Difference between revisions of "OWASP Newsletter 2"

From OWASP
Jump to: navigation, search
m (Protected "OWASP Newsletter 2": Email Sent, content is static now [edit=sysop:move=sysop])
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
''Sent to owasp-all mailing list on 16th Jan 2007''
 
''Sent to owasp-all mailing list on 16th Jan 2007''
  
''' OWASP Newsletter #1 – January 8th 2006 to January 15th 2006'''
+
''' OWASP Newsletter #2 – January 8th 2006 to January 15th 2006'''
  
Hello, here is another newsletter with tons of links and information about what is happening at OWASP.  
+
Hello, here is another newsletter with tons of links and information about what is happening at OWASP. If you want something to appear in the next version, please add it to [[OWASP Newsletter 3]]
 
+
If you want something to appear in the next version, fell free to add it to [[OWASP Newsletter 3]]
+
  
 
Dinis Cruz
 
Dinis Cruz
 +
Chief OWASP Evangelist
 +
London, UK
  
 
====  OWASP News ====
 
====  OWASP News ====
 +
 
* [[ORG (OWASP Report Generator)]] - New release of [http://sourceforge.net/project/downloading.php?group_id=64424&use_mirror=osdn&filename=ORG_v0.88.msi| ORG Installer] (1/15/2007)
 
* [[ORG (OWASP Report Generator)]] - New release of [http://sourceforge.net/project/downloading.php?group_id=64424&use_mirror=osdn&filename=ORG_v0.88.msi| ORG Installer] (1/15/2007)
 +
 
* [http://www.owasp.org/index.php/OWASP_Autumn_of_Code_2006_-_Projects:_Live_CD OWASP Live CD] Beta Release  - Download it from [http://www.packetfocus.com/hackos| http://www.packetfocus.com/hackos]
 
* [http://www.owasp.org/index.php/OWASP_Autumn_of_Code_2006_-_Projects:_Live_CD OWASP Live CD] Beta Release  - Download it from [http://www.packetfocus.com/hackos| http://www.packetfocus.com/hackos]
  
Line 35: Line 37:
 
Apart from some shameless marketing plus and its [http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/01-09-2007/0004502553&EDATE= real intention with this paper], WhiteHat Security has published a good paper on the limitations of Web Application Security Scanners capabilities to detect the [OWASP_Top_Ten_Project OWASP Top 10] vulnerabilities (which btw, all vendors claim they do). I actually think that the examples are quite basic, but they are good enough for the argument presented.
 
Apart from some shameless marketing plus and its [http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/01-09-2007/0004502553&EDATE= real intention with this paper], WhiteHat Security has published a good paper on the limitations of Web Application Security Scanners capabilities to detect the [OWASP_Top_Ten_Project OWASP Top 10] vulnerabilities (which btw, all vendors claim they do). I actually think that the examples are quite basic, but they are good enough for the argument presented.
  
You can download the page from [http://www.whitehatsec.com/home/assets/OWASPTop10ScannersF.pdf]
+
You can download this paper from [http://www.whitehatsec.com/home/assets/OWASPTop10ScannersF.pdf]
  
 
Quote: ''"The OWASP Top Ten is a list of the most critical web application
 
Quote: ''"The OWASP Top Ten is a list of the most critical web application
Line 70: Line 72:
 
====  Latest additions to the WIKI ====
 
====  Latest additions to the WIKI ====
 
'''New pages'''
 
'''New pages'''
* [[OWASP Testing Project v2.0 - Review Guidelines]] - Support page for the OWASP Testing Project V2.0 Review effortw where you will find more details on how to participate in this collaborative review process.  
+
* [[OWASP Testing Project v2.0 - Review Guidelines]] - Support page for the OWASP Testing Project V2.0 Review effort where you will find more details on how to participate in this collaborative review process.  
 
* [[Chapter Leader Handbook]] - Handbook for new and experienced chapter leaders on leading an active chapter community.  
 
* [[Chapter Leader Handbook]] - Handbook for new and experienced chapter leaders on leading an active chapter community.  
 
* [[OWASP WebScarab NG Project]] - Rogan details his work on the new version of WebScarab
 
* [[OWASP WebScarab NG Project]] - Rogan details his work on the new version of WebScarab
Line 127: Line 129:
 
* [http://au.sys-con.com/read/322897.htm Sprajax Author – AJAX Security Tool – To Speak at AJAXWorld 2007], SYS-CON Media, NJ - Jan 13, 2007
 
* [http://au.sys-con.com/read/322897.htm Sprajax Author – AJAX Security Tool – To Speak at AJAXWorld 2007], SYS-CON Media, NJ - Jan 13, 2007
 
* [http://www.computerweekly.com/Articles/2007/01/11/221120/web-application-security-vulnerabilities-by-the-numbers.htm Web application security vulnerabilities by the numbers], ComputerWeekly.com, UK - Jan 11, 2007
 
