This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Category:OWASP Code Review Project"

From OWASP
Jump to: navigation, search
(Slight update)
 
(139 intermediate revisions by 8 users not shown)
Line 1: Line 1:
== Modelo de Auditoría de sistemas:  ==
+
<div style="width:100%;height:90px;border:0,margin:0;overflow: hidden;">[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]</div>
 +
<div style="border:0,margin:0;overflow: hidden;">
 +
{{OWASP Defenders}} {{OWASP Book|5691953}}
 +
<div style="margin: 5px; padding: 5px; float: left; width:70%">{{Social Media Links}} </div>
 +
</div>
 +
=Code Review Guide=
 +
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 +
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |
 +
==The Release Candidate for the OWASP Code Review Guide is now available!==
 +
Please forward to all the developers and development teams you know!! We would like to immediately start raising awareness about this OWASP resource.
 +
We plan to release the final version in Aug. 2017 after a public comment period ending July 31, 2017.
  
Éste es un modelo universal para securizar en un alto grado de seguridad al sistema operativo.
+
Thank you,
 +
Larry Conklin, Gary Robinson
 +
OWASP Code Review Guides Co-Leaders
  
#Sistema de cifrado congelado: Mantiene en secreto la ubicación del archivo del sistema, previniendo ataques de tipo monitoreo de redes.  
+
==Introduction==
#OpenVAS: Línea de comandos para cifrar- descifrar el protocolo TCP/Ip
+
OWASP Code Review Guide is a technical book written for those responsible for code reviews (management, developers, security professionals). The primarily focus of this book has been divided into two main sections. Section one is why and how of code reviews and sections two is devoted to what vulnerabilities need to be to look for during a manual code review. While security scanners are improving every day the need for manual security code reviews still needs to have a prominent place in organizations SDLC (Secure development life cycle) that desires good secure code in production.
#Filtro Web: Previene intrusiones a través de puertos inseguros
 
#Clam Antivirus: Previene, detecta y corrige virus informático
 
  
<br>
+
Second sections deals with vulnerabilities. It is based on the poplar OWASP 2013 top 10.  Here you will find most of the code examples for both on what not to do and on what to do. A word of caution on code examples; Perl is famous for its saying that there are 10,000 ways to do one thing. The same is true for C#, PHP and Java or any other computer language. Now add in "Object-Oriented Programming" and if we are using design patterns or even what designs patterns are being used and sample code becomes very “iff” in what to write. We tried to keep the sample code so code reviews can see red flags and not “do it my way or else”.
  
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
+
The last section is the appendix. Here we have content like code reviewer check list, etc. of items that really don’t flow in book form but needed to be included to make the code review guide compete.
|-
 
| Clam Antivirus
 
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
 
|-
 
| Filtro Web
 
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
 
|-
 
| OpenVAS
 
{| border="1" cellspacing="1" cellpadding="1" width="200" align="center"
 
|-
 
| Sistema de Cifrado Congelado
 
|}
 
 
 
|}
 
  
|}
+
==Review of Code Review Guide 2.0==
 +
Constructive comments on this OWASP Code Review Release Candidate should be forwarded via email to  [email protected]. Private comments may be sent to [email protected] or [email protected] . All comments are welcome. All comments should indicate the specific relevant page and section.
  
|}
+
All feedback is critical to the continued success of the OWASP Code Review Guide.
  
== Descripción softwares de auditoría  ==
+
==Licensing==
 +
OWASP Code Review Guide is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
  
*El sistema de cifrado http://truecrypt.org cifra el núcleo del sistema operativo y los discos lógicos impidiendo ataques espía.
 
  
*Los comandos shell http://openvas.org sirven para analizar protocolos de red, detección de virus y cifrado del protocolo IpV4-6
+
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
  
*El filtro web http://freenetproject.org es una técnica que reemplaza al Firewall, discriminando puertos inseguros, ahorrando tiempo de procesamiento en el núcleo del sistema.
+
== Project Leader ==
 +
* Larry Conklin [mailto:larry.conklin@owasp.org]
 +
* Gary Robinson [mailto:gary.[email protected]]
  
*Clamwin.com es un software de código abierto, no usa computación en la nube y tiene una GUI que detecta virus en línea http://sourceforge.net/projects/clamsentinel
+
== Project Email ==
 +
* Project Email [mailto:owasp-codereview-project@owasp.org]
  
== Macroinformática  ==
+
==Classifications==
 +
[[File:Owasp-defenders-small.png|link=]]
  
La macroinformática comprende eficiencia, seguridad y naturaleza. La eficacia de un sistema operativo se mide por la interacción hombre-máquina, sintetizando aplicaciones minimalistas y ejecutándolas nuestro sistema operativo procesará los datos eficientemente, ejemplos:
+
[[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]
  
