SlideShare ist ein Scribd-Unternehmen logo
1 von 58
Downloaden Sie, um offline zu lesen
Offensive (Web, etc) Testing Framework
      My gift for the community

Berlin Sides, December 29th 2011


                         Abraham Aranguren
                                @7a_
                    abraham.aranguren@gmail.com
                            http://7-a.org
Agenda
• About me
• Lessons from:
     OSCP
     Experience
     Chess Players
• OWTF vs Traditional + Demos
• Conclusion
• Q&A
About me
•   Spanish dude
•   Degree + Diploma in Computer Science
•   Uni: Security research + honour mark
•   IT: Since 2000 (netadmin / developer)
•   Comeback to (offensive) security in 2007
•   OSCP, CISSP, GWEB, CEH, MCSE, Etc.
•   Web App Sec and Dev/Architect
•   OWTF, GIAC, BeEF
What is OSCP?
• Certification run by Offensive Security *
*Offensive Security maintain the Backtrack distro




100% practical exam:
• 24 hour hacking challenge
• Few pass the 1st time
• Experienced pen testers have failed this

 http://www.offensive-security.com/information-security-certifications/
Lessons from OSCP
Background: Nessus, etc were forbidden, scripts ok.

Approach to get a 100% score:
• Understand + script everything
• Make scripts reliable (!babysitting)
• Make scripts staged (results in < 10 mins)
• Scripts find vulns in background
• Scripts present information efficiently

The test taker is now:
• Fresh to analyse info + exploit vulns
• Using more time to think
Lessons from OSCP cont.
Others spent valuable energy to run (a lot of) tools by
  hand … I had this in < 10 minutes via scripts!:
Lessons from OSCP cont.
Newer results merged via script with exploitation notes,
  etc:
Lessons from Experience
Pen testers vs Bad guys
• Pen testers have time/scope constraints Bad guys don’t
• Pen testers have to write a report Bad guys don’t

Complexity is increasing
More complexity = more time needed to test properly

Customers are rarely willing to:
“Pay for enough / reasonable testing time“

A call for efficiency:
• We must find vulns faster
• We must be more efficient
• .. or bad guys will find the vulns, not us
Lessons from Experience cont.
Ways to beat time constraints:
• Test ahead of time (i.e. Silent testing)
• Automate as much as possible (i.e. Scripting)
• Efficient testing (i.e. Scripting/Analysis)
• Efficient reporting (i.e. Templates/Scripting)
Learning from Chess Players




 Image Credit: http://www.robotikka.com / Terra
Chess Complexity




   Image Credit: http://chessok.com
Efficient Chess Analysis
  Chess players have time constraints like Pen testers.
  From Alexander Kotov - "Think like a Grandmaster":
  1) Draw up a list of candidates moves
  1) Draw up a list of candidate paths of attack


  2) Analyse each variation once and only once
  2) Analyse tool output once and only once


  3) Having gone through step 1 and 2 make a move
  3) After 1) and 2) exploit the best path of attack

Ever analysed X in depth to only see “super-Y” later?
Chess Openings




 Image Credit: http://chessok.com
Chess Player approach
Chess players:
• Memorise openings
• Memorise endings
• Memorise entire lines of attack/defence
• Try hard to analyse games efficiently


Pen tester translation:
• Chess players precompute all they can
• Chess players analyse info only once
Garry Kasparov vs Nigel Short
World Championship Match 1993
“Kasparov was evidently disoriented as he used 1
  hour 29 minutes to Short's 11 minutes(!) for the
  entire game.“ Short (weaker) was 8 times faster


“In just 9 days after facing it for the first time …
  Kasparov and his team had found the best reply
  (11.Ne2 ) and even succeeded in completely
  bamboozling Short with 12.Be5: <This move was a
  surprise for me. I spent 45 minutes on my reply. I
  could not fathom out the complications …- Short“

http://www.chessgames.com/perl/chessgame?gid=1070677
http://www.chessgames.com/perl/chessgame?gid=1070681
Can we be more efficient?
Can tools, knowledge and human analysis
       be coordinated like an army?




Image Credit: http://pakistancriminalrecords.com
OWTF Process Demos (1+2)




    Image Credit: http://www.amamavas.com
OWFT vs Traditional: Disclaimer
Existing tools:
• Are great at what they do
• Solve difficult problems
• Their authors are typically very smart people!
• Made OWTF possible

Not all limitations covered next apply to all tools
Define once + Automate
Traditional
Too many tools to run manually
Figure out how to call the tool each time
Figure out how to overcome poor defaults (i.e. UA)
poor defaults sometimes hard-coded in the code!



