Welcome to The Professional Security Testers Warehouse for the CEH V7 GPEN CPTS CREST GCIH GREM OPST
Nickname Password Security Code Security Code Type Security Code  

We recommend:

Best hacking and penetration testing  magazine in the world

Video Library

Skimming for ID theft
5 / 2
Views: 238
Comments: 16
11-01-2008 05:18

Latest version of ATM skimmer hidden behind a speaker looking device
5 / 3
Views: 252
Comments: 11
11-01-2008 05:11

ATM Scam, do check your ATM machine before using it
5 / 2
Views: 228
Comments: 12
11-01-2008 04:59


Whic of the following certifications would you like to get?

Other (please leave a comment)


Votes 559

Who's Online

There are currently, 438 guest(s) and 14 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
The Professional Security Testers Warehouse for the CEH V7 GPEN CPTS CREST GCIH GREM OPST: OWASP

Search on This Topic:   
[ Go to Home | Select a New Topic ]

New OWASP projects
Posted by cdupuis on Saturday, 11 May 2013 @ 20:23:07 CEST (2284 reads)


OWASP Web Application Security Quick Reference Guide Project - Project Leader:  Marek Zmyslowski - This will be a simple checklist for Web Application.  The unique feature of this project is that all checks will be simple and can be checked by particular testcase.  It is simple but can be very informative and useful for testers and coders.​

OWASP Application Fuzzing Framework Project - Project Leader:  Marek Zmyslowski.  The framework will be used to fuzz applications in the Windows environment.  It will have a couple of modules.  Two main modules will be for ile fuzzing and dll fuzzing.  A very wide configuration will allow for many fuzzing possibilities. 

OWASP Security JDIs Project - Project Leader:  Edwin Aldridge.  This project aims to build a library of concise, actionable, technology specific instructions detailing good practice on avoiding or closing specific vulnerabilities.  This will be a Security HOWTOs for people who may not have time to study a problem in depth but need to secure their application.  

OWASP Top 10 Fuer Entwickler 
- Project Leader:  Torsten Gigler  The Top 10 Fuer Entwickler (Top 10 Developer Edition in German) The objectives of the project is to add Good Practices (like the Cheat Sheets) to the OWASP Top 10.  Its aim is to bridge the gap between awareness and theoretical knowledge, to effective know-how for the purpose of building good programs.  It is written in German to amke it easier for German developers to use it.  We will take care to make a migration to other languages easy. 

OWASP Rails Goat Project - Project Leader:  Ken Johnson  This is a Rails application which is vulnerable to the OWASP Top 10.  It is intended to show how each of these categories of vulnerabilities can manifest themselves in a Rails-specific way as well as provide the subsequent mitigations for each. 


OWASP Code Review Table of Contents is now live!
We are currently still recruiting authors that can assist with section development, writing, and editing of the Code Review Guide.  This is an excellent opportunity to work on a high profile OWASP Flagship project.  Applicants are encouraged to choose to contribute to either a section or the entire chapter.  Authors should be knowledgeable about the sections they choose.  For more information on the OWASP Code Review Guide, please visit the Project Webpage

(Read More... | Score: 0)

OWASP Zed Attack Proxy 2.0.0 Released
Posted by cdupuis on Thursday, 31 January 2013 @ 05:45:24 CET (1964 reads)

Hi folks,

The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen testers toolbox.

OWASP ZAP 2.0.0 is now available : http://code.google.com/p/zaproxy/downloads/list

Quick summary of the main changes:

 * An integrated add-ons marketplace
 * A replacement for the 'standard' Spider
 * A new 'Ajax' spider
 * Web Socket support
 * Session awareness
 * Quick Start tab
 * User defined Contexts
 * Session scope
 * Different modes
 * A scripting console
 * Authentication handling
 * More API support
 * Fine grained scanning controls
 * New and improved active and passive scanning rules

For more details see the OWASP Blog post:

Many thanks to everyone who has contributed code, language files, enhancement requests, bug reports and general feedback.


