Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.IMPORTANT NOTE: Some of the new features require the use of the “–dev” flag, please report any issues you find in our github page. Thanks! This is another a very significant release which includes …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.A common complaint for OWTF was that the report was “ugly”, now it’s your turn to change that: This project has a community voting phase, so we need your help to choose the upcoming …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.This is a very significant release which includes the initial outstanding work of the following Google Summer of Code Projects: OWASP OWTF – INBOUND PROXY WITH MiTM & CACHING CAPABILITIES by Bharadwaj Machiraju (Dedicated …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.As you may know, OWASP OWTF took part in the GSoC 2013. It was somewhat surprising (also to me) that OWTF got 4 slots, the same as ZAP (an OWASP flagship project I have …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.As a wrapper tool that depends on many tools, the migration from Backtrack to Kali Linux has been a bit of a challenge for the OWTF development team: Many tools were removed, all tools and dictionaries …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.If you have an owasp.org account, are familiar with python and would be willing to mentor some students OWASP OWTF needs you 🙂 5 students that applied to work on the Google Summer of Code …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Pentesting like a Grandmaster materials – BSides London 2013 UPDATE: 2013-07-28 – Added link to BSides London talk interview NOTE: Will update the post as soon as video is available only slides and demos …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.Here are a few links if you want to download the materials from the OWASP OWTF BruCon 2012 workshop that happened last week in Ghent, Belgium: – The slides are now online in slideshare …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.IMPORTANT: If you are attending the “Introducing OWTF” BruCon workshop on Wednesday please download the latest OWASP OWTF and latest DEMO Report. Thank you! Another round of GIT hell has taught me a couple …
Page 3: Browse more insights and updates from our blog archives. This page continues our expert content on security, research, and analysis.UPDATE: I will update this blog post with links to the video when available NOTE: Remember there is a Download option in slideshare :). “That was best description of why cross domain policy is …