<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Generating_Custom_SSL_Certificates_for_WebScarab</id>
		<title>Generating Custom SSL Certificates for WebScarab - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Generating_Custom_SSL_Certificates_for_WebScarab"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Generating_Custom_SSL_Certificates_for_WebScarab&amp;action=history"/>
		<updated>2026-04-24T15:49:17Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Generating_Custom_SSL_Certificates_for_WebScarab&amp;diff=86022&amp;oldid=prev</id>
		<title>Michael Shimniok: Link for cert.sh did not work; replaced with link that does work.</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Generating_Custom_SSL_Certificates_for_WebScarab&amp;diff=86022&amp;oldid=prev"/>
				<updated>2010-07-09T23:09:42Z</updated>
		
		<summary type="html">&lt;p&gt;Link for cert.sh did not work; replaced with link that does work.&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 23:09, 9 July 2010&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l26&quot; &gt;Line 26:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 26:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Use a .p12 file &amp;amp; CA certificate.&amp;#160; You'll have to have WebScarab use the new .p12 file and install the CA certificate into your browser.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Use a .p12 file &amp;amp; CA certificate.&amp;#160; You'll have to have WebScarab use the new .p12 file and install the CA certificate into your browser.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There is a script to do this in the WebScarab Git repository.&amp;#160; You can get it [http://dawes.za.net/gitweb.cgi?p=&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;rogan/webscarab/&lt;/del&gt;webscarab.git;a=blob;f=doc/cert.sh;hb=&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;master &lt;/del&gt;here].&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There is a script to do this in the WebScarab Git repository.&amp;#160; You can get it [http://dawes.za.net/gitweb.cgi?p=webscarab.git;a=blob;f=doc/cert.sh&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;;h=b0fdbdf7991a00573d490e9353f9c601e7a8242e&lt;/ins&gt;;hb=&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;HEAD &lt;/ins&gt;here].&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The script will create a server-specific key and certificate for the site provided as a parameter on the command line. If this is the first time the script is being run, it will also create a CA cert which you can then import into your browser(s).&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The script will create a server-specific key and certificate for the site provided as a parameter on the command line. If this is the first time the script is being run, it will also create a CA cert which you can then import into your browser(s).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Michael Shimniok</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Generating_Custom_SSL_Certificates_for_WebScarab&amp;diff=50491&amp;oldid=prev</id>
		<title>RoganDawes: Fix up some phrasing, removed the embedded copy of the script, make sure that the link always points to the latest version in the repo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Generating_Custom_SSL_Certificates_for_WebScarab&amp;diff=50491&amp;oldid=prev"/>
				<updated>2009-01-09T10:15:00Z</updated>
		
		<summary type="html">&lt;p&gt;Fix up some phrasing, removed the embedded copy of the script, make sure that the link always points to the latest version in the repo&lt;/p&gt;
&lt;a href=&quot;https://wiki.owasp.org/index.php?title=Generating_Custom_SSL_Certificates_for_WebScarab&amp;amp;diff=50491&amp;amp;oldid=50484&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>RoganDawes</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Generating_Custom_SSL_Certificates_for_WebScarab&amp;diff=50484&amp;oldid=prev</id>