OWASP ZAP Project leader

(Read More... | Score: 0)

OWASP Connector January 22, 2013
Posted by cdupuis on Tuesday, 22 January 2013 @ 18:39:00 CET (1945 reads)


New Projects and Project Volunteer Opportunities

  • OWASP Crowdtesting - This project will try to promote the idea of crowd-testing combined with crowd-sourcing capabilities.  The web applications will be defined as projects and the team of testers will start the security testing.  Read more ...
  • OWASP Focus - Create a new intermediate language based off of Swing and .NET but written in javascript utilizing DOM and json. allowing JAVA and .NET programmers to use their current programming methodologies via javascript .js files.  Read more ...
  • OWASP 1-Liner - OWASP 1-Liner is a deliberately vulnerable Java - and JavaScript - based chat application intended for demos (talks, tutorials, proof-of-concepts) and possible training in application security.  Read more ...
Volunteer  Opportunities - Complete information and sign up are on the OWASP initiatives page

  • OWASP Java HTML Sanitizer Project - we need 2-4 people to help review the OWASP Java HTML Sanitizer documentation project.  
  • OWASP GSD Project Support - this project is in need of a project support volunteer to help with project administrative duties.
  • OWASP Mobile Project Assistance - this project is looking for a "project" manager who can help keep track of the many facets of this project

Global Initiatives - Chapter

The 2013 LATAM tour has been scheduled for this Spring!  This year's tour will include OWASP Day events and training in the following countries:

Argentina, Uruguay, Chile, Peru, Ecuador, Columbia, Venezuela, Costa Rica, Puerto Rico, Brasilia, Sao Paulo, Curtibia, and Florianopolis! 

AppSec USA 13 - NYC Banner
AppSec USA 2013 (www.appsecusa.com), the premier software security conference for Builders, Breakers, and Defenders, will be held November 18-21 at the Marriott Marquis, in Times Square, New York City.  Now in it's ninth year, AppSec USA brings together leading global experts in software security for four days of discussion, training, exhibition, and competition.

Five Reasons to Attend AppSec USA 2013

1.  Insightful keynote addresses delivered by leading industry visionaries from thought leaders of critical infrastructure.
2.  Over 50 sessions across 4 tracks (Builder/Breaker/Defender) with world-renowned subject matter experts
3.  Over 2000 attendees exclusively focused on Software Security
4.  30 - minute, 60 - minute, and 90 - minute sessions are offered so you can acquire more knowledge and maximize your Conference learning experience
5.  Convenience of Midtown Manhattan

PNG owasp logo

The initial 2013 Global Webinars were held January 10th, 2013.  If you were not able to attend, the recordings are available online.
The next webinars will be this Thursday, January 24th at 10am EST and 9pm EST.  This session will focus on projects.  We are hoping that ALL project leaders (past, present, or future) will be able to join.

  • To participate in the 10am (Eastern Time Zone) discussion:
  • To participate in the 9pm (Eastern Time Zone) discussion:


OWASP Partners with National Collegiate Cyber Security Competition

The National Collegiate Cyber Defense Competition


The Collegiate Cyber Defense Competition (CCDC) is the first competition system that focuses on the operational aspect of managing and protecting an existing “commercial” network infrastructure. CCDC allows teams of undergraduate and graduate students at universities across the United States to exercise their academic and technical education and compete in a business oriented, defense information assurance competition. CCDC is a tiered competition with qualifying and regional events leading to a national championship.


CCDC Competitions ask students teams to assume administrative and protective duties for an existing “commercial” network – typically a small company with 50+ users, 10-12 servers, and common internet services such as a web server, mail server, and an e-commerce site. Each team begins the competition with an identical set of hardware and software and is scored on their ability to detect and respond to outside threats, maintain availability of existing services, respond to business requests such as the creation of a new e-commerce site, and balance security best practices against business needs.  2013 qualifiers kick off in February with the regional competitions taking place in March and our National CCDC will be held April 19-21, 2013 in San Antonio, TX. More information can be found at Http://nccdc.org  

For more information about The OWASP Foundation, go to owasp.org .

