OWASP Security Blitz

=About= OWASP is starting a monthly security blitz where we will rally the security community around a particular topic. The topic may be a vulnerability, defensive design approach, technology or even a methodology. All members of the security community are encouraged to write blog posts, articles, patches to tools, videos etc in the spirit of the current monthly topic. Our goal is to show a variety of perspectives on the topic from the different perspectives of builders, breakers and defenders.

=How Can You Help?=

Individual Experts
As an individual please create material on the monthly security topic. If you have recently created material that is relevant to the month at hand then please link it in the section below. As mentioned above, the goal is to have a variety of perspectives (builder, breaker, defender, policy, etc) and types of content (tools, docs, videos, code patches, etc)

Companies / Organizations / Universitites
Please consider launching an internal awareness program to coincide with the security blitz. This will allow all of us to pool resources and maximize the impact of each month's topic.

=Monthly Security Topics=
 * 2012 - April - SQL Injection
 * 2012 - May - Cross Site Scripting
 * 2012 - June - Access Control
 * 2012 - July - Mobile Security
 * 2012 - August - Threat Modeling

Articles/Contributions/Updates
Please add links to any stories, posts, articles, etc that are related to the current month

April - SQL Injection

 * 1) OWASP Parameterization Cheat Sheet
 * 2) The Power of the Apostrophe blog (funny)
 * 3) OWASP SQL Injection Cheat Sheet

May - Cross Site Scripting

 * 1) OWASP XSS Prevention Cheat Sheet (Builder)
 * 2) XSS cheat sheet (Breaker)
 * 3) Content Security Policy (Builder)
 * 4) Dom Based XSS
 * 5) Dom Based XSS Prevention Cheat Sheet (Builder)
 * 6) AppSec Tutorial Project - Cross Site Scripting (Video Link)
 * 7) Abusing Password Managers with XSS (Breaker)
 * 8) XSS Shortening Cheat Sheet (Breaker)

June - Access Control

 * 1) From OWASP Mantra YouTube channel (Breaker)
 * 2) URL Access
 * 3) Broken Session Management
 * 4) Broken Authentication