Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.A common complaint for OWTF was that the report was “ugly”, now it’s your turn to change that: This project has a community voting phase, so we need your help to choose the upcoming …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.As you may know, OWASP OWTF took part in the GSoC 2013. It was somewhat surprising (also to me) that OWTF got 4 slots, the same as ZAP (an OWASP flagship project I have …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.If you have an owasp.org account, are familiar with python and would be willing to mentor some students OWASP OWTF needs you 🙂 5 students that applied to work on the Google Summer of Code …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Pentesting like a Grandmaster materials – BSides London 2013 UPDATE: 2013-07-28 – Added link to BSides London talk interview NOTE: Will update the post as soon as video is available only slides and demos …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Here are a few links if you want to download the materials from the OWASP OWTF BruCon 2012 workshop that happened last week in Ghent, Belgium: – The slides are now online in slideshare …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Background A recent data breach on the LinkedIn database leaked around 6.5 million salted hashes. This ignited a healthy debate in the security community: – Some people said you should only use bcrypt and that …