Contact Us 

(Read More... | Score: 0)

OWASP Long Island Meeting - A hands-on demo of the top web application risks
Posted by cdupuis on Wednesday, 18 January 2012 @ 09:41:46 CET (2712 reads)

OWASP Meeting - A hands-on demo of the top web application risks - Thursday, February 16, 2011

Adelphi University, Garden City, New York

You are invited to the OWASP Long Island chapter meeting.  In a continuation of the previous meeting; we have once again organized a lab to demonstrate and discuss various OWASP top 10 vulnerabilities.  Please register by using the link below...

When: Thursday, February 16, 2011; 7:00pm - 9:30pm

IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right)
Adelphi University, Garden City, NY 11549-1000.
Google map.  Campus Map
Once at the building, enter the building from the North and go down the stairs, knock on the door to be let in.

How Much:
Free.  Pizza and beverages will be provided.  This event is supported 100% by OWASP Long Island volunteers.   RSVP required:     

Registration Details: 

This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 18 people.

Who Are We:  We are volunteers of OWASP, a worldwide charitable organization focused on improving the security of application software.  Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.

Meeting Agenda: Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.  

Topics: Overview of BackTrack Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit) Overview of the lab challenge (covers multiple owasp top 10 vulns)

Bring your own laptop: Laptops are needed if you wish to participate in the lab exercise.  Each participant will be provided a copy of Backtrack 5 R1, laptops should be capable of booting off a DVD.  Cables, power strips, etc ... will be provided; but make sure you have your own power adapter.

About the Speaker:
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer.
He blogs at http://www.leune.org and can be found on Twitter as @leune.
Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.

To view past meetings, go to https://www.owasp.org/index.php/Long_Island or click here.

To subscribe to the the chapter mailing list, go to https://lists.owasp.org/mailman/listinfo/owasp-longisland or click here

Your email address will be used for OWASP related notifications only.  We will not share it with any third party. 

You can cancel your subscription anytime you want.

Owasp-LongIsland mailing list
[email protected]

Helen Gao, CISSP
Chapter leader of OWASP

(Read More... | Score: 0)

Securitybyte & OWASP AppSec Asia Conference
Posted by cdupuis on Sunday, 12 September 2010 @ 20:26:35 CEST (3600 reads)

Securitybyte & OWASP AppSec Asia Conference is a forum where Ethical Hackers, Practitioners, Researchers, and Developers in Information Security field, gathers to showcase and exchange new Researches, Innovations, Practical ideas and Experiences. If you are developing, researching, or implementing practical solutions to protect Corporate or Government Information Infrastructures, please consider sharing your experience and expertise at this conference.

First round of CFP submission is July 30th, 2009.

Send your interest and submissions to [email protected]

For any Speaking query, please contact us at [email protected]

We are seeking submissions for both Two days Conference Track & Post conference two days Training workshops in the following areas:

Conference Tracks (17 – 18 Nov, 2009)
You can submit your response for any the following three conference tracks

* CT 1 - Application, Database & Web Security
* CT 2 - Infrastructure Security (Network / Wireless/ Bluetooth / Malware / Forensics / Cyber- terrorism / Physical Security / Information warfare etc.)
* CT 3 - Risk Management / Compliance

Session will have to be delivered in any one of the following Session format for Conference talks:

* Coldfire Sessions (60 Minutes): These sessions are primarily core technical talks and will cover the following categories:
o Zer0 Days / Original Security Research
o Application and Database Security (All Technologies)
o Cyber Terrorism / Critical Infrastructure Issues
o Incidence Response and Defeating Incidence Response
o Electronic Device Security (Cell Phones / PDA’s etc..)
o Infrastructure Security (Wireless, Bluetooth, OS, Device etc)
o Browser Security
o Regulations (PCI, SoX 404, Clause 49 , ISO etc.)

