Difference between revisions of "Category:OWASP Access Control Rules Tester Project"

From OWASP
Jump to: navigation, search
Line 4: Line 4:
 
! width="500" align="center" | <br>
 
! width="500" align="center" | <br>
 
|-
 
|-
| align="right" | [[Image:OWASP Inactive Banner.jpg|600px| link=https://www.owasp.org/index.php/Category:OWASP_Project]]  
+
| align="right" | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/Category:OWASP_Project]]  
 
| align="right" |  
 
| align="right" |  
  

Revision as of 13:13, 23 January 2014



OWASP Inactive Banner.jpg

PROJECT IDENTIFICATION
Project Name OWASP Access Control Rules Tester Project
Short Project Description Often web applications contain sensitive data and provide functionality which should be protected from unauthorized access. Explicit access control policies can be leveraged for validating the access control, but, unfortunately, these policies are rarely defined in case of web applications. It is known that access control flaws in web applications may be revealed with black-box analysis, but the existing “differential analysis” approach has certain limitations. We believe that taking the state of the web application into account could help to overcome the limitations of exiting approach.

This project proposes a novel approach to black-box web application testing, which utilizes a use-case graph. The graph contains classes of actions within the web application and their dependencies. By traversing the graph and applying differential analysis at each step of the traversal, it is possible to improve the accuracy of the method. This idea was implemented in the tool AcCoRuTe (Access Control Rules Tester).

Key Project Information Project Leader
Andrew Petukhov
Project Contributors
George Noseevich
Mailing List
Subscribe here
Use here
License
GNU General Public License v2
Project Type
Tool
Sponsors
OWASP SoC 08
Release Status Main Links Related Projects

Beta Quality
Please see here for complete information.

Version 1.1


PPT Presentation from the 1st SysSec Workshop (an updated method presented)
A paper from the 1st SysSec Workshop with an updated method described
A new codebase can be checked out here

Version 1.0


PPT Presentation from OWASP EU Summmit 2009
What are business logic vulnerabilities? - An attempt to define their scope
AcCoRuTe approach described
Google Code Project page
AcCoRuTe version 1.0.0 binaries
AcCoRuTe User Guide

If any, add link here


This category currently contains no pages or media.