Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.UPDATE 04/09/2013: Added link to AppSec EU video UPDATE 26/08/2013: Added Plug-n-Hack support link. OWASP AppSec EU 2013 and HackPra AllStars were both a blast this week: I would like to use this opportunity …
Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.IMPORTANT NOTE: Some of the new features require the use of the “–dev” flag, please report any issues you find in our github page. Thanks! This is another a very significant release which includes …
Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.A common complaint for OWTF was that the report was “ugly”, now it’s your turn to change that: This project has a community voting phase, so we need your help to choose the upcoming …
Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.This is a very significant release which includes the initial outstanding work of the following Google Summer of Code Projects: OWASP OWTF – INBOUND PROXY WITH MiTM & CACHING CAPABILITIES by Bharadwaj Machiraju (Dedicated …
Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.As you may know, OWASP OWTF took part in the GSoC 2013. It was somewhat surprising (also to me) that OWTF got 4 slots, the same as ZAP (an OWASP flagship project I have …
Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.As a wrapper tool that depends on many tools, the migration from Backtrack to Kali Linux has been a bit of a challenge for the OWTF development team: Many tools were removed, all tools and dictionaries …
Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.If you have an owasp.org account, are familiar with python and would be willing to mentor some students OWASP OWTF needs you 🙂 5 students that applied to work on the Google Summer of Code …
Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Pentesting like a Grandmaster materials – BSides London 2013 UPDATE: 2013-07-28 – Added link to BSides London talk interview NOTE: Will update the post as soon as video is available only slides and demos …
Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.UPDATE: This probably only affects the VMWare image, you will know if it also affects the Kali install if your hashes match my sample hashes below. So the fine folks at offensive security released …
Page 15: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Illusionism is just another form of Social Engineering (SE): The magician attempts to draw attention away from the trick to create an illusion of making the impossible possible. During the weekend I saw three …