This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "User talk:T.Gigler"
(headertabRight=JAVA2) |
(first DRAFT for Top10: top table test) |
||
(15 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
You will probably want to read the [[Help:Contents|help pages]]. | You will probably want to read the [[Help:Contents|help pages]]. | ||
Again, welcome and have fun! [[User:KateHartmann|KateHartmann]] 21:42, 30 January 2013 (UTC) | Again, welcome and have fun! [[User:KateHartmann|KateHartmann]] 21:42, 30 January 2013 (UTC) | ||
− | + | ---- | |
+ | ---- | ||
+ | <br>{{Top_10_2010:SubsectionColoredTemplate|'''Everything below this line is test wiki markup and should be ignored.'''||year=2010}}<br> | ||
+ | ---- | ||
{{Top 10 DeveloperEdition:NavigationByHeadertab_Test | {{Top 10 DeveloperEdition:NavigationByHeadertab_Test | ||
|headertab=JAVA | |headertab=JAVA | ||
Line 21: | Line 24: | ||
|language=de | |language=de | ||
}} | }} | ||
+ | |||
+ | {{LinkBar |useprev=2013PrevHeaderTabDeveloperEdition |prev=A6-Verlust der Vertraulichkeit sensibler Daten |lblprev=JAVA2 |usenext=2013NextHeaderTabDeveloperEdition |next=A7-Fehlerhafte Autorisierung auf Anwendungsebene |lblnext=JAVA2 |usemain=Nothing |year=2013 |language=de }} | ||
+ | |||
+ | {{LinkBar |useprev=Nothing |usenext=2013NextHeaderTabDeveloperEdition |next=A7-Fehlerhafte Autorisierung auf Anwendungsebene |lblnext=JAVA2 |usemain=Nothing |year=2013 |language=de }} | ||
+ | |||
+ | <div style="background-color: #FFFF66; color: #204A7F; font-size: 170%; line-height: 105%; padding: 6px; padding-top: 4px; font-weight: bold; border:2px solid #204A7F; border-right: none; border-left: none; margin: 0;"> | ||
+ | Design-Test<div style="background-color: #B2FF66;">This Page has is up to date, but it may need a nicer design! <small>Please help OWASP to</small> [[:Category:FIXME|FixME]].</div> | ||
+ | </div> | ||
+ | |||
+ | Tests with the 'Time' functon:<br/> | ||
+ | 27.08.2014: Year = {{#time: Y|27.08.2014}}<br/> | ||
+ | 2014-08-28: {{#time: Y-M-d|2014-08-28}} | ||
+ | |||
+ | ---- | ||
+ | ---- | ||
+ | <span id="cheat_sheet_test"></span> <!-- anchor for cheat sheets: -> https://www.owasp.org/index.php/User_talk:T.Gigler#cheat_sheet_test --> | ||
+ | <div style="width:100%;font-size:160%;border:0,margin:0;overflow: hidden;">'''FIRST DRAFT for Cheat Sheets:''' </div> | ||
+ | <br> | ||
+ | __NOTOC__ | ||
+ | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:Cheatsheets-header.jpg|link=]]</div> | ||
+ | {{ColoredBackground|text=Cheat Sheet|color=white|font-size=180%|background-color=#6261e1|border=3px solid|border-color=#204A7F|border-top=none}}<!---- Title ----> | ||
+ | |||
+ | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
+ | __TOC__{{TOC hidden}} | ||
+ | {{Top_10:SubsectionTableBeginTemplate|type=headertab}} | ||
+ | <h1>{{Top_10_2010:SubsectionAdvancedTemplate | ||
+ | |type={{Top_10_2010:StyleTemplate}} | ||
+ | |subsection=freetext | ||
+ | |title={{ColoredBackground|text=Introduction|color=white|font-size=100%|background-color=#6261e1|border=none}} | ||
+ | |position=firstLeft | ||
+ | |year=2010 | ||
+ | |language=en | ||
+ | }}</h1> | ||
+ | 1st box | ||
+ | <h1>{{Top_10_2010:SubsectionAdvancedTemplate | ||
+ | |type={{Top_10_2010:StyleTemplate}} | ||
+ | |subsection=freetext | ||
+ | |title={{ColoredBackground|text=Rules|color=white|font-size=100%|background-color=#6261e1|border=none}} | ||
+ | |position=firstLeft | ||
+ | |year=2010 | ||
+ | |language=en | ||
+ | }}</h1> | ||
+ | 2nd box | ||
+ | {{Top_10_2010:ExampleBeginTemplate|year=2010}} | ||
+ | Example: Description<br> | ||
+ | <nowiki>#</nowiki>example commands<br> | ||
+ | <small> | ||
+ | Example Output | ||
+ | </small> | ||
+ | {{Top_10_2010:ExampleEndTemplate}}<br> | ||
+ | <h1>{{Top_10_2010:SubsectionAdvancedTemplate | ||
+ | |type={{Top_10_2010:StyleTemplate}} | ||
+ | |subsection=freetext | ||
+ | |title={{ColoredBackground|text=Related Articles|color=white|font-size=100%|background-color=#6261e1|border=none}} | ||
+ | |position=firstLeft | ||
+ | |year=2010 | ||
+ | |language=en | ||
+ | }}</h1> | ||
+ | 3rd box | ||
+ | <h1>{{Top_10_2010:SubsectionAdvancedTemplate | ||
