This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP D4N155"

From OWASP
Jump to: navigation, search
m (LOGO)
m
Line 17: Line 17:
 
==Description==
 
==Description==
  
[[File:Owasp-d4n155-logo.png|thumb|''D4N155 Logo'']]<span style="color:#ff0000">
+
[[File:Owasp-d4n155-logo.png|thumb|''D4N155 Logo'']]
  
<span style="color:#ff0000">
+
<span>
This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.
+
On the abstract we can presume that this isn’t just another pentest tool this is a truly powerful tool, that integrate various key features of another projects and ideas of the developers and aggregate then in a same place.
 
</span>
 
</span>
 +
==== KEY FEATURES ====
 +
* Search vulnerable url’s
 +
* Anonymous feature
 +
* Make a smart wordlist based on page content
 +
* Totally CLI (BASH + PYTHON)
 +
* FREE SOFTWARE IN LICENSE(GPL V3) AND IN ESSENCE
 +
*  Automatic Report Feature with two options:
 +
**  PDF
 +
**  HTML Where it generate a dynamic graphic for quick visualization
  
The Tool Project Template is simply a sample project that was developed for instructional purposes that can be used to create default project pages for a Tool project.  After copying this template to your new project, all you have to do is follow the instructions in red, replace the sample text with text suited for your project, and then delete the sections in red.  Doing so should make it clearer to both consumers of this project, as well as OWASP reviewers who are trying to determine if the project can be promoted to the next category.  The information requested is also intended to help Project Leaders think about the roadmap and feature priorities, and give guidance to the reviews as a result of that effort.
 
  
Creating a new set of project pages from scratch can be a challenging task.  By providing a sample layout, with instructional text and examples, the OWASP Tool Project Template makes it easier for Project Leaders to create effective security projects and hence helps promote security.
+
People with bad intentions dedicate a long part of their time to read profiles,posts analyzing then, observing reactions with in order to obtain the maximum information about their targets in order to make their list(of passwords) and the door for attack. Even if you do not have specific knowledge, so you may be using this tool will help you get a sense of how vulnerable you are and consequently take action and prevent a possible attack.  
  
Contextual custom dictionary builder with character substitution and word variations for pen-testers
+
Besides this it’s a friendly tool for a pentester with the features of automatics reports the professional can save time, writing extensive reports with pages of print screens, technician reports and transcription of procedures this tool can make a half of a job for him.
 +
 
 +
==Operations==
 +
The process of password speculation is performed using various functions, all using recursive ones, as the equation shows.
 +
 
 +
<code>
 +
λ→(η) = Op.
 +
</code>
 +
 
 +
===Combinatorial Analysis===
 +
The code follows combinatorial analysis in order to speculate passwords and we’ll explain next.
 +
 
 +
===Combinatorial Enumerative===
 +
<code>
 +
Enumerative combinatorial is more classical area of combinatorics and concentrates on counting the number of combinatorial objects
 +
</code>
  
 
==Licensing==
 
==Licensing==

Revision as of 16:36, 29 March 2019

OWASP Project Header.jpg

Project About

PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: N/A
Purpose: N/A
License: N/A
who is working on this project?
Project Leader(s):
  • Julio Lira
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: N/A
Project Roadmap: Not Yet Created
Key Contacts
  • Contact Julio Lira to contribute to this project
  • Contact Julio Lira to review or sponsor this project
current release
pending
last reviewed release
pending


other releases


OWASP Tool Project D4N155

The project use OSINT for dynamic and smart attack of brute force, until recently, using a complex password based on common things of your day was somewhat advisable, the project somehow creates this possibility of attack but mostly defense

Description

D4N155 Logo

On the abstract we can presume that this isn’t just another pentest tool this is a truly powerful tool, that integrate various key features of another projects and ideas of the developers and aggregate then in a same place.

KEY FEATURES

  • Search vulnerable url’s
  • Anonymous feature
  • Make a smart wordlist based on page content
  • Totally CLI (BASH + PYTHON)
  • FREE SOFTWARE IN LICENSE(GPL V3) AND IN ESSENCE
  • Automatic Report Feature with two options:
    • PDF
    • HTML Where it generate a dynamic graphic for quick visualization


People with bad intentions dedicate a long part of their time to read profiles,posts analyzing then, observing reactions with in order to obtain the maximum information about their targets in order to make their list(of passwords) and the door for attack. Even if you do not have specific knowledge, so you may be using this tool will help you get a sense of how vulnerable you are and consequently take action and prevent a possible attack.

Besides this it’s a friendly tool for a pentester with the features of automatics reports the professional can save time, writing extensive reports with pages of print screens, technician reports and transcription of procedures this tool can make a half of a job for him.

Operations

The process of password speculation is performed using various functions, all using recursive ones, as the equation shows.

λ→(η) = Op.

Combinatorial Analysis

The code follows combinatorial analysis in order to speculate passwords and we’ll explain next.

Combinatorial Enumerative

Enumerative combinatorial is more classical area of combinatorics and concentrates on counting the number of combinatorial objects

Licensing

GNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)

Roadmap

As of November, 2013, the highest priorities for the next 6 months are:

  • Complete the first draft of the Tool Project Template
  • Get other people to review the Tool Project Template and provide feedback
  • Incorporate feedback into changes in the Tool Project Template
  • Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project

Subsequent Releases will add

  • Internationalization Support
  • Additional Unit Tests
  • Automated Regression tests

Getting Involved

Involvement in the development and promotion of Tool Project Template is actively encouraged! You do not have to be a security expert or a programmer to contribute. Some of the ways you can help are as follows:

Project Resources

Installation Package

Source Code

What's New (Revision History)

Documentation

Issue Tracker

Video

Operation of D4N155

Project Leader

Julio Pedro de Lira Neto (@jul10l1r4)

Related Projects

Classifications

Project Type Files TOOL.jpg
Incubator Project Owasp-builders-small.png
Owasp-defenders-small.png
Affero General Public License 3.0