 All tools are run for you automatically
 Define how to call each tool only once
 Useful defaults + Easy to run
Demo 3
Define + Automate
Comprehensive
Traditional
Remember tests to run
Remember tools/websites to perform each test
Remember best order to run tools / use sites




Tests are run automatically
Use of best known tools + websites
Calls tools/sites in the best known order
Implements tests not found on other tools
Demo 4
Comprehensive
Staged Report + Vuln Stats
 Traditional
No report until end of scan    waste of time
Report vulnerabilities 1 by 1 waste of time
Cannot analyse + exploit concurrently



You have a partial report in < 5 seconds
Refresh report = New results are highlighted
Reports vuln stats, which you can drill on
Fresh to analyse + exploit concurrently
Demo 5
Staged Report
Dynamic Report, flags, notes, etc.
 Traditional
Report is static + poor interaction
Cannot flag / rate / ignore findings
Cannot take notes / filter findings with your criteria



Report is dynamic + interactive
Can flag / rate / ignore findings
Can take notes / filter findings with your criteria
Pen tester can import / export reviews
Demo 6
Import / Export
   Review
Reliable + Partial results if crashed
 Traditional
Require babysitting (i.e. did it crash/stop?)
Lose all results + no report if crashed
Poor exception handling = crashes happen




Limited babysitting required (i.e. often none)
Tries hard not to crash + save results if crashed
Tool or plugin crashed?    save data + continue
Robust exception handling (I think ☺)
Demo 7
Exception Handling
Cancel + Move on support
 Traditional
Stuck / Crashed command      no report
Stuck / Crashed plugin   no report
Stuck / Crashed tool   no report




Stuck?   Control+C + saves data + moves on
Crashed?   Moves on (“finished”) + saves data
You can Control+C commands, plugins and owtf
When Control+C: Choose next cmd / plugin / exit
Demo 8
Cancel + Move on
    Support
Aligned to Standards
 Traditional
Not OWASP Testing Guide aligned
Not PTES aligned
Narrow standard coverage




OWASP Testing Guide aligned
PTES alignment-coverage planned
Extensive standard coverage
Demo 4
OWASP Testing Guide
    Aligned
Simulation + Silent testing support
 Traditional
No “Simulation mode”      Run and see (!)
Cannot start test without permission (usually)
No passive, semi passive, active test separation




Supports “Simulation mode”      1st see, then run
Can test without permission: Silent testing support
Passive, semi passive, active test separation
Test ahead of time = More efficiency
Demo 9
Simulation + Silent testing
        Support
Language agnostic, easy to extend
Traditional
Language dependent (ruby, python, perl, etc.)
Cannot contribute in your language (usually)
Difficult to extend / share info




Language agnostic: if the shell can run it = WIN
Contribute in your language (best if CLI-callable)
Easy to extend / share info
Easy setup and greppable DB
 Traditional
Hard to setup: libraries, gems, DB installs, etc
DB in obscure format
Cannot custom search DB




Easy to setup: copy dir + run
DB in plain text, links provided to everything
DB is easy to grep for custom searches
Demo 10
Greppable DB
Chess-like analysis support
 Traditional
Cannot pre-compute / define tests (self/other)
Cannot mark “best candidate moves”
Cannot analyse each option only once + !notes



Tests are pre-computed / defined (self + other)
Mark “best candidate moves” via flags
Mark as analysed via strike-through
Filter your analysis with your priorities + notes
Demo 11
Chess-like analysis
    Support
What about Tactical Fuzzing?
        i.e. Burp, ZAP, etc
 Traditional
Some tools do not support outbound proxies (!)
Can only pass their own info to the tactical fuzzer
Messy proxying when multiple tools are used




Can scrape results from all tools run
Can pass scraped results to tactical fuzzer
Proxy ok when multiple tools used under the hood
Proxy ok even if tool called has no proxy support
Demo 12
Outbound Proxy
Google Hacking without API keys
 Traditional
Some GH tools require API keys to work
Others require you to break CAPTCHA (!)




