt;
* Andrew van der Stock &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Mohd_Fazli_Azran Mohd Fazli Azran] (GCC &amp;amp; Malaysia Chapter)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Tgondrom Tobias Gondrom] (OWASP London) - (attendance will depend on whether I will be at the AppSec to give presentation/training at the AppSec anyway)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:gandhiasrn Gandhi Aryavalli] (GMC)&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
Details TBA.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Zakiakhmad Zaki Akhmad] (Indonesia Chapter)&lt;br /&gt;
* ...&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
== 2011 Chapter Leader Workshops==&lt;br /&gt;
* [[AppSecEU  2011 chapters workshop agenda]] and  [https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Meeting Minutes]&lt;br /&gt;
* [[AppSec USA 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/13KyIN9F75ZcM8lPDpvwU11JgxcImYp3or6dhmcezpF0/edit?hl=en_US Meeting Minutes] 21-Sept-2011 in Minneapolis, MN, USA&lt;br /&gt;
* [[AppSecLatam2011 chapters workshop agenda]] and [https://docs.google.com/document/d/1875PxrASC37IxgclLuK7cE9nfOu4D98p5GwSeYHSgas/edit?hl=en_US Meeting Minutes] 5-Oct-2011 in Porto Alegre, Brazil&lt;br /&gt;
* [[OWASP Global AppSec Asia 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/1z_3ehI9T_lIeMmkeUo9QL9mbjh8ygSKquVlBaJY7ed4/edit Meeting Minutes] 9-Nov-2011 in Beijing, China&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact us: &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:josh.sokol@owasp.org Josh Sokol], Chapters Committee Chair&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:sarah.baso@owasp.org Sarah Baso], OWASP Operational Support - Conference Logistics &amp;amp; Community Relations&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=125561</id>
		<title>AppSecAsiaPac2012/Chapters Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=125561"/>
				<updated>2012-03-05T03:34:44Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Remote Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
As part of [[AppSecAsiaPac2012|AppSec APAC 2012]], on '''Thursday, April 12 at 1:30PM-5:00PM''', the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
We plan to start with a 1.5 hour session run by experienced leaders (panel) on how to run a successful chapter. The second part of the workshop will be a roundtable discussion on regional issues and challenges, with a goal of working together to create solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Are there other topics you would like to discuss?  Please add them below:&lt;br /&gt;
* Best practices of Chapter organization &lt;br /&gt;
* How long should a leader lead a chapter?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec APAC, please submit a request to [mailto:josh.sokol@owasp.org Josh Sokol] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''March 1, 2012'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec Asia Pacific in Sydney, Australia.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. Priority of sponsorships will be given to those not covered by a sponsorship to attend a workshop in 2011.  Additionally, we are looking for new or struggling chapter leaders who need assistance kick starting their chapter. &lt;br /&gt;
&lt;br /&gt;
After March 1, the Global Chapters Committee will make funding decision in a fair and transparent manner. When you apply for funding, please let us know '''why we should sponsor you'''.  While we prefer that chapter leaders use their own chapter's funds before requesting a sponsorship, this is not a requirement for application.  If your chapter has fund but will not be using them to sponsor your attendance, please include why you will not be using the funds for this purpose (i.e. what are the other plans for those funds?).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
* Sarah Baso (OWASP Operational Support)&lt;br /&gt;
* Andrew van der Stock &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Mohd_Fazli_Azran Mohd Fazli Azran] (GCC &amp;amp; Malaysia Chapter)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Tgondrom Tobias Gondrom] (OWASP London) - (attendance will depend on whether I will be at the AppSec to give presentation/training at the AppSec anyway)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:gandhiasrn Gandhi Aryavalli] (GMC)&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
Details TBA.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Zakiakhmad Zaki Akhmad]&lt;br /&gt;
* ...&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
== 2011 Chapter Leader Workshops==&lt;br /&gt;
* [[AppSecEU  2011 chapters workshop agenda]] and  [https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Meeting Minutes]&lt;br /&gt;
