This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Pyttacker Project"

From OWASP
Jump to: navigation, search
(Created page with "=Main= <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">link=</div> {| style="padding: 0;margin:0;margin-top:10px;t...")
 
 
(3 intermediate revisions by the same user not shown)
Line 12: Line 12:
 
==Introduction==
 
==Introduction==
  
Write a short introduction
+
Most of the time is spent on finding the bad stuff during a Web PenTest, writing reports is time consuming and you need to deliver the results as soon as possible, however in the end the one that will need to fix the issue (or push others to do it) will need to really understand the impact of the findings included in the report. When you show raw Database data from a SQLi it's very visible for your costumer that the impact is High, however when the finding need some other steps for being reproduced the impact become more complicated to be demonstrated to non technical people, just a "request" and "response" is not enough and how long are you willing to take for coding a working PoC and create a nice screenshot for being included in your report.
  
 +
What about using "something" that is the server you mention as hypothetic 'evil.com' that can be used by the bad guys against your costumer's company, even better if you know that the evil server is not that "evil" and you have full control of it, would be nice to have "something" handy and portable for reproducing those findings and grab nice screen-shots, what about reproducing the finding during that meeting when you are trying to show the impact of your findings, not just a pop-up alert for XSS, what if you show an inoffensive but scaring partial defacement or a javascript keylogger in action.
  
 
+
Sounds good ? if yes then Pyttacker will be an interesting tool for you
==Description==
 
 
 
Write a description that is just a few paragraphs long
 
  
  
 
==Licensing==
 
==Licensing==
OWASP XXX is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
+
OWASP Pyttacker is free to use. It is licensed under GNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)
  
  
Line 29: Line 27:
 
== What is the OWASP Pyttacker Project? ==
 
== What is the OWASP Pyttacker Project? ==
  
The OWASP Pyttacker Project provides:
+
Key characteristics:
 
 
* xxx
 
* xxx
 
 
 
 
 
== Presentation ==
 
 
 
Link to presentation
 
 
 
  
 +
* Minimal requirements (Just Python and a Web Browser)
 +
* Cross-platform
 +
* Portable
 +
* Easy Plug-ins Implementation
 +
* Easy to use
  
  
 
== Project Leader ==
 
== Project Leader ==
  
Mario Robles
+
[mailto:[email protected] Mario Robles]
  
  
== Related Projects ==
+
== Supporters ==
  
* [[OWASP_CISO_Survey]]
+
* [https://www.owasp.org/index.php/Costa_Rica OWASP Costa Rica]
 +
* [https://www.roblest.com RoblesT.com]
  
  
Line 57: Line 52:
 
== Quick Download ==
 
== Quick Download ==
  
* Link to page/download
+
* [https://github.com/RoblesT/pyttacker/archive/master.zip Download]
 
+
* [https://github.com/RoblesT/pyttacker GitHub]:
 
+
<pre>
 
+
git clone https://github.com/RoblesT/pyttacker.git
== News and Events ==
+
</pre>
* [20 Nov 2013] News 2
+
[https://github.com/RoblesT/pyttacker/wiki Manual and How-to]
* [30 Sep 2013] News 1
 
 
 
 
 
== In Print ==
 
This project can be purchased as a print on demand book from Lulu.com
 
  
 +
== Timeline ==
 +
* [25 March 2014] Project created
 +
* [26 April 2014] New Alpha made public
 +
* [29 July 2015] Improvements were added
  
 
==Classifications==
 
==Classifications==
Line 87: Line 81:
  
 
=FAQs=
 
=FAQs=
 +
Have questions ?
  
; Q1
+
[mailto:[email protected] Send a message] or [https://lists.owasp.org/mailman/listinfo/owasp_pyttacker_project Subscribe]
: A1
+
; How to get?
 +
: Download it [https://github.com/RoblesT/pyttacker/archive/master.zip Here] or follow the instructions [https://github.com/RoblesT/pyttacker/wiki Here]
 +
 
 +
; How to install?
 +
: It is portable, no installation is required for using it
 +
 
 +
; Where can I use it?
 +
: The tool is coded in Python and has been tested on Linux (Ubuntu, Kali, Samurai), MAC and Windows
  
; Q2
 
: A2
 
  
 
= Acknowledgements =
 
= Acknowledgements =
 
==Volunteers==
 
==Volunteers==
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:
+
Pyttacker is developed by a worldwide team of volunteers. The primary contributors to date have been:
 
 
* xxx
 
* xxx
 
  
==Others==
+
* Mario Robles
* xxx
+
[mailto:[email protected] Join us !] or [https://lists.owasp.org/mailman/listinfo/owasp_pyttacker_project Subscribe]
* xxx
 
  
 
= Road Map and Getting Involved =
 
= Road Map and Getting Involved =
Line 115: Line 111:
 
#Add integration with tools like OWASP ZAP and Burp Suite"
 
#Add integration with tools like OWASP ZAP and Burp Suite"
  
Involvement in the development and promotion of XXX is actively encouraged!
+
Involvement in the development and promotion of Pyttacker is actively encouraged!
 
