Where this came from – skip to the end for the challenge if you do not care 🙂 During the OWTF workshop at BSides Vienna the interaction with the audience was great. For the purpose of this blog post the conversation on embedding HTML input from an untrusted source developed as follows: – Olaf first asked …
BSides Vienna took place last Saturday (21/01/2012) and it was only 3 weeks away from BerlinSides (where I gave the same talk and the same workshop) so the materials I used where almost identical. I decided it was more important to release an OWTF “Vienna” version instead. However, to keep it simple for the attendants …
Background: The Offensive (Web, etc) Testing Framework (aka OWTF) is an OWASP+PTES-focused try to unite great tools and make pen testing more efficient @owtfp http://owtf.org WARNING: This tool unites many great tools, websites, knowledge and their associated power, please hack responsibly and always have permission. That being said, happy pwnage 🙂 Dedicated with special love …
Background: The Offensive (Web, etc) Testing Framework (aka owtf) is an OWASP+PTES-focused try to unite great tools and make pen testing more efficient @owtfp http://owtf.org NOTE: I believe looking at the slides and demos prior to using this will help. WARNING: This tool unites many great tools and their power, please hack responsibly and always have permission. …
NOTE: I believe looking at the slides and demos before playing with the interactive report will help. NOTE 2: The report has been built for HTML 5 localstorage, your flags and notes will be kept even if you close the browser as long as you use Firefox >= 8 (there is a bug before then) …
Happy new year! I would like to take this opportunity to thank everybody that chose to attend my OWTF workshop despite it happening at the same time that probably one of the best talks at BerlinSides: “Layers of misunderstanding, or how digital radio is not what you think…” by Travis Goodspeed, which I unfortunately missed …