		<title>Mtesauro: Added explaination of gen</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Generating_Custom_SSL_Certificates_for_WebScarab&amp;diff=50484&amp;oldid=prev"/>
				<updated>2009-01-08T21:59:45Z</updated>
		
		<summary type="html">&lt;p&gt;Added explaination of gen&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;When using WebScarab to proxy SSL conversations, you may want to avoid the somewhat annoying warnings for an unrecognized certificate.  Generating a custom SSL certificate is how you can remove these warning messages and its rather straight forward.  Read on to see how. &lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
Below is an illustration of what happens when WebScarab is used as a intercepting proxy for SSL connections.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt; --------           -----------           ---------&lt;br /&gt;
| server |&amp;lt;--[1]--&amp;gt;| WebScarab |&amp;lt;--[2]--&amp;gt;| browser |&lt;br /&gt;
 --------           -----------           ---------&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For [1], you are using the &amp;quot;real&amp;quot; SSL certificate from the website you are browsing to.  That SSL certificate is signed by a recognized certificate authority (CA).  The thing that makes those CA's special is that browsers know about them and trust them.  For example in Firefox:&lt;br /&gt;
# Open Edit -&amp;gt; Preferences -&amp;gt; Advanced -&amp;gt; Encryption&lt;br /&gt;
# View Certificates button&lt;br /&gt;
# Authorities tab&lt;br /&gt;
to see a list of built-in trusted CA's.&lt;br /&gt;
The only thing that needs to trust this certificate is WebScarab which Rogan (WebScarab project lead) has said it will by default.&lt;br /&gt;
&lt;br /&gt;
For [2], you are using the the server.p12 certificate which comes with WebScarab. The difference between [1] and [2] is that the&lt;br /&gt;
CA which signed that certs is NOT built into browsers so they do not trust them by default.  Additionally, the domain name of this certificate will not match the domain your browser is accessing.  The default is the webscarab CA and a host name of webscarab.&lt;br /&gt;
&lt;br /&gt;
== Generating a Certificate ==&lt;br /&gt;
&lt;br /&gt;
Since you're browser doesn't trust the CA which signed server.p12 in [2] above, you've got two choices:&lt;br /&gt;
# Instruct the browser to trust the certificate.  This will work for the CA part but not for the host name.  You will still be prompted by the browser so this doesn't really help much. I know that you can have Firefox trust the CA used in [2] permanently - though its a bunch of clicks in Firefox 3 - about 6 or 7 clicks and you still have the host name mis-match issue.&lt;br /&gt;
&lt;br /&gt;
# Use a .p12 file &amp;amp; CA certificate.  You'll have to have WebScarab use the new .p12 file and install the CA certificate into your browser.&lt;br /&gt;
&lt;br /&gt;
Rogan has graciously put a script to do this in the WebScarab Git repository.  You can get it [http://dawes.za.net/gitweb.cgi?p=rogan/webscarab/webscarab.git;a=blob;f=doc/cert.sh;h=b0fdbdf7991a00573d490e9353f9c601e7a8242e;hb=c74fc311971866be602d79854211ff09502fce5b here] or copy and paste it from the listing at the bottom of this page.&lt;br /&gt;
&lt;br /&gt;
The script that Rogan provides will create a CA certificate and a new .p12 certificate for WebScarab to use.  The name of the .p12 certificate is based on the first argument to that script.  If you called that script like:&lt;br /&gt;
&amp;lt;pre&amp;gt;$ ./cert.sh www.example.com&amp;lt;/pre&amp;gt;&lt;br /&gt;
It will generate a bunch of output and create a www.example.com.p12 file for WebScarab and a ca_cert.pem file (this is the CA used to sign www.example.com.p12).  The script will run fine on Linux (I just tried it) and possibly OS X but won't work on Windows (maybe with Cygwin - any volunteers?).&lt;br /&gt;
&lt;br /&gt;
Take the www.example.com.p12 (assuming you ran the script like above) and let WebScarab know about it.  To do this you will need to place it in ${WEBSCARAB_HOME}/certs/.  WebScarab checks in that directory at start up for any SSL certificates and remembers what it finds.&lt;br /&gt;