No API keys required
No CAPTCHA breaking required
Use of tunneable blanket searches instead
“Open all in tabs” for ease of use ☺
Demo 13
Google Hacking
without API Keys
OWTF > Running tools
 Traditional
Focused on small problems
Missing a lot from the OWASP Testing Guide
Must find X number of tools to bridge the gap




Calls the “best tool for the job” when possible
Implements many tests on its own too!
Links for test sites / “Suggestions”
Custom template support planned for reporting
Demo 14
OWTF tests without
  external tools
Demo 15
Aux Plugin intro
    Phising
Demo 16
  DoS
OWTF Considerations/Limitations
•    Relies on existing great tools != replacement
•    Developed on python 2.6.5
•    CLI Linux-only (dev on Backtrack 5 R1)
•    GUI Multiplatform (web page)
•    Lots of bugs (but stable! ☺)
•    Lots of features in my todo list! ☺
•    Not a “script kiddie tool” + Not a silverbullet
•    Does not try to rate severity/replace humans:
•    Focus is to provide data efficiently for the pen
    tester
OWTF Target User base


        Who is this for?
OWTF:
Not for Nessus Monkeys




 Image Credit: Steve Lord, BSides London 2011
OWTF: Import/Export Reviews
Jaded Cynic compatible




 Image Credit: Steve Lord, BSides London 2011
OWTF Goal:
Bring you closer to this




 Image Credit: Steve Lord, BSides London 2011
OWTF – I need your help
Licence?
• 3-clause-BSD (metasploit)
• GPL v3 / v2, Apache
• Other?


Hosting service?
• github (metasploit, BeEF, whatweb, …)
• googlecode
• sourceforge
• Other?
OWTF - I need your help
Tool authors: Can owtf run your tool better?

Pen testers / Python wizards:
• What is missing? (tools, resources, approach,..)
• What could be done better?

Web designers:
• Make the report look better / easier to use

JavaScript gurus:
• More ideas to improve interactive report

Regexp and Selenium gurus:
• To suggest better Regexps and/or approach
Conclusion
OWTF aims to make pen testing:
• Aligned with OWASP Testing Guide + PTES
• More efficient
• More comprehensive
• More creative and fun (minimise un-creative
  work)

This way pen testers will have time to:
• Focus on sharing information (tools, techniques, ..)
• Think out of the box for real (!babysit, !stupid
  work)
• Chain vulnerabilities like attackers do
• Really show impact so that risk is understood
Special thanks to
For getting me started:
Justin Searle: “Python Basics for Web App Pentesters” –
  OWASP AppSec EU 2011

For showing what I was missing in my process:
Jason Haddix: “The Web Application Hacking
   Toolchain” – BruCon 2011

For “do what you love” inspiration:
Haroon Meer: “You and your research” – Brucon 2011
Special thanks to
•   OWASP Testing Guide + PTES contributors
•   Andrés Riancho
•   Marcus Niemietz
•   Mario Heiderich
•   Michele Orru
•   Sandro Gauci
Q&A
          Abraham Aranguren
                 @7a_
     abraham.aranguren@gmail.com
             http://7-a.org


    Project info
Website: http://owtf.org/
Twitter: @owtfp

Weitere ähnliche Inhalte

Was ist angesagt?

Owasp web application security trends
Owasp web application security trendsOwasp web application security trends
Owasp web application security trendsbeched
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016bugcrowd
 
Automating Security Testing with the OWTF
Automating Security Testing with the OWTFAutomating Security Testing with the OWTF
Automating Security Testing with the OWTFJerod Brennen
 
BSides Lisbon 2013 - All your sites belong to Burp
BSides Lisbon 2013 - All your sites belong to BurpBSides Lisbon 2013 - All your sites belong to Burp
BSides Lisbon 2013 - All your sites belong to BurpTiago Mendo
 
Entomology 101
Entomology 101Entomology 101
Entomology 101snyff
 
Owasp tds
Owasp tdsOwasp tds
Owasp tdssnyff
 
Bug bounties - cén scéal?
Bug bounties - cén scéal?Bug bounties - cén scéal?
Bug bounties - cén scéal?Ciaran McNally
 
You need a PROcess to catch running processes and their modules_v2.0
You need a PROcess to catch running processes and their modules_v2.0You need a PROcess to catch running processes and their modules_v2.0
You need a PROcess to catch running processes and their modules_v2.0Michael Gough
 
The Hacker's Guide To Session Hijacking
The Hacker's Guide To Session HijackingThe Hacker's Guide To Session Hijacking
The Hacker's Guide To Session HijackingPatrycja Wegrzynowicz
 
Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101Zack Meyers
 
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 lokeshpidawekar
 
Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Ajay Negi
 
Automating to Augment Testing
Automating to Augment TestingAutomating to Augment Testing
Automating to Augment TestingAlan Richardson
 
Ruxmon cve 2012-2661
Ruxmon cve 2012-2661Ruxmon cve 2012-2661
Ruxmon cve 2012-2661snyff
 
Lessons Learned When Automating
Lessons Learned When AutomatingLessons Learned When Automating
Lessons Learned When AutomatingAlan Richardson
 
libinjection: from SQLi to XSS  by Nick Galbreath
libinjection: from SQLi to XSS  by Nick Galbreathlibinjection: from SQLi to XSS  by Nick Galbreath
libinjection: from SQLi to XSS  by Nick GalbreathCODE BLUE
 