* [[AppSec USA 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/13KyIN9F75ZcM8lPDpvwU11JgxcImYp3or6dhmcezpF0/edit?hl=en_US Meeting Minutes] 21-Sept-2011 in Minneapolis, MN, USA&lt;br /&gt;
* [[AppSecLatam2011 chapters workshop agenda]] and [https://docs.google.com/document/d/1875PxrASC37IxgclLuK7cE9nfOu4D98p5GwSeYHSgas/edit?hl=en_US Meeting Minutes] 5-Oct-2011 in Porto Alegre, Brazil&lt;br /&gt;
* [[OWASP Global AppSec Asia 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/1z_3ehI9T_lIeMmkeUo9QL9mbjh8ygSKquVlBaJY7ed4/edit Meeting Minutes] 9-Nov-2011 in Beijing, China&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact us: &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:josh.sokol@owasp.org Josh Sokol], Chapters Committee Chair&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:sarah.baso@owasp.org Sarah Baso], OWASP Operational Support - Conference Logistics &amp;amp; Community Relations&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=125560</id>
		<title>AppSecAsiaPac2012/Chapters Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=125560"/>
				<updated>2012-03-05T03:33:23Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Remote Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
As part of [[AppSecAsiaPac2012|AppSec APAC 2012]], on '''Thursday, April 12 at 1:30PM-5:00PM''', the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
We plan to start with a 1.5 hour session run by experienced leaders (panel) on how to run a successful chapter. The second part of the workshop will be a roundtable discussion on regional issues and challenges, with a goal of working together to create solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Are there other topics you would like to discuss?  Please add them below:&lt;br /&gt;
* Best practices of Chapter organization &lt;br /&gt;
* How long should a leader lead a chapter?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec APAC, please submit a request to [mailto:josh.sokol@owasp.org Josh Sokol] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''March 1, 2012'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec Asia Pacific in Sydney, Australia.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. Priority of sponsorships will be given to those not covered by a sponsorship to attend a workshop in 2011.  Additionally, we are looking for new or struggling chapter leaders who need assistance kick starting their chapter. &lt;br /&gt;
&lt;br /&gt;
After March 1, the Global Chapters Committee will make funding decision in a fair and transparent manner. When you apply for funding, please let us know '''why we should sponsor you'''.  While we prefer that chapter leaders use their own chapter's funds before requesting a sponsorship, this is not a requirement for application.  If your chapter has fund but will not be using them to sponsor your attendance, please include why you will not be using the funds for this purpose (i.e. what are the other plans for those funds?).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
* Sarah Baso (OWASP Operational Support)&lt;br /&gt;
* Andrew van der Stock &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Mohd_Fazli_Azran Mohd Fazli Azran] (GCC &amp;amp; Malaysia Chapter)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Tgondrom Tobias Gondrom] (OWASP London) - (attendance will depend on whether I will be at the AppSec to give presentation/training at the AppSec anyway)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:gandhiasrn Gandhi Aryavalli] (GMC)&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
Details TBA.&lt;br /&gt;
&lt;br /&gt;
* [[User:Zakiakhmad Zaki Akhmad]]&lt;br /&gt;
* ...&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
== 2011 Chapter Leader Workshops==&lt;br /&gt;
* [[AppSecEU  2011 chapters workshop agenda]] and  [https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Meeting Minutes]&lt;br /&gt;
* [[AppSec USA 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/13KyIN9F75ZcM8lPDpvwU11JgxcImYp3or6dhmcezpF0/edit?hl=en_US Meeting Minutes] 21-Sept-2011 in Minneapolis, MN, USA&lt;br /&gt;
* [[AppSecLatam2011 chapters workshop agenda]] and [https://docs.google.com/document/d/1875PxrASC37IxgclLuK7cE9nfOu4D98p5GwSeYHSgas/edit?hl=en_US Meeting Minutes] 5-Oct-2011 in Porto Alegre, Brazil&lt;br /&gt;
* [[OWASP Global AppSec Asia 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/1z_3ehI9T_lIeMmkeUo9QL9mbjh8ygSKquVlBaJY7ed4/edit Meeting Minutes] 9-Nov-2011 in Beijing, China&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact us: &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:josh.sokol@owasp.org Josh Sokol], Chapters Committee Chair&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:sarah.baso@owasp.org Sarah Baso], OWASP Operational Support - Conference Logistics &amp;amp; Community Relations&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=125559</id>