+ | |type={{Top_10_2010:StyleTemplate}} | ||
+ | |subsection=freetext | ||
+ | |title={{ColoredBackground|text=Authors and Primary Editors|color=white|font-size=100%|background-color=#6261e1|border=none}} | ||
+ | |position=firstLeft | ||
+ | |year=2010 | ||
+ | |language=en | ||
+ | }}</h1> | ||
+ | 4th box | ||
+ | {{Top_10_2010:SubsectionAdvancedTemplate | ||
+ | |type={{Top_10_2010:StyleTemplate}} | ||
+ | |subsection=freetext | ||
+ | |title={{ColoredBackground|text=Other Cheatsheets|color=white|font-size=100%|background-color=#6261e1|border=none}} | ||
+ | |position=firstLeft | ||
+ | |year=2010 | ||
+ | |language=en | ||
+ | }}{{Cheatsheet_Navigation_Body}} | ||
+ | {{Top_10:SubsectionTableEndTemplate}} | ||
+ | |||
+ | ---- | ||
+ | ---- | ||
+ | <span id="top10_top_table_test"></span> <!-- anchor for cheat sheets: -> https://www.owasp.org/index.php/User_talk:T.Gigler#top10_top_table_test --> | ||
+ | == Top 10: Top Table Test == | ||
+ | {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2017|language=en}} | ||
+ | {{Top_10:SummaryTableTemplate|exploitability=3|prevalence=3|detectability=2|impact=1|year=2017|language=en}} | ||
+ | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}} | ||
+ | <td colspan=2 {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}> | ||
+ | <!--- Threat Agents: --->Even anonymous attackers typically don’t break crypto directly. They break something else, such as steal keys, do man-in-the-middle attacks, or steal clear text data off the server, while in transit, or from the user’s browser. | ||
+ | </td> | ||
+ | <td colspan=2 {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}> | ||
+ | <!--- Security Weakness --->The most common flaw is simply not encrypting sensitive data. When crypto is employed, weak key generation and management, and weak algorithm usage is common, particularly weak password hashing techniques. For data in transit server side weaknesses are mainly easy to detect, but hard for data in rest. Both with very varying exploitability. | ||
+ | </td> | ||
+ | <td colspan=2 {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}> | ||
+ | <!--- Technical and Business Impacts --->Failure frequently compromises all data that should have been protected. Typically, this information includes sensitive data such as health records, credentials, personal data, credit cards, etc.<br> The business impact depends on the protection needs of your application and data. | ||
+ | </td> | ||
+ | {{Top_10_2010:SummaryTableEndTemplate|year=2017}} |
Latest revision as of 20:18, 30 September 2017
Welcome to OWASP! We hope you will contribute much and well. You will probably want to read the help pages. Again, welcome and have fun! KateHartmann 21:42, 30 January 2013 (UTC)
{{LinkBar |useprev=2013PrevHeaderTabDeveloperEdition |prev=A6-Verlust der Vertraulichkeit sensibler Daten |lblprev=JAVA2 |usenext=2013NextHeaderTabDeveloperEdition |next=A7-Fehlerhafte Autorisierung auf Anwendungsebene |lblnext=JAVA2 |usemain=Nothing |year=2013 |language=de }}
Tests with the 'Time' functon:
27.08.2014: Year = 2014
2014-08-28: 2014-Aug-28
Last revision (mm/dd/yy): 09/30/2017
Top 10: Top Table Test
Threat Agents / Attack Vectors | Security Weakness | Impacts | |||
---|---|---|---|---|---|
App Specific | Exploitability DIFFICULT |
Prevalence UNCOMMON |
Detectability AVERAGE |
Impact SEVERE |
Business ? |
Even anonymous attackers typically don’t break crypto directly. They break something else, such as steal keys, do man-in-the-middle attacks, or steal clear text data off the server, while in transit, or from the user’s browser. |
The most common flaw is simply not encrypting sensitive data. When crypto is employed, weak key generation and management, and weak algorithm usage is common, particularly weak password hashing techniques. For data in transit server side weaknesses are mainly easy to detect, but hard for data in rest. Both with very varying exploitability. |
Failure frequently compromises all data that should have been protected. Typically, this information includes sensitive data such as health records, credentials, personal data, credit cards, etc. |