Was ist angesagt? (20)

Owasp web application security trends
Owasp web application security trendsOwasp web application security trends
Owasp web application security trends
 
Flash it baby!
Flash it baby!Flash it baby!
Flash it baby!
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016
 
Automating Security Testing with the OWTF
Automating Security Testing with the OWTFAutomating Security Testing with the OWTF
Automating Security Testing with the OWTF
 
BSides Lisbon 2013 - All your sites belong to Burp
BSides Lisbon 2013 - All your sites belong to BurpBSides Lisbon 2013 - All your sites belong to Burp
BSides Lisbon 2013 - All your sites belong to Burp
 
Entomology 101
Entomology 101Entomology 101
Entomology 101
 
Owasp tds
Owasp tdsOwasp tds
Owasp tds
 
Bug bounties - cén scéal?
Bug bounties - cén scéal?Bug bounties - cén scéal?
Bug bounties - cén scéal?
 
You need a PROcess to catch running processes and their modules_v2.0
You need a PROcess to catch running processes and their modules_v2.0You need a PROcess to catch running processes and their modules_v2.0
You need a PROcess to catch running processes and their modules_v2.0
 
The Hacker's Guide To Session Hijacking
The Hacker's Guide To Session HijackingThe Hacker's Guide To Session Hijacking
The Hacker's Guide To Session Hijacking
 
How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF
 
Oscp preparation
Oscp preparationOscp preparation
Oscp preparation
 
Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101Web Hacking With Burp Suite 101
Web Hacking With Burp Suite 101
 
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015 Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
 
Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)
 
Automating to Augment Testing
Automating to Augment TestingAutomating to Augment Testing
Automating to Augment Testing
 
Augmented reality in your web proxy
Augmented reality in your web proxyAugmented reality in your web proxy
Augmented reality in your web proxy
 
Ruxmon cve 2012-2661
Ruxmon cve 2012-2661Ruxmon cve 2012-2661
Ruxmon cve 2012-2661
 
Lessons Learned When Automating
Lessons Learned When AutomatingLessons Learned When Automating
Lessons Learned When Automating
 
libinjection: from SQLi to XSS  by Nick Galbreath
libinjection: from SQLi to XSS  by Nick Galbreathlibinjection: from SQLi to XSS  by Nick Galbreath
libinjection: from SQLi to XSS  by Nick Galbreath
 

Ähnlich wie Offensive Testing Framework Community Gift

Abraham aranguren. legal and efficient web app testing without permission
Abraham aranguren. legal and efficient web app testing without permissionAbraham aranguren. legal and efficient web app testing without permission
Abraham aranguren. legal and efficient web app testing without permissionYury Chemerkin
 
Austin Python Learners Meetup - Everything you need to know about programming...
Austin Python Learners Meetup - Everything you need to know about programming...Austin Python Learners Meetup - Everything you need to know about programming...
Austin Python Learners Meetup - Everything you need to know about programming...Danny Mulligan
 
Micro Talk - Test Your S#!? !
Micro Talk - Test Your S#!? !Micro Talk - Test Your S#!? !
Micro Talk - Test Your S#!? !Adam Hill
 
Case of the Unexplained Support Issue – Troubleshooting steps for diagnosing ...
Case of the Unexplained Support Issue – Troubleshooting steps for diagnosing ...Case of the Unexplained Support Issue – Troubleshooting steps for diagnosing ...
Case of the Unexplained Support Issue – Troubleshooting steps for diagnosing ...Charles Beyer
 
When & How to Successfully use Test Automation for Mobile Applications
When & How to Successfully use Test Automation for Mobile ApplicationsWhen & How to Successfully use Test Automation for Mobile Applications
When & How to Successfully use Test Automation for Mobile ApplicationsTechnologyAssociationOregon
 
Testing API's: Tools & Tips & Tricks (Oh My!)
Testing API's: Tools & Tips & Tricks (Oh My!)Testing API's: Tools & Tips & Tricks (Oh My!)
Testing API's: Tools & Tips & Tricks (Oh My!)Ford Prior
 
How to use selenium successfully
How to use selenium successfullyHow to use selenium successfully
How to use selenium successfullyTEST Huddle
 
2 anton muzhailo - team development techniques you must know to be a valuab...
2   anton muzhailo - team development techniques you must know to be a valuab...2   anton muzhailo - team development techniques you must know to be a valuab...
2 anton muzhailo - team development techniques you must know to be a valuab...Ievgenii Katsan
 