* Rapidfire Sessions (30 Minutes): These sessions are focused around Information Security Management issues that will be addressed through:
o Business Case
o Panel Talk / Open Discussion with more than one speaker
o Upto speed (Old attack vector, new attack technique)

Please provide the following details with your submission:

* Name, title, address, email and phone/contact number
* Session Track (Developer / Application Security or Infrastructure Security or Risk Management)
* Session Format (Coldfire or Rapidfire)
* Short biography, photo, qualification, occupation, achievement and affiliations (limit 250 words).
* Summary or abstract for your presentation (limit 1250 words)
* Technical requirements (video, internet, wireless, audio, etc.)
* References (Contact name, title, email address of two conferences you have spoken at or comparable references)

(Read More... | Score: 0)

OSWA-Assistant v0.9.0.6h released
Posted by cdupuis on Sunday, 06 December 2009 @ 09:20:37 CET (3808 reads)

Anonymous writes "

The OSWA-Assistant v0.9.0.6h is now available for download.

This is a maintenance release with more Ralink cards supported (due to changes in vendor IDs reported by certified OSWAs and others) and upgraded tool versions.  More importantly is an expanded network-setup/script menu section that allows you to do operational stuff easier, e.g. changing your atheros card headers from Prism2 to Radiotap, etc.

You can download the free LiveCD iso image at http://oswa-assistant.securitystartshere.org 

NOTE:  LiveUSB creation information is also available from the download page



(Read More... | Score: 0)

Posted by cdupuis on Wednesday, 24 December 2008 @ 09:01:01 CET (3505 reads)

Anonymous writes "

OWASP is announcing the new OWASP Testing Guide v3. The project as part of the OWASP Summer of Code, started on April 2008 reviewing the
version 2, improving it.

The OWASP Testing Guide v3 is a 349 page book; we have split the set of active tests in 9 sub-categories for a total of 66 controls to test
during the Web Application Testing activity.

Each control has an OWASP name, so for example a SQL Injection is called: OWASP-DV-005, meaning that it is the 5th control of the Data
Validation category.

We got a dream team of 21 authors and 4 reviewers: after 6 months of hard work and great team work we realized the v3.

We'd like to ask you to support OWASP to reach the following goals:

*** Continuously improve the guide.

The Guide is a "live" document: we always need your feedback!
Please join our testing mailing list and share your ideas:

*** Promote the Testing Guide.
We would like to have some more media coverage on the guide, so please, if you know somebody in there put them in touch.
If you have the chance, you can write an article about the Testing Guide and the new OWASP Projects.
Also you can pick up the OWASP Testing Guide presentations and talk about it in local conferences and Chapter meetings.

*** Add 'quotes' to the Guide.
We made a special 'quotes' pages for the Testing Guide.
Here we'd want to add all the comments and references to the Guide.

The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a
"low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.

Download the Guide Now:

- http://www.owasp.org/index.php/OWASP_Testing_Project
- http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf

View the Presentation at the OWASP Summit 08:

- http://www.owasp.org/images/2/2c/OWASP_EU_Summit_2008_OWASP_Testing_Guide_v3.ppt

Join the Project Mailing List:
- http://lists.owasp.org/mailman/listinfo/owasp-testing

Matteo Meucci

Matteo Meucci
OWASP Testing Guide lead


(Read More... | Score: 0)

OWASP Hartford: February 2009 (Open Web Application Security Project)
Posted by cdupuis on Tuesday, 09 December 2008 @ 08:34:39 CET (32519 reads)

The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. 

Our mission is to make application security "visible," so that people and organizations can make informed decisions about application security risks.

Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.

This event will be of special interest to software developers and architects within your organization. We will be featuring Ramesh Nagappan of Sun, who is the author of several best selling books on SOA and most recently, the book: Core Security Patterns.

We will also have Mary Ruddy of Project Higgins who will provide guidance on incorporating identity into enterprise applications.

