This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Newsletter 3"
Dinis.cruz (talk | contribs) |
Dinis.cruz (talk | contribs) (→Interresting Discussion Threads) |
||
Line 63: | Line 63: | ||
* [[San_Francisco]] | * [[San_Francisco]] | ||
* With Minor updates: [[Bytecode obfuscation]], [[Chapters Assigned]], [[:Category:OWASP Top Ten Project]] | * With Minor updates: [[Bytecode obfuscation]], [[Chapters Assigned]], [[:Category:OWASP Top Ten Project]] | ||
+ | |||
+ | ==== Latest Blog entries ==== | ||
+ | * on [http://blogs.owasp.org/orizon/|Orizon post] | ||
+ | ** [http://blogs.owasp.org/orizon/2007/01/22/parsing-freedom/| Parsing freedom] | ||
==== Interresting Discussion Threads ==== | ==== Interresting Discussion Threads ==== | ||
Line 68: | Line 72: | ||
**[http://lists.owasp.org/pipermail/owasp-testing/2007-January/001324.html|Code Review project and Code-Scanning-Tool(s)] | **[http://lists.owasp.org/pipermail/owasp-testing/2007-January/001324.html|Code Review project and Code-Scanning-Tool(s)] | ||
** [http://lists.owasp.org/pipermail/owasp-testing/2007-January/001349.html|OSSTMM manual] and [http://lists.owasp.org/pipermail/owasp-testing/2007-January/001384.html| OSSTMM manual, followup by Pete about OSS] | ** [http://lists.owasp.org/pipermail/owasp-testing/2007-January/001349.html|OSSTMM manual] and [http://lists.owasp.org/pipermail/owasp-testing/2007-January/001384.html| OSSTMM manual, followup by Pete about OSS] | ||
− | |||
==== OWASP Community ==== | ==== OWASP Community ==== |
Revision as of 23:29, 22 January 2007
will be Sent to owasp-all mailing list on 22th Jan 2007
OWASP Newsletter #3 – January 16th 2006 to January 22th 2007
Welcome to OWASP Newsletter #3. I would like start by asking you all to be a little bit more active with OWASP projects (note that ALL pages on the www.owasp.org website are WIKI pages which you can edit directly (all you need is an account which you can create in 1 minute)).
We need more feedback on our tools, more comments on our documents and more development in our projects (if you want to collaborate but are not sure how, drop me an email and I will channel your energies to a relevant active project). I added a new section to this newsletter called 'OWASP Projects that need your help' with the idea to give you a heads up on projects that need help (also if you are a project leader, please feel free to add your requests to the next version of the newsletter). Remember that OWASP is a Open Community that is made by its members (and the more you contribute the more you and your company will benefit).
I would like to give a big welcome to our new [[chapter from my home country Portugal, say that the latest Beta version of OWASP Live CD is now released and ready for your tests, and that projects like the OWASP Java Project (featured below) are producing amazing material but need more colaboration (and let's not even talk about the OWASP Java Project which I am supposed to developing and is currently going noware (with some noble exceptions (Mike and Boris thx))]].
If all goes as planned, next week we will be releasing the first 'Release Candidate' version of the OWASP Top 10 2007 document which we want you all to take a good look (the plan is to have a wide peer review process and only release the final version when it is ready)
As normal you can find below the links to the latest WIKI changes (with a new section for 'Interresting Discussion Threads' on our mailing lists)
And don't forget, if you want something to appear in the next version, please add it to OWASP Newsletter 4
Dinis Cruz Chief OWASP Evangelist London, UK
OWASP Projects that need your help
- Java Project: Convert Mark Petrovic's article Discovering a Java Application's Security Requirements into the WIKI (contact Stephen de Vries if you are interrested)
- .NET Project: Add PDP GnuCitizen AttackAPI to OWASP Site Generator and convert the php files into ASP.NET
- OWASP Testing Project v2.0 - Now that the The OWASP Testing Guide v2.0 has reached the 'Release Candidate 1 milestone, the time has come to make sure that everything is 100% and that there is nothing major missing (review process ends on the 10th of Feb).
- OWASP WebScarab NG Project - New version is already very usable and we need your feedback
Featured Project: OWASP Java Project
The Category:OWASP Java Project's goal is to enable Java and J2EE developers to build secure applications efficiently. See the OWASP Java Project Roadmap for more information on our plans.
