This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Project Information:template Securing WebGoat using ModSecurity 50 Review Second Review E
Click here to return to the previous page.
50% REVIEW PROCESS | ||
---|---|---|
Project Deliveries & Objectives |
OWASP Securing WebGoat using ModSecurity Project's Deliveries & Objectives | |
QUESTIONS | ANSWERS | |
1. At what extent have the project deliveries & objectives been accomplished? Having in consideration the assumed ones, please exemplify writing down those of them that haven't been realised. |
The project set out to protect the vulnerable webgoat application without touching a line of code. Facing an unstable (and partially buggy) Webgoat version the project leader and sole contributor had to find a pragmatic approach to deal with this issue. On top of that it quickly turned out, that expermiental features of ModSecurity had to be used. Stephen Evans managed to cope with these troubles and actually continued in a systematic and well documented way. This is crucial for this project as it will be used by new and intermediate users of ModSecurity in the future as a case study for their own work. There are still a few challenges ahead, but looking at the results so far, Stephen is well set to tackle those as well. The rules speak for themselves: they are of a very high quality in my eyes. | |
2. At what extent have the project deliveries & objectives been accomplished? Having in consideration the assumed ones, please quantify in terms of percentage. |
Well over 50%. Including some tricky lessons. | |
3. Please do use the right hand side column to provide advice and make work suggestions. |
http://www.owasp.org/index.php/OWASP_ModSecurity_Securing_WebGoat_Section_1_Introduction Background: Purpose: http://www.owasp.org/index.php/OWASP_ModSecurity_Securing_WebGoat_Section_2_WebGoat The identification of the target and the introduction of a numbering scheme Overview of lesson results Neat and clean project setup description. Like it. I personally believe that you could have profitted from working on the command line with "curl" "empty the cash" -> rather not my account please. :) http://www.owasp.org/index.php/OWASP_ModSecurity_Securing_WebGoat_Section4_Sublesson_04.2 Respect. That really is a WAF approach to a business logic flaw. Cool. http://www.owasp.org/index.php/OWASP_ModSecurity_Securing_WebGoat_Section4_Sublesson_04.4_04.5 I suggest you split the page in two. It's two lessons. I am loosing a bit track of the lessons here. Guess it is only me. You provide very useful comments in the rule files. I like those very much. |