		<title>AppSecAsiaPac2012/Chapters Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=125559"/>
				<updated>2012-03-05T03:32:40Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Participants */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
As part of [[AppSecAsiaPac2012|AppSec APAC 2012]], on '''Thursday, April 12 at 1:30PM-5:00PM''', the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
We plan to start with a 1.5 hour session run by experienced leaders (panel) on how to run a successful chapter. The second part of the workshop will be a roundtable discussion on regional issues and challenges, with a goal of working together to create solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Are there other topics you would like to discuss?  Please add them below:&lt;br /&gt;
* Best practices of Chapter organization &lt;br /&gt;
* How long should a leader lead a chapter?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec APAC, please submit a request to [mailto:josh.sokol@owasp.org Josh Sokol] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''March 1, 2012'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec Asia Pacific in Sydney, Australia.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. Priority of sponsorships will be given to those not covered by a sponsorship to attend a workshop in 2011.  Additionally, we are looking for new or struggling chapter leaders who need assistance kick starting their chapter. &lt;br /&gt;
&lt;br /&gt;
After March 1, the Global Chapters Committee will make funding decision in a fair and transparent manner. When you apply for funding, please let us know '''why we should sponsor you'''.  While we prefer that chapter leaders use their own chapter's funds before requesting a sponsorship, this is not a requirement for application.  If your chapter has fund but will not be using them to sponsor your attendance, please include why you will not be using the funds for this purpose (i.e. what are the other plans for those funds?).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
* Sarah Baso (OWASP Operational Support)&lt;br /&gt;
* Andrew van der Stock &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Mohd_Fazli_Azran Mohd Fazli Azran] (GCC &amp;amp; Malaysia Chapter)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Tgondrom Tobias Gondrom] (OWASP London) - (attendance will depend on whether I will be at the AppSec to give presentation/training at the AppSec anyway)&lt;br /&gt;
* [https://www.owasp.org/index.php/User:gandhiasrn Gandhi Aryavalli] (GMC)&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
Details TBA.&lt;br /&gt;
&lt;br /&gt;
== 2011 Chapter Leader Workshops==&lt;br /&gt;
* [[AppSecEU  2011 chapters workshop agenda]] and  [https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Meeting Minutes]&lt;br /&gt;
* [[AppSec USA 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/13KyIN9F75ZcM8lPDpvwU11JgxcImYp3or6dhmcezpF0/edit?hl=en_US Meeting Minutes] 21-Sept-2011 in Minneapolis, MN, USA&lt;br /&gt;
* [[AppSecLatam2011 chapters workshop agenda]] and [https://docs.google.com/document/d/1875PxrASC37IxgclLuK7cE9nfOu4D98p5GwSeYHSgas/edit?hl=en_US Meeting Minutes] 5-Oct-2011 in Porto Alegre, Brazil&lt;br /&gt;
* [[OWASP Global AppSec Asia 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/1z_3ehI9T_lIeMmkeUo9QL9mbjh8ygSKquVlBaJY7ed4/edit Meeting Minutes] 9-Nov-2011 in Beijing, China&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact us: &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:josh.sokol@owasp.org Josh Sokol], Chapters Committee Chair&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:sarah.baso@owasp.org Sarah Baso], OWASP Operational Support - Conference Logistics &amp;amp; Community Relations&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=124434</id>
		<title>AppSecAsiaPac2012/Chapters Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecAsiaPac2012/Chapters_Workshop&amp;diff=124434"/>
				<updated>2012-02-17T08:22:32Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
As part of [[AppSecAsiaPac2012|AppSec APAC 2012]], on '''Thursday, April 12 at 1:30PM-5:00PM''', the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
We plan to start with a 1.5 hour session run by experienced leaders (panel) on how to run a successful chapter. The second part of the workshop will be a roundtable discussion on regional issues and challenges, with a goal of working together to create solutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Are there other topics you would like to discuss?  Please add them below:&lt;br /&gt;
* Best practices of Chapter organization &lt;br /&gt;