&lt;br /&gt;
Take the ca_cert.pem file and configure your browser to trust that CA.  For Firefox:&lt;br /&gt;
# Open Edit -&amp;gt; Preferences -&amp;gt; Advanced -&amp;gt; Encryption&lt;br /&gt;
# View Certificates button&lt;br /&gt;
# Authorities&lt;br /&gt;
# Click the Import button and navigate to the ca_cert.pem file&lt;br /&gt;
&lt;br /&gt;
Make sure you at least check the box &amp;quot;Trust this CA to identify web sites.&amp;quot; option when you are importing - it will bring up a window with that information.&lt;br /&gt;
&lt;br /&gt;
For IE, I don't know off the top of my head.  Try this [http://www.library.jcu.edu.au/LibraryGuides/certificate.shtml link] except for instead of downloading it you can right-click on the ca_cert.pem file and select &amp;quot;Install Certificate&amp;quot;&lt;br /&gt;
&lt;br /&gt;
FYI:  Firefox and IE will both need to be configured if both are used as they keep their lists of trusted CAs in different places.&lt;br /&gt;
&lt;br /&gt;
'''Added Bonus'''&lt;br /&gt;
If you keep the working directory for cert.sh, you can create new custom SSL certificates and the CA will stay the same.  No need to continually add CAs to the browser(s) of your choice.  If you know all the domains you'll be testing, you can run cert.sh multiple time and just restart WebScarab once to get them all recognized.&lt;br /&gt;
&lt;br /&gt;
For the curious, this is the directory structure the cert.sh script Rogan linked creates:&lt;br /&gt;
&amp;lt;pre&amp;gt;./&lt;br /&gt;
|-- cert.sh&lt;br /&gt;
|-- sslcerts&lt;br /&gt;
|   |-- ca_cert.pem&lt;br /&gt;
|   |-- certindex.txt&lt;br /&gt;
|   |-- certindex.txt.attr&lt;br /&gt;
|   |-- certindex.txt.old&lt;br /&gt;
|   |-- certs&lt;br /&gt;
|   |   `-- 100001.pem&lt;br /&gt;
|   |-- openssl.cnf&lt;br /&gt;
|   |-- private&lt;br /&gt;
|   |   |-- ca_key.pem&lt;br /&gt;
|   |   `-- www.example.com-key.pem&lt;br /&gt;
|   |-- serial&lt;br /&gt;
|   |-- serial.old&lt;br /&gt;
|   |-- www.example.com-cert.pem&lt;br /&gt;
|   `-- www.example.com-req.pem&lt;br /&gt;
`-- www.example.com.p12&lt;br /&gt;
&lt;br /&gt;
3 directories, 14 files &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
&lt;br /&gt;
# I was not precise in terms and used SSL and HTTPS loosely in the above.  This process would also applies to TLS - I just didn't want to type SSL/TLS over and over.&lt;br /&gt;
# Matt Tesauro was the author of this document.  If you have corrections, feel free to make them yourself (its a Wiki after all) or contact Matt at mtesauro (at) gmail.com&lt;br /&gt;
# The certificate script can be copy and pasted from here:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
&lt;br /&gt;
if [ ! -d sslcerts ] ; then&lt;br /&gt;
  mkdir sslcerts || die &amp;quot;Couldn't create sslcerts directory&amp;quot;&lt;br /&gt;
fi&lt;br /&gt;
if [ ! -d sslcerts/certs ] ; then&lt;br /&gt;
  mkdir sslcerts/certs || die &amp;quot;Couldn't create certs directory&amp;quot;&lt;br /&gt;
fi&lt;br /&gt;
if [ ! -d sslcerts/private ] ; then&lt;br /&gt;
  mkdir sslcerts/private || die &amp;quot;Couldn't create private directory&amp;quot;&lt;br /&gt;
fi&lt;br /&gt;
if [ ! -f sslcerts/serial ] ; then&lt;br /&gt;
  echo '100001' &amp;gt; sslcerts/serial&lt;br /&gt;
fi&lt;br /&gt;
touch sslcerts/certindex.txt&lt;br /&gt;
if [ ! -f sslcerts/openssl.cnf ] ; then&lt;br /&gt;
  cat &amp;lt;&amp;lt;-EOF &amp;gt; sslcerts/openssl.cnf&lt;br /&gt;
	#&lt;br /&gt;
	# OpenSSL configuration file.&lt;br /&gt;
	#&lt;br /&gt;
&lt;br /&gt;
	# Establish working directory.&lt;br /&gt;
 &lt;br /&gt;
	dir			= .&lt;br /&gt;
&lt;br /&gt;
	[ ca ]&lt;br /&gt;
	default_ca		= CA_default&lt;br /&gt;
&lt;br /&gt;
	[ CA_default ]&lt;br /&gt;
	serial			= ./serial&lt;br /&gt;
	database		= ./certindex.txt&lt;br /&gt;
	new_certs_dir		= ./certs&lt;br /&gt;
	certificate		= ./ca_cert.pem&lt;br /&gt;
	private_key		= ./private/ca_key.pem&lt;br /&gt;
	default_days		= 365&lt;br /&gt;
	default_md		= md5&lt;br /&gt;