You do not have to be a security expert in order to contribute.
 
You do not have to be a security expert in order to contribute.
 
Some of the ways you can help:
 
Some of the ways you can help:
* xxx
+
* QA Testing | Bug reporting
* xxx
+
* Content Translation
 +
* Plugin Development
 +
* Core code improvements
  
  

Latest revision as of 15:59, 18 December 2015

OWASP Project Header.jpg

OWASP Pyttacker Project

The OWASP Pyttacker Project is a portable Web Server that include the features needed for every Pentester when creating reports, helping to create PoCs that show a more descriptive way to create awareness to the businesses by demonstrating realistic but inoffensive "attacks" included as part of the tool.

Introduction

Most of the time is spent on finding the bad stuff during a Web PenTest, writing reports is time consuming and you need to deliver the results as soon as possible, however in the end the one that will need to fix the issue (or push others to do it) will need to really understand the impact of the findings included in the report. When you show raw Database data from a SQLi it's very visible for your costumer that the impact is High, however when the finding need some other steps for being reproduced the impact become more complicated to be demonstrated to non technical people, just a "request" and "response" is not enough and how long are you willing to take for coding a working PoC and create a nice screenshot for being included in your report.

What about using "something" that is the server you mention as hypothetic 'evil.com' that can be used by the bad guys against your costumer's company, even better if you know that the evil server is not that "evil" and you have full control of it, would be nice to have "something" handy and portable for reproducing those findings and grab nice screen-shots, what about reproducing the finding during that meeting when you are trying to show the impact of your findings, not just a pop-up alert for XSS, what if you show an inoffensive but scaring partial defacement or a javascript keylogger in action.

Sounds good ? if yes then Pyttacker will be an interesting tool for you


Licensing

OWASP Pyttacker is free to use. It is licensed under GNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)


What is the OWASP Pyttacker Project?

Key characteristics:

  • Minimal requirements (Just Python and a Web Browser)
  • Cross-platform
  • Portable
  • Easy Plug-ins Implementation
  • Easy to use


Project Leader

Mario Robles


Supporters


Quick Download

git clone https://github.com/RoblesT/pyttacker.git

Manual and How-to

Timeline

  • [25 March 2014] Project created
  • [26 April 2014] New Alpha made public
  • [29 July 2015] Improvements were added

Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files TOOL.jpg

Have questions ?

Send a message or Subscribe

How to get?
Download it Here or follow the instructions Here
How to install?
It is portable, no installation is required for using it
Where can I use it?
The tool is coded in Python and has been tested on Linux (Ubuntu, Kali, Samurai), MAC and Windows


Volunteers

Pyttacker is developed by a worldwide team of volunteers. The primary contributors to date have been:

  • Mario Robles

Join us ! or Subscribe

As of March 2014, the priorities are:

"First Alpha version is ready but need more development time for including features that can be delegated to newcomers since the project is module based. The First Beta release is intended to be published on June 2014 including the PoC modules for CSRF, XSS, Open Redirect, XFS Next Steps:

  1. Add more PoC modules for more Vulnerabilities
  2. Add integration with tools like OWASP ZAP and Burp Suite"

Involvement in the development and promotion of Pyttacker is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • QA Testing | Bug reporting
  • Content Translation
  • Plugin Development
  • Core code improvements


PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP Pyttacker Project (home page)
Purpose: Pyttacker is a portable Web Server that include the features needed for every Pentester when creating reports, helping to create PoCs that show a more descriptive way to create awareness to the businesses by demonstrating realistic but inoffensive "attacks" included as part of the tool.
License: GNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)
who is working on this project?
Project Leader(s):
  • Mario Robles @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Key Contacts
  • Contact Mario Robles @ to contribute to this project
  • Contact Mario Robles @ to review or sponsor this project
current release
Not Yet Published
last reviewed release
Not Yet Reviewed


other releases