This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Category:OWASP Security Ninjas AppSec Training Program"

From OWASP
Jump to: navigation, search
(News and Events)
(OWASP Security Ninjas)
 
(20 intermediate revisions by one other user not shown)
Line 6: Line 6:
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
  
==OWASP Security Ninjas==
+
==OWASP Security Ninjas APPSEC Training Program==
Security Ninjas is an open-source Application Security Training Program.  
+
Security Ninjas is an open-source Application Security Training Program.
  
 
==Description==
 
==Description==
  
 
The training program slide deck covers the OWASP Top10 vulnerabilities and some general security best practices. The hands-on training lab consists of 10 fun real world like hacking exercises corresponding to each of the OWASP Top10 vulnerabilities.
 
The training program slide deck covers the OWASP Top10 vulnerabilities and some general security best practices. The hands-on training lab consists of 10 fun real world like hacking exercises corresponding to each of the OWASP Top10 vulnerabilities.
<span style="color:#ff0000">
 
This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful. 
 
</span>
 
 
 
  
 
==Licensing==
 
==Licensing==
  
  
This program is free software: you can redistribute it and/or modify it under the terms of the MIT License..   
+
This program is free software: you can redistribute it and/or modify it under the terms of the Apache License.   
  
 
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
 
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
  
 
== Project Resources ==
 
== Project Resources ==
<span style="color:#ff0000">
 
This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc.
 
</span>
 
 
[http://www.slideshare.net/OpenDNS/security-ninjas-opensource Slide Deck]
 
 
[https://github.com/opendns/Security_Ninjas_AppSec_Training/ Source Code]
 
  
[https://registry.hub.docker.com/u/opendns/security-ninjas/ Docker repo and instructions]
+
[https://docs.google.com/presentation/d/1ezyIem3OJrC7gWxmllG6LzLFjhpBDetOlQIfaocg1T8/ Slide Deck]
  
 +
[https://github.com/shrutiguptagt/Security_Ninjas_AppSec_Training Source Code]
  
 +
[https://registry.hub.docker.com/u/shrutiguptagt/security-ninjas/ Docker repo and instructions]
  
 
== Project Leader ==
 
== Project Leader ==
  
 +
* [[User:Shruti.gupta | Shruti Gupta]]
  
[Mailto:[email protected] Shruti Gupta]
+
==Project Sponsor==
 
+
{| width="10%" cellpadding="2"
== Related Projects ==
+
| align="center" valign="top" width="10px" rowspan="2"| [[File:OpenDNS_1.png|link=https://www.opendns.com]]
<span style="color:#ff0000">
+
|}
This is where you can link to other OWASP Projects that are similar to yours.
 
</span>
 
 
 
 
 
 
 
==Classifications==
 
 
 
  {| width="200" cellpadding="2"
 
  |-
 
  | colspan="2" align="center"  | [[File:Project_Type_Files_CODE.jpg|link=]]
 
  |-
 
  | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]
 
  | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=Builders]] 
 
  |-
 
  | align="center" valign="top" width="50%"| [[File:Owasp-breakers-small.png|link=Breakers]]
 
  |-
 
  |}
 
  
| valign="top"  style="padding-left:25px;width:200px;" |  
+
| valign="top"  style="padding-left:25px;width:100px;" |
  
 
== News and Events ==
 
== News and Events ==
Line 73: Line 47:
 
=FAQs=
 
=FAQs=
  
1. What is special about this project?
+
'''1. What is special about this project?
 +
'''
 
- This is one of the very few projects which offers systematic, guided hands-on AppSec training to folks with very minimal AppSec or Penetration Testing knowledge.
 
- This is one of the very few projects which offers systematic, guided hands-on AppSec training to folks with very minimal AppSec or Penetration Testing knowledge.
 
This would not only teach you how to find and exploit vulnerabilities but also hot to fix them and not have them in the first place! In today's world of advancing web attacks and seeing how complicated web applications are becoming, this training is something that every software engineer should take.
 
This would not only teach you how to find and exploit vulnerabilities but also hot to fix them and not have them in the first place! In today's world of advancing web attacks and seeing how complicated web applications are becoming, this training is something that every software engineer should take.
  