Some links from OWASP Java Table of Contents:
- How to perform HTML entity encoding in Java to prevent Cross Site Scripting attacks
- JAAS Tomcat Login Module - an example of how to implement a time delayed JAAS login module in Tomcat
- Securing Apache Tomcat - a guide for deployers on how to secure Apache Tomcat
- Hashing in Java - how to securely implement cryptographic hashing in Java
- Java Security Resources
- and How to add validation logic to HttpServletRequest, Declarative Access Control in Java, Protecting code archives with digital signatures, JAAS Timed Login Module
Featured Project: OWASP Live CD
The BETA Release of OWASP LiveCD ready for testing.
This distro is Beta Version 0.8 named "LabRat" and is part of the OWASP Autumn of Code sponsorship. The distro is focused on providing all of OWASP tools and documents on a bootable CD. The goal is to have a portable distro that can be used by professional penetration testers,security admins, Students, or anyone interested in computer security to perform work,training, or research. All you have to do is burn the .ISO to DVD or start under Vmware/Virtual PC and you will have a full Linux desktop environment loaded with OWASP tools and documents.
The distro can be downloaded from the PacketFocus website (http://packetfocus.com/hackos/AOC_Labrat-ALPHA-0008.iso) ((800mb)) After you download it just burn it to a DVD or use something like Vmware server to try it out. Vmware is a free download now (www.vmware.com)
Latest additions to the WIKI
New Pages
- PDF Attack Filter for Apache mod rewrite - PDF Attack Filter for Apache mod rewrite, served by Apache with mod_rewrite installed.
- Struts XSLT Viewer
- Reviewing code for XSS issues
- OWASP WebScarab NG Project Technical Info, if you want to know what is happening under the hood of the new version of OWASP WebScarab NG Project
- with some content Portuguese (new chapter), All clients can be reverse engineered, monitored, and modified, Native Methods, Long long ago..., Java applet code review
Updated pages
- OWASP student projects - Updated with new ideas for projects
- How OWASP Works - Updated information on OWASP's board current structure and future plans
- Phoenix/Tools
- San_Francisco
- With Minor updates: Bytecode obfuscation, Chapters Assigned, Category:OWASP Top Ten Project
Latest Blog entries
Interresting Discussion Threads
- in [Owasp-testing]
OWASP Community
- Feb 15 (18:00h) - Seattle chapter meeting
- Feb 13 (18:00h) - Ireland chapter meeting
- Feb 6 (18:00h) - Melbourne chapter meeting
- Jan 31 (15:00h) - Mumbai chapter meeting
- Jan 30 (11:30h) - Austin chapter meeting
- Jan 25 (18:00h) - San Francisco chapter meeting
- Jan 25 (14:30h) - Italy@ISACA Rome
- Jan 24 (17:30h) - 6th OWASP Israel chapter meeting
- Jan 23 (18:00h) - Belgium chapter meeting
Application Security News
- Web Application Security Professionals Survey (Jan. 2007) - Jeremiah Grossman just released his survey with lots of very interresting data. Make sure you check out section '11) Top 3 web application security resources' which is a nice database of the most popular vulnerability assessment tools and knowledge resources (#1 was RSnake's Blog, and #2 was OWASP :) )
- Don't take security advice from the devil you know! - He lies. Especially about security flaws. This article notes an increase in vulnerabilities found in open source packages and concludes that... "For the personal sites and the mom-and-pop stores that rely on the software, it certainly affects them," Martin said. "But larger companies likely aren't affected." Right.
- Hackers attack MoneyGram International server, breach personal info of 80,000 customers - A MoneyGram International server has been breached, allowing cybercrooks access to the personal information of nearly 80,000 people. Hackers accessed the server through the web sometime last month, the money-transfer company said in a statement released on Friday.
- Also worth a read: A Rude Awakening , Making Security Rewarding Discovering a Java Application's Security Requirements, Security Startups Make Debut, Source Code Specialist Fortify to Buy Secure Software , Ajax Sniffer - Prrof of concept, Decoding the Google Blacklist, Visual WebGui Announces The Dot.Net Answer To Google's GWT
OWASP references in the Media
- Lock it down: Use the OWASP Top Ten to secure your Web applications -- Part 1, Builder.com, Jan 19, 2007