*Transmisión cifrada: Cliente e-mail con GnuPG
+
[[File:Project_Type_Files_DOC.jpg|link=]]
  
http://fellowship.fsfe.org
+
== Related Projects ==
  
*Sistema de cifrado: Cifra y descifra texto plano, imágenes, etc..
+
OWASP Testing Guide [https://www.owasp.org/index.php/OWASP_Testing_Project]
  
#ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.11.exe
 
#http://cryptophane.googlecode.com/files/cryptophane-0.7.0.exe
 
  
*Ruby: Lenguaje de programación experimental
+
| valign="top"  style="padding-left:25px;width:200px;" |
  
http://ruby-lang.org  
+
== Quick Download ==
 +
* [https://www.owasp.org/index.php/File:OWASP_Code_Review_Guide_v2.pdf Code Review Guide 2.0]
  
*J2re1.3.1_20: Ejecutable de objetos interactivos o applets
+
== In Print ==
 +
Code Review Guide 2.0 will be available in Lulu in the near future.
  
http://java.sun.com/products/archive/j2se/1.3.1_20/index.html
+
[http://www.lulu.com/content/5678680 Code Review Guide V1.1] on Lulu.
 
+
|}
*Escritorio: Gestor de ventanas X11
 
 
 
http://windowmaker.info
 
 
 
*Gnuzilla: Navegador seguro y de uso libre
 
 
 
http://code.google.com/p/iceweaselwindows/downloads/list
 
 
 
*Gnupdf: Visor de formato de texto universal pdf
 
 
 
http://blog.kowalczyk.info/software/sumatrapdf
 
 
 
*Gnuflash: Jugador alternativo a flash player
 
 
 
http://gnu.org/software/gnash
 
 
 
*Zinf: Reproductor de audio
 
 
 
http://zinf.org
 
 
 
*Informática forense: Análisis de datos ocultos en el disco duro
 
 
 
http://sleuthkit.org
 
 
 
*Compresor: Comprime datos sobreescribiendo bytes repetidos
 
 
 
http://peazip.sourceforge.net
 
 
 
*Ftp: Gestor de descarga de archivos
 
 
 
http://dfast.sourceforge.net
 
 
 
*AntiKeylogger: Neutraliza el seguimiento de escritorios remotos (Monitoring)
 
 
 
http://psmantikeyloger.sourceforge.net
 
 
 
*Password manager: Gestión de contraseñas
 
 
 
http://passwordsafe.sourceforge.net
 
 
 
*Limpiador de disco: Borra archivos innecesrios del sistema
 
 
 
http://bleachbit.sourceforge.net
 
 
 
*Desfragmentador: Reordena los archivos del disco duro, generando espacio virtual
 
 
 
http://kessels.com/jkdefrag
 
 
 
*X11: Gestor de ventanas, reemplazo de escritorio Xwindow's
 
 
 
http://bb4win.org
 
 
 
*Open Hardware: Hardware construído por la comunidad Linux
 
 
 
http://open-pc.com
 
 
 
*Open WRT: Firmware libre para configurar transmisión de Internet
 
 
 
http://openwrt.org
 
 
 
*Gnu- Linux: Sistema operativo universal
 
 
 
http://gnewsense.org
 
 
 
== Biocriptoseguridad ==: Es la unión de la biología, criptografía y hacking ético para formar una defensa stándar contra virus complejos.
 
 
 
Implementación de la biocriptoseguridad informática:
 
 
 
#Amplificar la banda ancha
 
#Optimizar (limpiar- modificar) el sistema operativo
 
#Desfragmentar los discos lógicos
 
#Ocultar el sistema operativo
 
#Configurar antivirus
 
#Limpiar y desfragmentar
 
#Congelar
 
 
 
*Sistema inmune._ Defensa biológica natural contra infecciones como virus http://immunet.com
 
 
 
*Criptografía._ Método de escritura oculta por caractes, números y letras:—{H}/gJa¢K¡Ng÷752%\*)A>¡#(W|a— http://diskcryptor.net
 
 
 
*Hacking ético._ Auditoría de sistemas informáticos que preserva la integridad de los datos.
 