* [http://www.computerweekly.com/Articles/2007/01/11/221120/web-application-security-vulnerabilities-by-the-numbers.htm Web application security vulnerabilities by the numbers], ComputerWeekly.com, UK - Jan 11, 2007
* This one is actual an mistake from PSC Group LLC , since there is currently no relationship with them an OWASP (note: I email them and they corrected this on their website) [http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20070109005299&newsLang=en Fujitsu’s GlobalSTORE Software Completes Visa’s Payment ...], Business Wire (press release), CA - Jan 9, 2007  (there is a major typo in this article (OWASP related), see if you can spot it :) )
+
* This one is actual an mistake from PSC Group LLC, since there is currently no relationship with them an OWASP (note: I emailed them and they corrected this on their website) [http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20070109005299&newsLang=en Fujitsu’s GlobalSTORE Software Completes Visa’s Payment ...], Business Wire (press release), CA - Jan 9, 2007  (there is a major typo in this article (OWASP related), see if you can spot it :) )
 
* [http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/01-09-2007/0004502553&EDATE= WhiteHat Security Announces Risk-Free Competitive Trade-Up Program], PR Newswire (press release), NY - Jan 9, 2007
 
* [http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/01-09-2007/0004502553&EDATE= WhiteHat Security Announces Risk-Free Competitive Trade-Up Program], PR Newswire (press release), NY - Jan 9, 2007
 +
 +
__NOEDITSECTION__

Latest revision as of 09:44, 16 January 2007

Sent to owasp-all mailing list on 16th Jan 2007

OWASP Newsletter #2 – January 8th 2006 to January 15th 2006

Hello, here is another newsletter with tons of links and information about what is happening at OWASP. If you want something to appear in the next version, please add it to OWASP Newsletter 3

Dinis Cruz Chief OWASP Evangelist London, UK

Contents

OWASP News


Featured Projects

  • OWASP WebScarab NG Project - Rogan has been very busy on the new version of WebScarab, which is not complete, but is already in a very usable state (I already prefer it to the current version). Rogan needs your help in testing this version and sending in your comments. Quote from OWASP WebScarab NG Project: WebScarab-NG is a complete rewrite of the old WebScarab application, with a special focus on making the application more user-friendly. To this end, WebScarab-NG makes use of the Spring Rich Client Platform to provide the user interface features. By using the Spring Rich Client Platform, WebScarab-NG automatically gains things like default buttons, keyboard shortcuts, support for internationalisation, etc.
  • Category:OWASP CAL9000 Project - This project is a great resource to (amongst other things) understand and exploit XSS. Quote: CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. CAL9000 gives you the flexibility and functionality you need for more effective manual testing efforts. Works best when used with Firefox or Internet Explorer.

Featured Story: Two free Java EE filters for CSRF, Reflected XSS, and Adobe XSS

OWASP contributors from Aspect Security have developed two new Java EE filters to protect against common web attacks. Just add a few lines to your web.xml file and enjoy the protection.

CSRF and Reflected XSS Filter for Java EE
This filter adds a random token to forms and URLs that prevent an attacker from executing both CSRF and reflected XSS attacks.
Adobe XSS Filter for Java EE
This filter protects against the recent XSS attacks on PDF files. By using a redirect and an encrypted token, this filter ensures that dangerous attacks are not passed into the Adobe reader plugin.

Featured Story: "Automated Scanner vs. The OWASP Top Ten"

Apart from some shameless marketing plus and its real intention with this paper, WhiteHat Security has published a good paper on the limitations of Web Application Security Scanners capabilities to detect the [OWASP_Top_Ten_Project OWASP Top 10] vulnerabilities (which btw, all vendors claim they do). I actually think that the examples are quite basic, but they are good enough for the argument presented.

You can download this paper from [1]

Quote: "The OWASP Top Ten is a list of the most critical web application security flaws – a list also often used as a minimum standard for web application vulnerability assessment (VA) and compliance. There is an ongoing industry dialog about the possibility of identifying the OWASP Top Ten in a purely automated fashion (scanning). People frequently ask what can and can’t be found using either white box or black box scanners. This is important because a single missed vulnerability, or more accurately exploited vulnerability, can cause an organization significant financial harm. Proper expectations must be set when it comes to the various vulnerability assessment solutions."

Note: I haven't seen any Web App Scannor vendor responses, so if you spot it let me know.

Latest Blog Entries from blogs.owasp.org

Latest additions to the WIKI

New pages

Edited Pages

OWASP Community


Application Security News (from Owasp.org)

Jan 10 - Vulnerability Disclosure: The Good, the Bad and the Ugly
More than a decade into the practice of vulnerability disclosure, where do we stand? Are we more secure? Or less?, three good articles: Microsoft: Responsible Vulnerability Disclosure Protects Users , Schneier: Full Disclosure of Security Vulnerabilities a ’Damned Good Idea’, The Vulnerability Disclosure Game: Are We More Secure? and The Chilling Effect


OWASP references in the Media