This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Security Ninjas AppSec Training Program"
KateHartmann (talk | contribs) (Created page with "=Main= <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">link=</div> {| style="padding: 0;margin:0;margin-top:10px;t...") |
Shruti.gupta (talk | contribs) |
||
Line 5: | Line 5: | ||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | |||
− | |||
− | |||
− | |||
==OWASP Security Ninjas== | ==OWASP Security Ninjas== | ||
− | + | Security Ninjas is an open-source Application Security Training Program. | |
==Description== | ==Description== | ||
+ | |||
+ | The training program slide deck covers the OWASP Top10 vulnerabilities and some general security best practices. The hands-on training lab consists of 10 fun real world like hacking exercises corresponding to each of the OWASP Top10 vulnerabilities. | ||
<span style="color:#ff0000"> | <span style="color:#ff0000"> | ||
This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful. | This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful. | ||
Line 76: | Line 74: | ||
=FAQs= | =FAQs= | ||
− | |||
− | |||
− | |||
− | |||
+ | 1. What is special about this project? | ||
+ | - This is one of the very few projects which offers systematic, guided hands-on AppSec training to folks with very minimal AppSec or Penetration Testing knowledge. | ||
+ | This would not only teach you how to find and exploit vulnerabilities but also hot to fix them and not have them in the first place! In today's world of advancing web attacks and seeing how complicated web applications are becoming, this training is something that every software engineer should take. | ||
+ | |||
+ | 2. How much time does it take to set up the hands on lab? | ||
+ | - If you use the docker build, it takes only a few seconds to setup the lab! | ||
+ | |||
+ | 3. Is it hard to setup and destroy the hands-on lab container? | ||
+ | - It is super simple to set up and destroy the container. If use docker, there are no dependency issues as well, no matter what platform you are using! | ||
+ | |||
+ | 4. Why did I chose Docker? | ||
+ | - Setting up and destroying the environment would be super easy and quick. | ||
+ | - The docker container would be sandboxed which means that the vulnerable application wouldn’t be able to harm the host OS. | ||
Line 86: | Line 93: | ||
==Volunteers== | ==Volunteers== | ||
− | + | * [mailto:shruti.gupta@owasp.org Shruti Gupta] Shruti Gupta | |
− | |||
− | |||
− | |||
− | |||
− | |||
The first contributors to the project were: | The first contributors to the project were: | ||
− | * [mailto:[email protected] Shruti Gupta] | + | * [mailto:[email protected] Shruti Gupta] Shruti Gupta created the OWASP Security Ninjas project |
= Road Map and Getting Involved = | = Road Map and Getting Involved = | ||
− | |||
− | |||
− | |||
− | |||
− | |||
==Roadmap== | ==Roadmap== | ||
− | The project is 100% complete. | + | The project is 100% complete. |
+ | #https://s3.amazonaws.com/uploads.hipchat.com/56752/780760/3x4fL62dXpumdQd/upload.png. | ||
− | You can read the full [https://engineering.opendns.com/2015/03/16/security-ninjas-an-open-source-application-security-training-program/ blog] . | + | #You can read the full [https://engineering.opendns.com/2015/03/16/security-ninjas-an-open-source-application-security-training-program/ blog] . |
==Getting Involved== | ==Getting Involved== | ||
+ | |||
+ | If you have suggestions/ comments about how this project could be made better, please email [mailto:[email protected] Shruti Gupta] Shruti Gupta. | ||
Revision as of 23:11, 30 April 2015
1. What is special about this project? - This is one of the very few projects which offers systematic, guided hands-on AppSec training to folks with very minimal AppSec or Penetration Testing knowledge. This would not only teach you how to find and exploit vulnerabilities but also hot to fix them and not have them in the first place! In today's world of advancing web attacks and seeing how complicated web applications are becoming, this training is something that every software engineer should take.
2. How much time does it take to set up the hands on lab? - If you use the docker build, it takes only a few seconds to setup the lab!
3. Is it hard to setup and destroy the hands-on lab container? - It is super simple to set up and destroy the container. If use docker, there are no dependency issues as well, no matter what platform you are using!
4. Why did I chose Docker? - Setting up and destroying the environment would be super easy and quick. - The docker container would be sandboxed which means that the vulnerable application wouldn’t be able to harm the host OS.
Volunteers
- Shruti Gupta Shruti Gupta
The first contributors to the project were:
- Shruti Gupta Shruti Gupta created the OWASP Security Ninjas project
Roadmap
The project is 100% complete.
- .
- You can read the full blog .
Getting Involved
If you have suggestions/ comments about how this project could be made better, please email Shruti Gupta Shruti Gupta.
I already have the deliverables 100% ready:
The Application Security Training Program consists of a slide deck which is here
and the Source Code can be found here
It is fastest (takes less than 10 seconds to deploy and run) to setup and run the hands on lab in a Docker container. The docker repo and instructions are here
This category currently contains no pages or media.