* How long should a leader lead a chapter?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec APAC, please submit a request to [mailto:josh.sokol@owasp.org Josh Sokol] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''March 1, 2012'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec Asia Pacific in Sydney, Australia.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. Priority of sponsorships will be given to those not covered by a sponsorship to attend a workshop in 2011.  Additionally, we are looking for new or struggling chapter leaders who need assistance kick starting their chapter. &lt;br /&gt;
&lt;br /&gt;
After March 1, the Global Chapters Committee will make funding decision in a fair and transparent manner. When you apply for funding, please let us know '''why we should sponsor you'''.  While we prefer that chapter leaders use their own chapter's funds before requesting a sponsorship, this is not a requirement for application.  If your chapter has fund but will not be using them to sponsor your attendance, please include why you will not be using the funds for this purpose (i.e. what are the other plans for those funds?).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
* Sarah Baso (OWASP Operational Support)&lt;br /&gt;
* Andrew van der Stock &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Mohd_Fazli_Azran Mohd Fazli Azran] (GCC &amp;amp; Malaysia Chapter)&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
Details TBA.&lt;br /&gt;
&lt;br /&gt;
== 2011 Chapter Leader Workshops==&lt;br /&gt;
* [[AppSecEU  2011 chapters workshop agenda]] and  [https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Meeting Minutes]&lt;br /&gt;
* [[AppSec USA 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/13KyIN9F75ZcM8lPDpvwU11JgxcImYp3or6dhmcezpF0/edit?hl=en_US Meeting Minutes] 21-Sept-2011 in Minneapolis, MN, USA&lt;br /&gt;
* [[AppSecLatam2011 chapters workshop agenda]] and [https://docs.google.com/document/d/1875PxrASC37IxgclLuK7cE9nfOu4D98p5GwSeYHSgas/edit?hl=en_US Meeting Minutes] 5-Oct-2011 in Porto Alegre, Brazil&lt;br /&gt;
* [[OWASP Global AppSec Asia 2011 chapters workshop agenda]] and [https://docs.google.com/a/owasp.org/document/d/1z_3ehI9T_lIeMmkeUo9QL9mbjh8ygSKquVlBaJY7ed4/edit Meeting Minutes] 9-Nov-2011 in Beijing, China&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact us: &amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:josh.sokol@owasp.org Josh Sokol], Chapters Committee Chair&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:sarah.baso@owasp.org Sarah Baso], OWASP Operational Support - Conference Logistics &amp;amp; Community Relations&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=123538</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=123538"/>
				<updated>2012-02-01T10:39:22Z</updated>
		
		<summary type="html">&lt;p&gt;Zakiakhmad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
= [http://www.owasp.org.cn/OWASP_Conference/AppSec_2011/Asia_2011-PPT Presentations Download]=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= 中文(Chinese)  =&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
= Registration  =&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
= Keynotes  =&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Guest Speakers  =&lt;br /&gt;
In Surname's Alphabetical Order&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c9/Jianmli.jpg&lt;br /&gt;
| Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/07/Marco-morana.JPG&lt;br /&gt;
| Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/e/ef/Yumingxia.png &lt;br /&gt;
| Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/8/81/NoaBarYosef.jpg &lt;br /&gt;
| Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= CFP and CFT  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Agenda  =&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;t FCK__ShowTableBorders&amp;quot; width=&amp;quot;80%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Rip, OWASP China (Language: Chinese)'''&amp;lt;br&amp;gt;Opening Ceremony: Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt;Opening Ceremony&amp;amp;nbsp; '''(Language: English)'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Liping Ding &amp;amp;nbsp;(Language: Chinese) '''&amp;lt;br&amp;gt;The Analysis of Hidden Communication Channels within Cloud Computing Environment&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Manoranjan Paul &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Silver Lining in Dark Clouds: A Look at Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Frank Fan &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Jonathan Werrett&amp;amp;nbsp; (Language: English)'''&amp;lt;br&amp;gt;WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Hanqing Wu&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch &amp;amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Cassio Goldschmidt'&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; (Language: