Difference between revisions of "OWASP Security Blitz"

From OWASP
Jump to: navigation, search
(April - SQL Injection)
(May - Cross Site Scripting)
Line 27: Line 27:
 
===May - Cross Site Scripting===
 
===May - Cross Site Scripting===
 
# [http://ha.ckers.org/xss.html XSS cheat sheet] (Breaker)
 
# [http://ha.ckers.org/xss.html XSS cheat sheet] (Breaker)
# [http://labs.neohapsis.com/2012/04/19/xss-shortening-cheatsheet/ XSS Shortening Cheat Sheet] (Breaker)
+
# [http://seckb.yehg.net/2012/06/xss-gaining-access-to-httponly-cookie.html XSS: Gaining access to HttpOnly Cookie in 2012] (Breaker)
 
# [http://yehg.net/lab/pr0js/pentest/flash-xsser.php Flash-based XSSer] (Breaker)
 
# [http://yehg.net/lab/pr0js/pentest/flash-xsser.php Flash-based XSSer] (Breaker)
 
# [http://yehg.net/lab/pr0js/pentest/ie-referer-xsser.php IE Referer XSSer] (Breaker)
 
# [http://yehg.net/lab/pr0js/pentest/ie-referer-xsser.php IE Referer XSSer] (Breaker)
 
# [http://seckb.yehg.net/2012/06/using-post-method-to-bypass-ie-browser.html Using POST method to bypass IE-protected XSS](Breaker)  
 
# [http://seckb.yehg.net/2012/06/using-post-method-to-bypass-ie-browser.html Using POST method to bypass IE-protected XSS](Breaker)  
# [http://code.google.com/p/xssf/ XSSF: Cross Site Scripting Framework] (Breaker)
 
 
# [https://www.owasp.org/index.php/DOM_Based_XSS Dom Based XSS] (Breaker)
 
# [https://www.owasp.org/index.php/DOM_Based_XSS Dom Based XSS] (Breaker)
 
# [https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series AppSec Tutorial Project - Cross Site Scripting] ([http://www.youtube.com/watch?v=_Z9RQSnf8-g Video Link]) (Breaker)
 
# [https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series AppSec Tutorial Project - Cross Site Scripting] ([http://www.youtube.com/watch?v=_Z9RQSnf8-g Video Link]) (Breaker)
Line 39: Line 38:
 
# [http://yehg.net/lab/pr0js/pentest/CAL9000/ CAL9000] (Breaker)
 
# [http://yehg.net/lab/pr0js/pentest/CAL9000/ CAL9000] (Breaker)
 
# [http://utf-8.jp/ utf8.jp's JS Encoders] (Breaker)
 
# [http://utf-8.jp/ utf8.jp's JS Encoders] (Breaker)
 +
# [http://code.google.com/p/xssf/ XSSF: Cross Site Scripting Framework] (Breaker)
 +
# [http://labs.neohapsis.com/2012/04/19/xss-shortening-cheatsheet/ XSS Shortening Cheat Sheet] (Breaker)
 
# [http://labs.neohapsis.com/2012/04/25/abusing-password-managers-with-xss/ Abusing Password Managers with XSS] (Breaker)
 
# [http://labs.neohapsis.com/2012/04/25/abusing-password-managers-with-xss/ Abusing Password Managers with XSS] (Breaker)
 
# [http://seckb.yehg.net/2011/02/attribute-based-cross-site-scripting.html Attribute-based XSS When Encoding Double Quotes is NOT Enough] (Builder)
 
# [http://seckb.yehg.net/2011/02/attribute-based-cross-site-scripting.html Attribute-based XSS When Encoding Double Quotes is NOT Enough] (Builder)

Revision as of 14:39, 23 June 2012

About

OWASP is starting a monthly security blitz where we will rally the security community around a particular topic. The topic may be a vulnerability, defensive design approach, technology or even a methodology. All members of the security community are encouraged to write blog posts, articles, patches to tools, videos etc in the spirit of the current monthly topic. Our goal is to show a variety of perspectives on the topic from the different perspectives of builders, breakers and defenders.

How Can You Help?

Individual Experts

As an individual please create material on the monthly security topic. If you have recently created material that is relevant to the month at hand then please link it in the section below. As mentioned above, the goal is to have a variety of perspectives (builder, breaker, defender, policy, etc) and types of content (tools, docs, videos, code patches, etc)

Companies / Organizations / Universitites

Please consider launching an internal awareness program to coincide with the security blitz. This will allow all of us to pool resources and maximize the impact of each month's topic.

Monthly Security Topics

Articles/Contributions/Updates

Please add links to any stories, posts, articles, etc that are related to the current month

April - SQL Injection

  1. OWASP WebGoat - Blind SQL Injection with JHijack (Breaker)
  2. OWASP Parameterization Cheat Sheet (Builder)
  3. The Power of the Apostrophe blog (funny)
  4. OWASP SQL Injection Cheat Sheet (Builder)

May - Cross Site Scripting

  1. XSS cheat sheet (Breaker)
  2. XSS: Gaining access to HttpOnly Cookie in 2012 (Breaker)
  3. Flash-based XSSer (Breaker)
  4. IE Referer XSSer (Breaker)
  5. Using POST method to bypass IE-protected XSS(Breaker)
  6. Dom Based XSS (Breaker)
  7. AppSec Tutorial Project - Cross Site Scripting (Video Link) (Breaker)
  8. Double-Nibble-URI XSS on Joomla! 1.5.20 (Breaker)
  9. Infamous compromise of user account credential with XSS (Breaker)
  10. PHP Charset Encoder (Breaker)
  11. CAL9000 (Breaker)
  12. utf8.jp's JS Encoders (Breaker)
  13. XSSF: Cross Site Scripting Framework (Breaker)
  14. XSS Shortening Cheat Sheet (Breaker)
  15. Abusing Password Managers with XSS (Breaker)
  16. Attribute-based XSS When Encoding Double Quotes is NOT Enough (Builder)
  17. Content Security Policy (Builder)
  18. OWASP XSS Prevention Cheat Sheet (Builder)
  19. Dom Based XSS Prevention Cheat Sheet (Builder)

June - Access Control

  1. From OWASP Mantra YouTube channel (Breaker)
    1. URL Access
    2. Broken Session Management
    3. Broken Authentication
  2. OWASP WebGoat - Access Control Flaws (Breaker)
  3. BurpSuite - Testing access controls using your browser (Breaker)
  4. BurpSuite - Comparing site maps (Breaker)
  5. Gaining access through netcat (Breaker)