	preserve		= no&lt;br /&gt;
	email_in_dn		= no&lt;br /&gt;
	nameopt			= default_ca&lt;br /&gt;
	certopt			= default_ca&lt;br /&gt;
	policy			= policy_anything&lt;br /&gt;
&lt;br /&gt;
	[ policy_match ]&lt;br /&gt;
	countryName		= match&lt;br /&gt;
	stateOrProvinceName	= match&lt;br /&gt;
	organizationName	= match&lt;br /&gt;
	organizationalUnitName	= match&lt;br /&gt;
	commonName		= supplied&lt;br /&gt;
	emailAddress		= optional&lt;br /&gt;
&lt;br /&gt;
	[ policy_anything ]&lt;br /&gt;
	countryName		= optional&lt;br /&gt;
	stateOrProvinceName	= optional&lt;br /&gt;
	localityName		= optional&lt;br /&gt;
	organizationName	= optional&lt;br /&gt;
	organizationalUnitName	= optional&lt;br /&gt;
	commonName		= supplied&lt;br /&gt;
	emailAddress		= optional&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
	[ req ]&lt;br /&gt;
	default_bits		= 1024			# Size of keys&lt;br /&gt;
	default_keyfile		= key.pem		# name of generated keys&lt;br /&gt;
	default_md		= md5			# message digest algorithm&lt;br /&gt;
	string_mask		= nombstr		# permitted characters&lt;br /&gt;
	distinguished_name	= req_distinguished_name&lt;br /&gt;
	req_extensions		= v3_req&lt;br /&gt;
 &lt;br /&gt;
	[ req_distinguished_name ]&lt;br /&gt;
	# Variable name				Prompt string&lt;br /&gt;
	#-------------------------	  ----------------------------------&lt;br /&gt;
	0.organizationName	= Organization Name (company)&lt;br /&gt;
	organizationalUnitName	= Organizational Unit Name (department, division)&lt;br /&gt;
	emailAddress		= Email Address&lt;br /&gt;
	emailAddress_max	= 40&lt;br /&gt;
	localityName		= Locality Name (city, district)&lt;br /&gt;
	stateOrProvinceName	= State or Province Name (full name)&lt;br /&gt;
	countryName		= Country Name (2 letter code)&lt;br /&gt;
	countryName_min		= 2&lt;br /&gt;
	countryName_max		= 2&lt;br /&gt;
	commonName		= Common Name (hostname, IP, or your name)&lt;br /&gt;
	commonName_max		= 64&lt;br /&gt;
&lt;br /&gt;
	# Default values for the above, for consistency and less typing.&lt;br /&gt;
	# Variable name			Value&lt;br /&gt;
	#------------------------  ------------------------------&lt;br /&gt;
	0.organizationName_default	= WebScarab&lt;br /&gt;
	localityName_default		= WebScarab&lt;br /&gt;
	stateOrProvinceName_default	= WebScarab&lt;br /&gt;
	countryName_default		= ZA&lt;br /&gt;
 &lt;br /&gt;
	[ v3_ca ]&lt;br /&gt;
	basicConstraints		= CA:TRUE&lt;br /&gt;
	subjectKeyIdentifier		= hash&lt;br /&gt;
	authorityKeyIdentifier		= keyid:always,issuer:always&lt;br /&gt;
&lt;br /&gt;
	[ v3_req ]&lt;br /&gt;
	basicConstraints		= CA:FALSE&lt;br /&gt;
	subjectKeyIdentifier		= hash&lt;br /&gt;
	EOF&lt;br /&gt;
fi&lt;br /&gt;
&lt;br /&gt;
if [ ! -f sslcerts/private/ca_key.pem -a ! -f sslcerts/ca_cert.p12 ] ; then&lt;br /&gt;
  printf &amp;quot;\n\n\n\n\n\n\n&amp;quot; | \&lt;br /&gt;
  openssl req -new -x509 -extensions v3_ca -keyout sslcerts/private/ca_key.pem \&lt;br /&gt;
    -out sslcerts/ca_cert.pem -days 3650 -config ./sslcerts/openssl.cnf \&lt;br /&gt;
    -passin pass:password -passout pass:password&lt;br /&gt;
fi&lt;br /&gt;
&lt;br /&gt;
cd sslcerts&lt;br /&gt;
&lt;br /&gt;
# Create the cert for the specified site&lt;br /&gt;
if [ ! -f $1-req.pem ] ; then&lt;br /&gt;
  printf &amp;quot;\n\n\n\n\n\n$1\n&amp;quot; | \&lt;br /&gt;
  openssl req -new -nodes \&lt;br /&gt;
    -out $1-req.pem -keyout ./private/$1-key.pem \&lt;br /&gt;
    -days 3650 -config ./openssl.cnf&lt;br /&gt;
fi&lt;br /&gt;
&lt;br /&gt;
if [ ! -f $1-cert.pem ] ; then&lt;br /&gt;
  printf &amp;quot;y\ny\n&amp;quot; | \&lt;br /&gt;
  openssl ca -out $1-cert.pem -days 3650 \&lt;br /&gt;
    -key password -config ./openssl.cnf -infiles $1-req.pem&lt;br /&gt;
fi&lt;br /&gt;
&lt;br /&gt;
if [ ! -f ../$1.p12 ] ; then&lt;br /&gt;
  openssl pkcs12 -export -in $1-cert.pem -inkey ./private/$1-key.pem \&lt;br /&gt;
    -certfile ca_cert.pem -out ../$1.p12 -password pass:password&lt;br /&gt;
fi&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP WebScarab Project]]&lt;/div&gt;</summary>
		<author><name>Mtesauro</name></author>	</entry>

	</feed>