Difference between revisions of "OWASP Security Blitz"

Jump to: navigation, search
(May - Cross Site Scripting)
(Replaced content with "P")
(14 intermediate revisions by 5 users not shown)
Line 1: Line 1:
OWASP is starting a monthly security blitz where we will rally the security community around a particular topic.  The topic may be a vulnerability, defensive design approach, technology or even a methodology.  All members of the security community are encouraged to write blog posts, articles, patches to tools, videos etc in the spirit of the current monthly topic.  Our goal is to show a variety of perspectives on the topic from the different perspectives of builders, breakers and defenders.
=How Can You Help?=
==Individual Experts==
As an individual please create material on the monthly security topic. If you have recently created material that is relevant to the month at hand then please link it in the section below.  As mentioned above, the goal is to have a variety of perspectives (builder, breaker, defender, policy, etc) and types of content (tools, docs, videos, code patches, etc)
==Companies / Organizations / Universitites==
Please consider launching an internal awareness program to coincide with the security blitz. This will allow all of us to pool resources and maximize the impact of each month's topic.
=Monthly Security Topics=
* 2012 - [https://www.owasp.org/index.php/OWASP_Security_Blitz#April_-_SQL_Injection April - SQL Injection]
* 2012 - [https://www.owasp.org/index.php/OWASP_Security_Blitz#May_-_Cross_Site_Scripting May - Cross Site Scripting]
* 2012 - June - Access Control
* 2012 - July - Mobile Security
* 2012 - August - Threat Modeling
== Articles/Contributions/Updates==
Please add links to any stories, posts, articles, etc that are related to the current month
===April - SQL Injection===
# [https://www.owasp.org/index.php/Query_Parameterization_Cheat_Sheet OWASP Parameterization Cheat Sheet]
# [http://thepowerofapostrophe.blogspot.in/ The Power of the Apostrophe blog] (funny)
# [https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet OWASP SQL Injection Cheat Sheet]
===May - Cross Site Scripting===
# [http://ha.ckers.org/xss.html XSS cheat sheet] (Breaker)
# [http://labs.neohapsis.com/2012/04/25/abusing-password-managers-with-xss/ Abusing Password Managers with XSS] (Breaker)
# [http://labs.neohapsis.com/2012/04/19/xss-shortening-cheatsheet/ XSS Shortening Cheat Sheet] (Breaker)
# [http://yehg.net/lab/pr0js/pentest/flash-xsser.php Flash-based XSSer] (Breaker)
# [http://yehg.net/lab/pr0js/pentest/ie-referer-xsser.php IE Referer XSSer] (Breaker)
# [http://seckb.yehg.net/2012/06/using-post-method-to-bypass-ie-browser.html Using POST method to bypass IE-protected XSS](Breaker)
# [http://code.google.com/p/xssf/ XSSF: Cross Site Scripting Framework] (Breaker)
# [https://www.owasp.org/index.php/DOM_Based_XSS Dom Based XSS] (Breaker)
# [https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series AppSec Tutorial Project - Cross Site Scripting] ([http://www.youtube.com/watch?v=_Z9RQSnf8-g Video Link]) (Breaker)
# [http://yehg.net/lab/pr0js/training/view/misc/joomla-1.5.20_encoded-xss/ Double-encoded XSS on Joomla! 1.5.20] (Breaker)
# [http://yehg.net/lab/pr0js/training/view/misc/Hacking%20Rapidshare%20With%20XSS/ Infamous compromise of user account credential with XSS] (Breaker)
# [http://yehg.net/e PHP Charset Encoder] (Breaker)
# [http://yehg.net/lab/pr0js/pentest/CAL9000/ CAL9000] (Breaker)
# [http://utf-8.jp/ utf8.jp's JS Encoders] (Breaker)
# [http://seckb.yehg.net/2011/02/attribute-based-cross-site-scripting.html Attribute-based XSS When Encoding Double Quotes is NOT Enough] (Builder)
# [https://developer.mozilla.org/en/Introducing_Content_Security_Policy Content Security Policy] (Builder)
# [https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet OWASP XSS Prevention Cheat Sheet] (Builder)
# [https://www.owasp.org/index.php?title=DOM_based_XSS_Prevention_Cheat_Sheet Dom Based XSS Prevention Cheat Sheet] (Builder)
===June - Access Control===
# [http://www.youtube.com/getmantra From OWASP Mantra YouTube channel] (Breaker)
## [http://www.youtube.com/watch?v=0lPz24Z7Q_4 URL Access]
## [http://www.youtube.com/watch?v=o1WVx6eYE-M Broken Session Management]
## [http://www.youtube.com/watch?v=yTbB42sR208 Broken Authentication]
# [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws OWASP WebGoat - Access Control Flaws] (Breaker)
# [http://blog.portswigger.net/2011/03/burp-v14-preview-testing-access.html BurpSuite - Testing access controls using your browser]  (Breaker)
# [http://blog.portswigger.net/2011/03/burp-v14-preview-comparing-site-maps.html BurpSuite - Comparing site maps]  (Breaker)
# [http://yehg.net/lab/pr0js/training/view/misc/Exploiting_LogicFlaw/exploiting-logicflaw.html Gaining access through netcat] (Breaker)

Revision as of 03:39, 16 November 2012