OWASP OWTF

=Main=  {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |

Introduction
OWTF aims to make pen testing:


 * Aligned with OWASP Testing Guide + PTES + NIST
 * More efficient
 * More comprehensive
 * More creative and fun (minimise un-creative work)

so that pentesters will have more time to


 * See the big picture and think out of the box
 * More efficiently find, verify and combine vulnerabilities
 * Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions
 * Perform more tactical/targeted fuzzing on seemingly risky areas
 * Demonstrate true impact despite the short timeframes we are typically given to test.

Description
You can see what OWASP OWTF is all about in the following video:

OWASP OWTF 1.0 "Lionheart" - Brucon 2014 5x5:

OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5:

For more videos please see the YouTube channel

Licensing

 * valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |

What is OWTF?
OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.

OWASP OWTF Installation

OWASP OWTF Releases

The current version of OWASP OWTF is OWTF 1.0.1 "Lionheart".

OWASP OWTF Documentation

Try some of the OWTF features from your browser!

OWASP OWTF Release blog posts

OWASP OWTF Talk blog posts

OWASP OWTF Mailing List

OWASP OWTF IRC Channel: #owtf on Freenode

Presentation
The following links provide access to materials for OWTF talks (video, slides, etc.):

OWTF Talks at 7-a.org

Project Leader

 * [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]
 * [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]

Openhub
https://www.openhub.net/p/owasp-owtf


 * valign="top" style="padding-left:25px;width:200px;" |

Quick Download

 * Download now

Email List
Sign Up

News and Events

 * October 5th 2014 - OWTF 1.0 "Lionheart" released!


 * September 26th 2014 - OWTF 1.0 "Lionheart" presented at Brucon!


 * September 4th 2014 - - OWTF participating in OWASP Winter Code Sprint


 * January 13th 2014 - OWTF 0.45.0 "Winter Blizzard" released!


 * December 11th 2013 - OWASP OWTF CFP funds contest WINNERS announced


 * September 8th 2013 - OWASP OWTF CFP funds contest open!


 * August 22nd-23rd 2013 - Introducing OWASP OWTF 5x5 @ OWASP AppSec EU


 * August 9th 2013 - OWTF 0.30 "Summer Storm II" released!


 * July 1st 2013 - OWTF 0.20 "Summer Storm I" released!


 * June 12th 2013 - OWASP OWTF GSoC Selection, Stats and Poll


 * May 24th 2013 - OWASP OWTF 0.16 "shady citizen" released, now working smoothly in Kali!


 * April 22nd - May 3rd 2013 - Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013


 * April 24th 2013 - Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013


 * February 26th 2013 - OWASP OWTF selected to be supported by Brucon 5x5


 * September 26th 2012 - OWASP OWTF Workshop at Brucon


 * September 24th 2012 - OWASP OWTF 0.15 BruCon released!

Classifications

 * }

=FAQs=

OWTF documentation is hosted in the following resources:
 * Getting started
 * Downloading & Installation
 * OWASP OWTF Documentation
 * OWTF Playlists with Demos/Talks on Youtube
 * Join us on IRC (#owtf on Freenode)
 * Some OWTF presentation slides
 * More OWTF Talk links

= Acknowledgements =

Volunteers
OWTF is developed by a worldwide team of volunteers.

But we have also been helped by many organizations, either financially or through other means:


 * OWASP
 * eLearnSecurity
 * Google
 * BruCon

= Road Map and Getting Involved = OWTF attempts to solve the "penetration testers are never given enough time to test properly" problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:
 * To improve security testing efficiency (i.e. test more in less time)
 * To improve security testing coverage (i.e. test more)
 * Gradually integrate the best tools
 * Unite the best tools and make them work together with the security tester
 * Remove or Reduce the need to babysit security tools during security assessments
 * Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.
 * Help penetration testers save time on report writing

Involvement in the development and promotion of OWTF is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
 * Send us a pull request
 * Give us feedback / suggestions / report bugs
 * Talk to us on IRC (#owtf on Freenode)
 * Join our OWTF developers mailing list
 * Join the general OWTF mailing list

=Project About=