The agenda for this meeting is posted at:

To receive future invites, please subscribe to our mailing list at:

(Read More... | Score: 0)

NASSCOM's Biggest Information Security Summit - Supported by OWASP India
Posted by cdupuis on Monday, 01 December 2008 @ 22:07:51 CET (4016 reads)

Dear Members,
I just wanted to bring it to your kind notice that a biggest information security summit is being organized by NASSCOM in Hyderabad, India on December 2nd-3rd 2008.

Summit features some of the top-notch information security experts who would be addressing some really painful areas in the security domain.  Bruce Schneier will address the keynote session to give insight on how to bring real sense in security management practices under the theme “Information Security: Ten Trends”.

Detailed information about the summit is available here:

NOTE: Registrations are closing very soon. To register for this summit, kindly contact [email protected].

You can submit your registration fee (in the form of cheque/DD in favour of NASSCOM) at the venue as well (Not Paid Registration Counter).

OWASP INDIA is proud to support this initiative and we look forward to see you at the event.

Many Thanks,
Dhruv Soi

Chair – OWASP India Conferences
Board Member – OWASP Global Conferences
Director – OWASP Delhi Chapter

(Read More... | Score: 0)

OWASP AppSec 2008 Conference
Posted by boss on Thursday, 03 July 2008 @ 08:52:10 CEST (22803 reads)

Lou writes "You're invited to two days of Seminars and hardcore hands-on training from the world's best application security technology minds at the upcoming OWASP USA, NYC AppSec 2008 Conference that will take place on September 22nd-25th in NYC.

This event will be the largest APPSEC focused conference in the world with capacity for 1000 attendees and speakers and trainers from around the world.

This event will also have a web application capture the flag event a “can you hack it” event with fame and fortune... hmmm.. ok maybe just prizes and cold beer but you'll have fun ;)


(Read More... | Score: 0)

OWASP NY/NJ Metro Chapter and the W3AF Application testing tool
Posted by boss on Thursday, 31 January 2008 @ 21:53:25 CET (11617 reads)

cdupuis writes "NOTE FROM CLEMENT:
This is a repost from the NY/NJ OWASP Chapter mailing list. Thanks for the info Tom it is really appreciated. By the way, do get ready for a great OWASP conference in NY next summer. Here is the posting:

OWASP is all about the promotion of FREE tools to help with the mission of finding and fixing security in code

I wanted to make the OWASP NY/NJ Metro chapter aware as a result of some successful testing last week and exploiting of Web Applications with a new tool known as W3AF

The Web Application Attack and Audit Framework, (W3AF) was written by Andres Riancho, he has also accepted a speaker slot at OWASP NYC 2008

For more information on this FREE web application scanner/exploiter visit: http://w3af.sourceforge.net/faq.php

This tool runs on Linux as well as Windows (http://fuzion.rootmybox.org/?p=13) and OSX and its FREE

Tom Brennan OWASP - www.owasp.org "

(Read More... | Score: 0)

NY/NJ Metro OWASP meeting
Posted by boss on Wednesday, 11 July 2007 @ 19:38:59 CEST (3352 reads)

Anonymous writes "*SAVE THE DATE - RSVP EARLY!*

NY/NJ Metro OWASP next meeting will be at the *American Stock Exchange* in NYC on Sept. 27th from 6pm-9pm

** SPECIAL THANK YOU to - Douglas Shin of AMEX **

Call for papers is now open - if you have a technical topic that provides new insight, education or research that can benefit the membership of OWASP http://www.owasp.org , submit now! The call for papers will CLOSE as of Aug 15th for this meeting - get them in now.

Visit http://www.owasp.org/index.php/NYNJMetro for details as they are updated.

======== BLACKHAT VEGAS 2007' REMINDER ==============

OWASP and WASC have joined together to host a combined meetup at Blackhat USA 2007 <http://www.blackhat.com /> in Las Vegas on Aug 1 from 8-9:30 at the Shadow Bar. Breach Security <http://www.breach.com/ > has stepped forward to sponsor the event.

Enjoy the summer ~ see ya in vegas?

Tom Brennan aka: "jinxpuppy""

(Read More... | Score: 0)

Posted by boss on Thursday, 22 February 2007 @ 13:05:22 CET (3436 reads)

cdupuis writes "The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.