English)&amp;lt;br&amp;gt;'''The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:10 – 15:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Yuming Xia&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Web2.0 Secure Coding Practice&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 – 16:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Marco M. Morana &amp;amp;amp; Wei Zhang&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 – 16:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Noa Bar Yosef&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Hacking 2011：Lesson for 2012&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:40 – 17:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Sebastien Deleersnyder&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;OWASP WTE: testing your way&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:10 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;t FCK__ShowTableBorders&amp;quot; width=&amp;quot;80%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Wenju Wang&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Larry Man&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Daniel Ng&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Beefing up Cloud Application through Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Dr. Meng-Chow Kang&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Overview of ISO/IEC 27034 - the Application Security Standards&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Jianmeng Li (Language: Chinese)'''&amp;lt;br&amp;gt;Secure C Function: The Lightweight Solution for Buffer Overflow&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Langyu Hu (Language: Chinese)'''&amp;lt;br&amp;gt;RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch &amp;amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Yongjian Guo (Language: Chinese)'''&amp;lt;br&amp;gt;Information Security Forensics&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Chenming Zhong (Language: Chinese)'''&amp;lt;br&amp;gt;Overview of Website Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Tony (Language: Chinese)'''&amp;lt;br&amp;gt;2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 16:15 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | Lucky Draw&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:15 – 16:45 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Yongbo Liu (Language: Chinese)'''&amp;lt;br&amp;gt;The Challenges of China's Post Information Security Era&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:45 – 17:15 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Dr. Jianchun Jiang (Language: Chinese)&amp;lt;br&amp;gt;NSACE - The Network Security Capability Oriented Training and Certificates'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:15 – 17:45 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;Future Plan of OWASP China and Release of WAF Testing Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training  =&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tony''' &amp;lt;br&amp;gt; Application Security Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
= Sponsors  =&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.huaweisymantec.com/cn/|logo=HS.jpg}} {{MemberLinks|link=http://www.yxlink.com/|logo=Yxlink.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Training Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Supported Organizations:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2_logo.jpg}} {{MemberLinks|link=http://www.nsace.org.cn/|logo=NSACE.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Exhibitors:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Cooperators:'''  &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://aiscanner.sinaapp.com/site/|logo=Aiscanner.png}} {{MemberLinks|link=http://www.broadview.com.cn/|logo=Broadview.jpg}} &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Media Partners  =&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}  &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}{{MemberLinks|link=http://www.zdnet.com.cn/|logo=Zdnet.gif‎}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=Xinxianquanyujishu.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Team  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
= Expense  =&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
= Logistics =&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leader Workshop =&lt;br /&gt;
&lt;br /&gt;
 '''[https://docs.google.com/a/owasp.org/document/d/1z_3ehI9T_lIeMmkeUo9QL9mbjh8ygSKquVlBaJY7ed4/edit Meeting Minutes from Chapters Workshop]'''&lt;br /&gt;
&lt;br /&gt;
 '''[https://plus.google.com/photos/100460852248386556939/albums/5676383343638946545 Photos of Chapters Workshop]'''&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Zakiakhmad</name></author>	</entry>

	</feed>