Mastering Test Automation: How to Use Selenium Successfully
Mastering Test Automation: How to Use Selenium Successfully Mastering Test Automation: How to Use Selenium Successfully
Mastering Test Automation: How to Use Selenium Successfully Applitools
 
Testing sync engine
Testing sync engineTesting sync engine
Testing sync engineIlya Puchka
 
Continuous Delivery - Automate & Build Better Software with Travis CI
Continuous Delivery - Automate & Build Better Software with Travis CIContinuous Delivery - Automate & Build Better Software with Travis CI
Continuous Delivery - Automate & Build Better Software with Travis CIwajrcs
 
An Introduction to unit testing
An Introduction to unit testingAn Introduction to unit testing
An Introduction to unit testingSteven Casey
 
Why Software Test Performance Matters
Why Software Test Performance MattersWhy Software Test Performance Matters
Why Software Test Performance MattersSolano Labs
 
You build it, you run it
You build it, you run itYou build it, you run it
You build it, you run itSkyscanner
 
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»GoQA
 
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austinDev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austinMatt Tesauro
 

Ähnlich wie Offensive Testing Framework Community Gift (20)

Abraham aranguren. legal and efficient web app testing without permission
Abraham aranguren. legal and efficient web app testing without permissionAbraham aranguren. legal and efficient web app testing without permission
Abraham aranguren. legal and efficient web app testing without permission
 
Debugging
DebuggingDebugging
Debugging
 
Austin Python Learners Meetup - Everything you need to know about programming...
Austin Python Learners Meetup - Everything you need to know about programming...Austin Python Learners Meetup - Everything you need to know about programming...
Austin Python Learners Meetup - Everything you need to know about programming...
 
Micro Talk - Test Your S#!? !
Micro Talk - Test Your S#!? !Micro Talk - Test Your S#!? !
Micro Talk - Test Your S#!? !
 
Case of the Unexplained Support Issue – Troubleshooting steps for diagnosing ...
Case of the Unexplained Support Issue – Troubleshooting steps for diagnosing ...Case of the Unexplained Support Issue – Troubleshooting steps for diagnosing ...
Case of the Unexplained Support Issue – Troubleshooting steps for diagnosing ...
 
When & How to Successfully use Test Automation for Mobile Applications
When & How to Successfully use Test Automation for Mobile ApplicationsWhen & How to Successfully use Test Automation for Mobile Applications
When & How to Successfully use Test Automation for Mobile Applications
 
Testing API's: Tools & Tips & Tricks (Oh My!)
Testing API's: Tools & Tips & Tricks (Oh My!)Testing API's: Tools & Tips & Tricks (Oh My!)
Testing API's: Tools & Tips & Tricks (Oh My!)
 
How to use selenium successfully
How to use selenium successfullyHow to use selenium successfully
How to use selenium successfully
 
Developer disciplines
Developer disciplinesDeveloper disciplines
Developer disciplines
 
2 anton muzhailo - team development techniques you must know to be a valuab...
2   anton muzhailo - team development techniques you must know to be a valuab...2   anton muzhailo - team development techniques you must know to be a valuab...
2 anton muzhailo - team development techniques you must know to be a valuab...
 
Mastering Test Automation: How to Use Selenium Successfully
Mastering Test Automation: How to Use Selenium Successfully Mastering Test Automation: How to Use Selenium Successfully
Mastering Test Automation: How to Use Selenium Successfully
 
Testing sync engine
Testing sync engineTesting sync engine
Testing sync engine
 
Continuous Delivery - Automate & Build Better Software with Travis CI
Continuous Delivery - Automate & Build Better Software with Travis CIContinuous Delivery - Automate & Build Better Software with Travis CI
Continuous Delivery - Automate & Build Better Software with Travis CI
 
An Introduction to unit testing
An Introduction to unit testingAn Introduction to unit testing
An Introduction to unit testing
 
Why Software Test Performance Matters
Why Software Test Performance MattersWhy Software Test Performance Matters
Why Software Test Performance Matters
 
Enterprise PHP
Enterprise PHPEnterprise PHP
Enterprise PHP
 
You build it, you run it
You build it, you run itYou build it, you run it
You build it, you run it
 
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
 
Functional Tests. PHP Unconf 2016
Functional Tests. PHP Unconf 2016Functional Tests. PHP Unconf 2016
Functional Tests. PHP Unconf 2016
 
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austinDev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
Dev ops ci-ap-is-oh-my_security-gone-agile_ut-austin
 

Kürzlich hochgeladen

Almora call girls 📞 8617697112 At Low Cost Cash Payment Booking
Almora call girls 📞 8617697112 At Low Cost Cash Payment BookingAlmora call girls 📞 8617697112 At Low Cost Cash Payment Booking
Almora call girls 📞 8617697112 At Low Cost Cash Payment BookingNitya salvi
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...anamikaraghav4
 