 
 
Congelador: Mantiene el equilibrio en la integridad de los datos, el sistema operativo, red , memoria ram, ciclos de CPU, espacio en disco duro e incidencias de malware
 
 
 
*http://code.google.com/p/hzr312001/downloads/detail?name=Deep%20systemze%20Standard%20Version%206.51.020.2725.rar&amp;can=2&amp;q= (para Window's)
 
*http://sourceforge.net/projects/lethe (para GNU/Linux)
 
 
 
<br>Auditoría de virus cifrado._ Un criptovirus se oculta tras un algoritmo de criptografía, generalmente es híbrido simétrico-asimétrico con una extensión de 1700bit's, burla los escáneres antivirus con la aleatoriedad de cifrado, facilitando la expansión de las botnet's. La solución es crear un sistema operativo transparente, anonimizarlo y usar herramientas de cifrado stándar de uso libre:
 
 
 
*Gnupg: Sirve para cifrar mensajes de correo electrónico http://gpg4win.org/download.html
 
  
*Open Secure Shell: Ofuscador TcpIp, protege el túnel de comunicación digital cifrando la Ip. http://openvas.org
+
= Acknowledgements =
 +
The OWASP Code Review project was conceived by Eoin Keary, the OWASP Dublin Founder and Chapter Lead.
  
*Red protegida: DNS libre http://namespace.org/switch
+
Code Review Mailing list[mailto:owasp-codereview-project@owasp.org]
  
*Criptosistema simétrico: Encapsula el disco duro, incluyendo el sistema operativo,usando algoritmo Twofish http://truecrypt.org/downloads.php
+
Project leaders [mailto:[email protected] [email protected]] or [mailto:gary.robinson@owasp.org gary.robinson@owasp.org]
  
*Proxy cifrado: Autenticación de usuario anónimo http://torproject.org
+
__NOTOC__ <headertabs />
  
Energías renovables._ Son energías adquiridas por medios naturales: hidrógeno, aire, sol que disminuyen la toxicidad de las emisiones de Co2 en el medio ambiente, impulsando políticas ecologistas contribuímos a preservar el ecosistema. Ejm: Usando paneles solares fotovoltaicos.
+
[[Category:OWASP Project]]  [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]

Latest revision as of 10:29, 14 July 2017

Lab big.jpg
OWASP Defenders logo.png This project is part of the OWASP Defenders community.
Feel free to browse other projects within the Defenders, Builders, and Breakers communities.
OWASP Books logo.png This project has produced a book that can be downloaded or purchased.
Feel free to browse the full catalog of available OWASP books.

The Release Candidate for the OWASP Code Review Guide is now available!

Please forward to all the developers and development teams you know!! We would like to immediately start raising awareness about this OWASP resource. We plan to release the final version in Aug. 2017 after a public comment period ending July 31, 2017.

Thank you, Larry Conklin, Gary Robinson OWASP Code Review Guides Co-Leaders

Introduction

OWASP Code Review Guide is a technical book written for those responsible for code reviews (management, developers, security professionals). The primarily focus of this book has been divided into two main sections. Section one is why and how of code reviews and sections two is devoted to what vulnerabilities need to be to look for during a manual code review. While security scanners are improving every day the need for manual security code reviews still needs to have a prominent place in organizations SDLC (Secure development life cycle) that desires good secure code in production.

Second sections deals with vulnerabilities. It is based on the poplar OWASP 2013 top 10. Here you will find most of the code examples for both on what not to do and on what to do. A word of caution on code examples; Perl is famous for its saying that there are 10,000 ways to do one thing. The same is true for C#, PHP and Java or any other computer language. Now add in "Object-Oriented Programming" and if we are using design patterns or even what designs patterns are being used and sample code becomes very “iff” in what to write. We tried to keep the sample code so code reviews can see red flags and not “do it my way or else”.

The last section is the appendix. Here we have content like code reviewer check list, etc. of items that really don’t flow in book form but needed to be included to make the code review guide compete.

Review of Code Review Guide 2.0

Constructive comments on this OWASP Code Review Release Candidate should be forwarded via email to [email protected]. Private comments may be sent to [email protected] or [email protected] . All comments are welcome. All comments should indicate the specific relevant page and section.

All feedback is critical to the continued success of the OWASP Code Review Guide.

Licensing

OWASP Code Review Guide is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.


Project Leader

  • Larry Conklin [1]
  • Gary Robinson [2]

Project Email

  • Project Email [3]

Classifications

Owasp-defenders-small.png

Cc-button-y-sa-small.png

Project Type Files DOC.jpg

Related Projects

OWASP Testing Guide [4]


Quick Download

In Print

Code Review Guide 2.0 will be available in Lulu in the near future.

Code Review Guide V1.1 on Lulu.

The OWASP Code Review project was conceived by Eoin Keary, the OWASP Dublin Founder and Chapter Lead.

Code Review Mailing list[5]
Project leaders [email protected] or [email protected]

Pages in category "OWASP Code Review Project"

The following 69 pages are in this category, out of 69 total.