This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP Example Incubator

From OWASP
Jump to: navigation, search
OWASP Project Header.jpg

Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.

The OWASP Incubator Tool/Code Example

This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.

Who is ZAP for?

ZAP is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. Also, if you are just beginning to learn about security, ZAP is a great tool that allows you to understand much better how these attacks works and affect web applications.

Zap provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

One of the biggest advantages of ZAP are:

  • is Free, Open Source
  • Cross platform
  • Easy to install
  • Supports multiple languages
  • Can be easily integrated with other tools

Description

This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible.

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Although this is a sample template, the project is real! Please contribute to this project.


Licensing

A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see OWASP Licenses. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.

The OWASP Security Principles are free to use. In fact it is encouraged!!! Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.

The OWASP ZAP is licensed under the Apache License, Version 2.0

Presentation

This is where you can link to slide presentations related to your project.

For a quick overview of ZAP and to see some of the more advanced ZAP features see these tutorial videos on YouTube:

 


Project Leader

A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.

Simon Bennetts


Related Projects

This is where you can link to other OWASP Projects that are similar to yours.

Are you new to web security vulnerabilities?

Understanding what are the most critical web application security risks is necessary to comprehend how to use and work with ZAP. There are many resources available if your are looking for information about the most common security risks. One of the most dangerous and common attacks is Injection Flaws,which allows an attacker to relay malicious code through the Web app to another systems within the network. ZAP has different features that allows you to test and find out if your Web application has these kind of flaws. We strongly recommend newbies the following resources:

Openhub

Quick Download

This is where you can link to your install files.

ZAP 2.3.1 is now available! Download it here:

ZAP-Download.png

Review this project

A link to Openhub review project URL

Please help us improve, [Review this project]

Repository

This is where you can link to your Open Repository URL such as Github or Google code.


News and Events

This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project.

  • [20 Nov 2013] News 2
  • [30 Sep 2013] News 1


Classifications

Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running.

New projects.png Owasp-breakers-small.png
Owasp-defenders-small.png
Project Type Files TOOL.jpg
Project Type Files CODE.jpg