Call Girls Agency In Goa 💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
Call Girls  Agency In Goa  💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...Call Girls  Agency In Goa  💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
Call Girls Agency In Goa 💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...russian goa call girl and escorts service
 
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130Suhani Kapoor
 
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...ritikasharma
 
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...rahim quresi
 
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Serviceanamikaraghav4
 
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...noor ahmed
 
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...anamikaraghav4
 
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...aamir
 
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment BookingCall Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Bookingnoor ahmed
 
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...noor ahmed
 
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser... Shivani Pandey
 
5* Hotels Call Girls In Goa {{07028418221}} Call Girls In North Goa Escort Se...
5* Hotels Call Girls In Goa {{07028418221}} Call Girls In North Goa Escort Se...5* Hotels Call Girls In Goa {{07028418221}} Call Girls In North Goa Escort Se...
5* Hotels Call Girls In Goa {{07028418221}} Call Girls In North Goa Escort Se...Apsara Of India
 
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near MeBook Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Meanamikaraghav4
 
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl GoaRussian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goasexy call girls service in goa
 

Kürzlich hochgeladen (20)

Almora call girls 📞 8617697112 At Low Cost Cash Payment Booking
Almora call girls 📞 8617697112 At Low Cost Cash Payment BookingAlmora call girls 📞 8617697112 At Low Cost Cash Payment Booking
Almora call girls 📞 8617697112 At Low Cost Cash Payment Booking
 
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
 
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
 
Call Girls Agency In Goa 💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
Call Girls  Agency In Goa  💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...Call Girls  Agency In Goa  💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
Call Girls Agency In Goa 💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
 
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
 
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
 
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
 
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
 
Call Girls New Ashok Nagar Delhi WhatsApp Number 9711199171
Call Girls New Ashok Nagar Delhi WhatsApp Number 9711199171Call Girls New Ashok Nagar Delhi WhatsApp Number 9711199171
Call Girls New Ashok Nagar Delhi WhatsApp Number 9711199171
 
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
 
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
 
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
 
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment BookingCall Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
 
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
 
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Pazhavanthangal WhatsApp Booking 7427069034 call girl ser...
 
5* Hotels Call Girls In Goa {{07028418221}} Call Girls In North Goa Escort Se...
5* Hotels Call Girls In Goa {{07028418221}} Call Girls In North Goa Escort Se...5* Hotels Call Girls In Goa {{07028418221}} Call Girls In North Goa Escort Se...
5* Hotels Call Girls In Goa {{07028418221}} Call Girls In North Goa Escort Se...
 
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near MeBook Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
 
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goaGoa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
 
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl GoaRussian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goa
 