2. How much time does it take to set up the hands on lab?
+
'''2. How much time does it take to set up the hands on lab?
 +
'''
 
- If you use the docker build, it takes only a few seconds to setup the lab!
 
- If you use the docker build, it takes only a few seconds to setup the lab!
  
3. Is it hard to setup and destroy the hands-on lab container?
+
'''3. Is it hard to setup and destroy the hands-on lab container?
 +
'''
 
- It is super simple to set up and destroy the container. If use docker, there are no dependency issues as well, no matter what platform you are using!  
 
- It is super simple to set up and destroy the container. If use docker, there are no dependency issues as well, no matter what platform you are using!  
  
4. Why did I chose Docker?
+
'''4. Why did I chose Docker?
 +
'''
 
- Setting up and destroying the environment would be super easy and quick.  
 
- Setting up and destroying the environment would be super easy and quick.  
 
- The docker container would be sandboxed which means that the vulnerable application wouldn’t be able to harm the host OS.  
 
- The docker container would be sandboxed which means that the vulnerable application wouldn’t be able to harm the host OS.  
Line 102: Line 80:
  
 
==Roadmap==
 
==Roadmap==
The project is 100% complete.
+
The project is complete.
#https://s3.amazonaws.com/uploads.hipchat.com/56752/780760/3x4fL62dXpumdQd/upload.png.
 
 
 
#You can read the full [https://engineering.opendns.com/2015/03/16/security-ninjas-an-open-source-application-security-training-program/ blog] .  
 
  
 
==Getting Involved==
 
==Getting Involved==
  
If you have suggestions/ comments about how this project could be made better, please email [mailto:[email protected] Shruti Gupta] Shruti Gupta.
+
If you have suggestions/ comments about how this project could be made better, please email [mailto:[email protected] Shruti Gupta] .
 
 
 
 
=Minimum Viable Product=
 
I already have the deliverables 100% ready:
 
 
 
The Application Security Training Program consists of a slide deck which is [http://www.slideshare.net/OpenDNS/security-ninjas-opensource here]
 
 
 
and the Source Code can be found [https://github.com/opendns/Security_Ninjas_AppSec_Training/ here]
 
 
 
It is fastest (takes less than 10 seconds to deploy and run) to setup and run the hands on lab in a Docker container. The docker repo and instructions are [https://registry.hub.docker.com/u/opendns/security-ninjas/ here]
 
  
  

Latest revision as of 16:56, 22 August 2016

OWASP Project Header.jpg

OWASP Security Ninjas APPSEC Training Program

Security Ninjas is an open-source Application Security Training Program.

Description

The training program slide deck covers the OWASP Top10 vulnerabilities and some general security best practices. The hands-on training lab consists of 10 fun real world like hacking exercises corresponding to each of the OWASP Top10 vulnerabilities.

Licensing

This program is free software: you can redistribute it and/or modify it under the terms of the Apache License.

Project Resources

Slide Deck

Source Code

Docker repo and instructions

Project Leader

Project Sponsor

OpenDNS 1.png

News and Events

[May 1 2015] Security Ninjas released


1. What is special about this project? - This is one of the very few projects which offers systematic, guided hands-on AppSec training to folks with very minimal AppSec or Penetration Testing knowledge. This would not only teach you how to find and exploit vulnerabilities but also hot to fix them and not have them in the first place! In today's world of advancing web attacks and seeing how complicated web applications are becoming, this training is something that every software engineer should take.

2. How much time does it take to set up the hands on lab? - If you use the docker build, it takes only a few seconds to setup the lab!

3. Is it hard to setup and destroy the hands-on lab container? - It is super simple to set up and destroy the container. If use docker, there are no dependency issues as well, no matter what platform you are using!

4. Why did I chose Docker? - Setting up and destroying the environment would be super easy and quick. - The docker container would be sandboxed which means that the vulnerable application wouldn’t be able to harm the host OS.


Volunteers


The first contributors to the project were:

  • Shruti Gupta Shruti Gupta created the OWASP Security Ninjas project


Roadmap

The project is complete.

Getting Involved

If you have suggestions/ comments about how this project could be made better, please email Shruti Gupta .


This category currently contains no pages or media.