Download the Guide Now:
- http://www.owasp.org/index.php/OWASP_Testing_Project (PDF and DOC)

View the Project Overview Slides:
- http://www.owasp.org/index.php/Image :OWASP_Testing_Guide_Presentation.zip

Join the Project Mailing List:
- http://lists.owasp.org/mailman/listinfo/owasp-testing


I would like to thank you all for the great effort in creating the new OWASP Testing Guide v2. The new version is a complete rewrite that subsumes the previous version and includes the "OWASP Web Application Penetration Checklist", Version 1.1 dated 2004.

The project, as part of the OWASP Autumn of Code, started on October 1st 2006 reviewing all the old documentation. The first month we made a call to action to collect all the best security experts on application security asking them to collaborate in writing the Testing Guide.

We set up a 'dream team' of 39 authors and 20 reviewers: after 3 months of hard work and great team work we realized the v2 Release Candidate 1 (RC1) by the 10th of January 2007. From that date to the 10th of February we received numerous great comments: more than 20 articles have been reviewed.

On the 10th of February we published the official version 2: a 272 pages high quality document, with 46 controls divided into 8 categories.


We need help to...

*** Continuously Improve the Guide.
The Guide is a "live" document: we always need your feedback! Please join our testing mailing list and share your ideas with us. The next step is to begin working on the new version: one issue that will be improved is the client side testing.

*** Promote the Testing Guide
We would like to have some more media coverage on the guide, so please, if you know somebody in there put them in touch. If you have the chance, you can write an article about the Testing Guide and the new OWASP Projects. Also you can pick up the OWASP Testing Guide presentations and talk about it in local conferences and Chapter meetings.

*** Translate the Guide into your Local Language If you'd like to translate the Testing Guide in your local language, please contact us.

*** Add 'Quotes' to the Guide.
If you've used the guide and can share your experience, we'd love to hear from you. You can add your quote to the OWASP wiki here:


Matteo Meucci
OWASP Testing Guide lead
http://www.owasp.org/index.php/Testing_Guide "

(Read More... | Score: 0)

OWASP Newsletter #1
Posted by boss on Monday, 08 January 2007 @ 19:42:21 CET (3197 reads)

cdupuis writes "Hello, please find below the 1st OWASP newsletter (also posted in the wiki https://www.owasp.org/index.php/OWASP_Newsletter_1

The idea is to send a newsletter every 1 to 2 weeks, and if you want to include some materials or links in the next one, you have 4 options:
Thanks Aaron for the work done in getting this newsletter together, and as always everybody is invited to comment and help.

Dinis Cruz
Chief OWASP Evangelist, Are you a member yet?

(Read More... | Score: 0)

New Version of OWASP Pantera Web Assessmenht Studio
Posted by boss on Thursday, 30 November 2006 @ 17:42:45 CET (32821 reads)

cdupuis writes "Sender's Name: Simon Roses Femerling
Sender's Email: [email protected]
Message: We are happy to announce the new release of Pantera version 0.1.2 with many improvements and fixes :)

- Pantera Site


Main changes:

. To many so we recommend you read the CHANGELOG file :)

Keep is mind Pantera is beta and needs a lot of testing. We are really working hard on making Pantera a value tool so we need your help!!

Thanks to the contributors!!


Simon Roses Femerling


(Read More... | Score: 0)

Our Sponsors

There isn't content right now for this block.




Security Code:
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Latest Windows Tools

Currently there is a problem with headlines from this site

Latest Linux Tools

Currently there is a problem with headlines from this site

Reverse Engineering

Big Story of Today

There isn't a Biggest Story for Today, yet.

Old Articles

Wi-Fi Security

You can syndicate our news using the file backend.php or ultramode.txt

All logos and trademarks in this site are property of their respective owner. The comments are property of their posters, all the rest © 2003-2008 by Clement Dupuis and Nathalie Lambert (Site Maintainers).




Page Generation: 0.69 Seconds