Offensive Testing Framework Community Gift

  • 1. Offensive (Web, etc) Testing Framework My gift for the community Berlin Sides, December 29th 2011 Abraham Aranguren @7a_ abraham.aranguren@gmail.com http://7-a.org
  • 2. Agenda • About me • Lessons from: OSCP Experience Chess Players • OWTF vs Traditional + Demos • Conclusion • Q&A
  • 3. About me • Spanish dude • Degree + Diploma in Computer Science • Uni: Security research + honour mark • IT: Since 2000 (netadmin / developer) • Comeback to (offensive) security in 2007 • OSCP, CISSP, GWEB, CEH, MCSE, Etc. • Web App Sec and Dev/Architect • OWTF, GIAC, BeEF
  • 4. What is OSCP? • Certification run by Offensive Security * *Offensive Security maintain the Backtrack distro 100% practical exam: • 24 hour hacking challenge • Few pass the 1st time • Experienced pen testers have failed this http://www.offensive-security.com/information-security-certifications/
  • 5. Lessons from OSCP Background: Nessus, etc were forbidden, scripts ok. Approach to get a 100% score: • Understand + script everything • Make scripts reliable (!babysitting) • Make scripts staged (results in < 10 mins) • Scripts find vulns in background • Scripts present information efficiently The test taker is now: • Fresh to analyse info + exploit vulns • Using more time to think
  • 6. Lessons from OSCP cont. Others spent valuable energy to run (a lot of) tools by hand … I had this in < 10 minutes via scripts!:
  • 7. Lessons from OSCP cont. Newer results merged via script with exploitation notes, etc:
  • 8. Lessons from Experience Pen testers vs Bad guys • Pen testers have time/scope constraints Bad guys don’t • Pen testers have to write a report Bad guys don’t Complexity is increasing More complexity = more time needed to test properly Customers are rarely willing to: “Pay for enough / reasonable testing time“ A call for efficiency: • We must find vulns faster • We must be more efficient • .. or bad guys will find the vulns, not us
  • 9. Lessons from Experience cont. Ways to beat time constraints: • Test ahead of time (i.e. Silent testing) • Automate as much as possible (i.e. Scripting) • Efficient testing (i.e. Scripting/Analysis) • Efficient reporting (i.e. Templates/Scripting)
  • 10. Learning from Chess Players Image Credit: http://www.robotikka.com / Terra
  • 11. Chess Complexity Image Credit: http://chessok.com
  • 12. Efficient Chess Analysis Chess players have time constraints like Pen testers. From Alexander Kotov - "Think like a Grandmaster": 1) Draw up a list of candidates moves 1) Draw up a list of candidate paths of attack 2) Analyse each variation once and only once 2) Analyse tool output once and only once 3) Having gone through step 1 and 2 make a move 3) After 1) and 2) exploit the best path of attack Ever analysed X in depth to only see “super-Y” later?
  • 13. Chess Openings Image Credit: http://chessok.com
  • 14. Chess Player approach Chess players: • Memorise openings • Memorise endings • Memorise entire lines of attack/defence • Try hard to analyse games efficiently Pen tester translation: • Chess players precompute all they can • Chess players analyse info only once
  • 15. Garry Kasparov vs Nigel Short World Championship Match 1993 “Kasparov was evidently disoriented as he used 1 hour 29 minutes to Short's 11 minutes(!) for the entire game.“ Short (weaker) was 8 times faster “In just 9 days after facing it for the first time … Kasparov and his team had found the best reply (11.Ne2 ) and even succeeded in completely bamboozling Short with 12.Be5: <This move was a surprise for me. I spent 45 minutes on my reply. I could not fathom out the complications …- Short“ http://www.chessgames.com/perl/chessgame?gid=1070677 http://www.chessgames.com/perl/chessgame?gid=1070681
  • 16. Can we be more efficient? Can tools, knowledge and human analysis be coordinated like an army? Image Credit: http://pakistancriminalrecords.com
  • 17. OWTF Process Demos (1+2) Image Credit: http://www.amamavas.com
  • 18. OWFT vs Traditional: Disclaimer Existing tools: • Are great at what they do • Solve difficult problems • Their authors are typically very smart people! • Made OWTF possible Not all limitations covered next apply to all tools
  • 19. Define once + Automate Traditional Too many tools to run manually Figure out how to call the tool each time Figure out how to overcome poor defaults (i.e. UA) poor defaults sometimes hard-coded in the code! All tools are run for you automatically Define how to call each tool only once Useful defaults + Easy to run
  • 20. Demo 3 Define + Automate
  • 21. Comprehensive Traditional Remember tests to run Remember tools/websites to perform each test Remember best order to run tools / use sites Tests are run automatically Use of best known tools + websites Calls tools/sites in the best known order Implements tests not found on other tools
  • 23. Staged Report + Vuln Stats Traditional No report until end of scan waste of time Report vulnerabilities 1 by 1 waste of time Cannot analyse + exploit concurrently You have a partial report in < 5 seconds Refresh report = New results are highlighted Reports vuln stats, which you can drill on Fresh to analyse + exploit concurrently
  • 25. Dynamic Report, flags, notes, etc. Traditional Report is static + poor interaction Cannot flag / rate / ignore findings Cannot take notes / filter findings with your criteria Report is dynamic + interactive Can flag / rate / ignore findings Can take notes / filter findings with your criteria Pen tester can import / export reviews
  • 26. Demo 6 Import / Export Review
  • 27. Reliable + Partial results if crashed Traditional Require babysitting (i.e. did it crash/stop?) Lose all results + no report if crashed Poor exception handling = crashes happen Limited babysitting required (i.e. often none) Tries hard not to crash + save results if crashed Tool or plugin crashed? save data + continue Robust exception handling (I think ☺)
  • 29. Cancel + Move on support Traditional Stuck / Crashed command no report Stuck / Crashed plugin no report Stuck / Crashed tool no report Stuck? Control+C + saves data + moves on Crashed? Moves on (“finished”) + saves data You can Control+C commands, plugins and owtf When Control+C: Choose next cmd / plugin / exit
  • 30. Demo 8 Cancel + Move on Support
  • 31. Aligned to Standards Traditional Not OWASP Testing Guide aligned Not PTES aligned Narrow standard coverage OWASP Testing Guide aligned PTES alignment-coverage planned Extensive standard coverage
  • 32. Demo 4 OWASP Testing Guide Aligned
  • 33. Simulation + Silent testing support Traditional No “Simulation mode” Run and see (!) Cannot start test without permission (usually) No passive, semi passive, active test separation Supports “Simulation mode” 1st see, then run Can test without permission: Silent testing support Passive, semi passive, active test separation Test ahead of time = More efficiency
  • 34. Demo 9 Simulation + Silent testing Support
  • 35. Language agnostic, easy to extend Traditional Language dependent (ruby, python, perl, etc.) Cannot contribute in your language (usually) Difficult to extend / share info Language agnostic: if the shell can run it = WIN Contribute in your language (best if CLI-callable) Easy to extend / share info
  • 36. Easy setup and greppable DB Traditional Hard to setup: libraries, gems, DB installs, etc DB in obscure format Cannot custom search DB Easy to setup: copy dir + run DB in plain text, links provided to everything DB is easy to grep for custom searches
  • 38. Chess-like analysis support Traditional Cannot pre-compute / define tests (self/other) Cannot mark “best candidate moves” Cannot analyse each option only once + !notes Tests are pre-computed / defined (self + other) Mark “best candidate moves” via flags Mark as analysed via strike-through Filter your analysis with your priorities + notes
  • 40. What about Tactical Fuzzing? i.e. Burp, ZAP, etc Traditional Some tools do not support outbound proxies (!) Can only pass their own info to the tactical fuzzer Messy proxying when multiple tools are used Can scrape results from all tools run Can pass scraped results to tactical fuzzer Proxy ok when multiple tools used under the hood Proxy ok even if tool called has no proxy support
  • 42. Google Hacking without API keys Traditional Some GH tools require API keys to work Others require you to break CAPTCHA (!) No API keys required No CAPTCHA breaking required Use of tunneable blanket searches instead “Open all in tabs” for ease of use ☺
  • 44. OWTF > Running tools Traditional Focused on small problems Missing a lot from the OWASP Testing Guide Must find X number of tools to bridge the gap Calls the “best tool for the job” when possible Implements many tests on its own too! Links for test sites / “Suggestions” Custom template support planned for reporting
  • 45. Demo 14 OWTF tests without external tools
  • 46. Demo 15 Aux Plugin intro Phising
  • 47. Demo 16 DoS
  • 48. OWTF Considerations/Limitations • Relies on existing great tools != replacement • Developed on python 2.6.5 • CLI Linux-only (dev on Backtrack 5 R1) • GUI Multiplatform (web page) • Lots of bugs (but stable! ☺) • Lots of features in my todo list! ☺ • Not a “script kiddie tool” + Not a silverbullet • Does not try to rate severity/replace humans: • Focus is to provide data efficiently for the pen tester
  • 49. OWTF Target User base Who is this for?
  • 50. OWTF: Not for Nessus Monkeys Image Credit: Steve Lord, BSides London 2011
  • 51. OWTF: Import/Export Reviews Jaded Cynic compatible Image Credit: Steve Lord, BSides London 2011
  • 52. OWTF Goal: Bring you closer to this Image Credit: Steve Lord, BSides London 2011
  • 53. OWTF – I need your help Licence? • 3-clause-BSD (metasploit) • GPL v3 / v2, Apache • Other? Hosting service? • github (metasploit, BeEF, whatweb, …) • googlecode • sourceforge • Other?
  • 54. OWTF - I need your help Tool authors: Can owtf run your tool better? Pen testers / Python wizards: • What is missing? (tools, resources, approach,..) • What could be done better? Web designers: • Make the report look better / easier to use JavaScript gurus: • More ideas to improve interactive report Regexp and Selenium gurus: • To suggest better Regexps and/or approach
  • 55. Conclusion OWTF aims to make pen testing: • Aligned with OWASP Testing Guide + PTES • More efficient • More comprehensive • More creative and fun (minimise un-creative work) This way pen testers will have time to: • Focus on sharing information (tools, techniques, ..) • Think out of the box for real (!babysit, !stupid work) • Chain vulnerabilities like attackers do • Really show impact so that risk is understood
  • 56. Special thanks to For getting me started: Justin Searle: “Python Basics for Web App Pentesters” – OWASP AppSec EU 2011 For showing what I was missing in my process: Jason Haddix: “The Web Application Hacking Toolchain” – BruCon 2011 For “do what you love” inspiration: Haroon Meer: “You and your research” – Brucon 2011
  • 57. Special thanks to • OWASP Testing Guide + PTES contributors • Andrés Riancho • Marcus Niemietz • Mario Heiderich • Michele Orru • Sandro Gauci
  • 58. Q&A Abraham Aranguren @7a_ abraham.aranguren@gmail.com http://7-a.org Project info Website: http://owtf.org/ Twitter: @owtfp