Chuck Willis OWASP AppSec DC April 4, 2012
|
|
|
- Dina Pitts
- 9 years ago
- Views:
Transcription
1 OWASP BROKEN WEB APPLICATIONS (OWASP BWA) 1.0 Release (Candidate) Chuck Willis OWASP AppSec DC April 4, 2012
2 About Me Technical Director at Mandiant in DC Leader of OWASP Broken Web Applications project 12+ years total experience in Information Security Application Security, Penetration Testing, Source Code Analysis, Forensics, Incident Response, R&D Attend OWASP DC Chapter meetings and CapSec (occasionally) 2
3 We are MANDIANT VISA Qualified Incident Response Assessor (QIRA) APT and CDT experts Application and Network Security Evaluations Located in Washington New York Los Angeles San Francisco Professional and managed services, software and education We are Hiring! 3
4 Motivation
5 Problem Looking for web applications with vulnerabilities where I could: Test web application scanners Test manual attack techniques Test source code analysis tools Look at the code that implements the vulnerabilities Modify code to fix vulnerabilities Test web application firewalls Examine evidence left by attacks 5
6 OWASP WebGoat It is a great learning tool, but It is a training environment, not a real application Same holds for many other artificial applications 6
7 Proprietary Free Apps Realistic applications with vulnerabilities Often closed source, which prevents some uses Can conflict with one another Can be difficult to install Licensing restrictions 7
8 Solution Created free, Linux-based Virtual Machine Contains a variety of web applications Some intentionally broken Some old versions of open source applications Pre-configured and ready to use / test All applications are open source Allows for source code analysis Allows users to modify the source to fix vulnerabilities (or add new ones) 8
9 OWASP BWA History Initial 0.9 release at OWASP AppSec DC 2009 New version released once or twice a year 0.94 released in July release candidate 1 released today Full 1.0 release after short review and bug fix period 9
10 OWASP BWA Details
11 Virtual Machine Project distributes a Virtual Machine in VMware format Compatible with no-cost VMware Player and VMware Server (and VMware commercial products) Intentionally uses older virtual machine format (compatible with Workstation 5.0+ and ESX 3.0+) Should work in other virtualization solutions Welcome any volunteers to test this 11
12 Base Operating System OS is Ubuntu Linux Server LTS No X-Windows / Graphical User Interface Managed via Console OpenSSH Samba phpmyadmin 12
13 Base Software Apache PHP Perl MySQL Tomcat OpenJDK Mono 13
14 Additional Software SubVersion client GIT client PostgreSQL ModSecurity and OWASP Core Rule Set Custom scripts 14
15 Training Applications
16 Intentionally Broken Training Apps OWASP WebGoat version 5.4.x (Java) OWASP WebGoat.NET (C#) OWASP ESAPI SwingSet 05b2.x (Java) OWASP ESAPI SwingSet Interactive x (Java) OWASP ZAP-WAVE 0.2.x (Java JSP) Mutillidae version (PHP) Damn Vulnerable Web Application version 1.8.x (PHP) Ghost (PHP) Highlighted items are updates in OWASP BWA
17 Realistic Applications
18 Realistic, Intentionally Broken Apps OWASP Vicnum version 1.4 (PHP/Perl) Jotto (PHP/Perl) Peruggia version 1.2 (PHP) Google Gruyere version (Python) Hackxor (Java JSP) WackoPicko version (PHP) BodgeIt 1.3.x (Java JSP) 18
19 Old Applications
20 Old Versions of Real Applications WordPress (PHP, released December 31, 2005) GetBoo version 1.04 (PHP, released April 7, 2008) Yazd version 1.0 (Java, released February 20, 2002) WebCalendar version 1.03 (PHP, released April 11, 2006) TikiWiki version (PHP, released September 5, 2006) AWStats version 6.4 (Perl, released February 25,2005) OrangeHRM version (PHP, released May 7, 2009) gtd-php version 0.7 (PHP, released September 30, 2006) Gallery2 version 2.1 (PHP, released March 23, 2006) Joomla version (PHP, released November 4, 2009) 20
21 Other Applications
22 Other Applications Demonstration Pages / Small Applications OWASP CSRFGuard Test Application version 2.2 (Java) Mandiant Struts Forms (Java/Struts) Simple ASP.NET Forms (ASP.NET/C#) Simple Form with DOM Cross Site Scripting (HTML/JavaScript) OWASP Demonstration Applications OWASP AppSensor Demo Application (Java) 22
23 Other Features
24 Editing Applications Application code can be edited via SMB shares, SSH, or the console Updates to PHP, JSP, etc. application files will take place immediately Scripts provided to rebuild and redeploy applications that require it: (new) WebGoat Yazd CSRFGuard Test Apps SwingSet Apps 24
25 Updating VM (new) Scripts are provided to update VM from source code repositories OWASP BWA specific files from Google Code SVN repository Application files from their SVN or GIT repositories Can break applications due to changes in database schemas or dependencies Can allow for using updated versions of applications without waiting for a new version of OWASP BWA 25
26 OWASP ModSecurity Core Rule Set (CRS) Web server on OWASP BWA is running mod_security By default, no rules are enabled Scripts are provided to: Enable logging using CRS: owaspbwa-modsecurity-crs-log.sh Enable blocking using CRS: owaspbwa-modsecurity-crs-block.sh Disable all rules: owaspbwa-modsecurity-crs-off.sh Rules can be easily edited via SMB shares 26
27 Log Files Logging for the web and application servers are left in their default configuration What you will most likely see when responding to an incident Logs are available via SMB share Logging settings can be easily edited Logs are cleared when VM is packaged 27
28 User Guide (new) User Guide has been started on Google Code Wiki Welcome any volunteers to contribute to this 28
29 Vulnerabilities
30 Where are the vulnerabilities? Don t have a master list of vulnerabilities (yet) Counting on the community to contribute Using Trac issue tracker at SourceForge: 30
31 Tracking Known Vulnerabilities Anyone can browse issues 31
32 Tracking Known Vulnerabilities Anyone can search issues 32
33 Tracking Known Vulnerabilities Anyone can see details on issues 33
34 Tracking Known Vulnerabilities Anyone can submit issues 34
35 Tracking Known Vulnerabilities Registered users can edit issues 35
36 Present and Future
37 New Release and Downloads Version 1.0rc1 of the VM has been released today! Fixes some bugs, updates some applications, and adds some applications from the 0.94 release Download link off Version 1.0 final will be released after people have had a bit of time to look at the release candidate 37
38 The Future Continue documenting project (User Guide) Continue cataloging vulnerabilities into a master list Incorporate additional broken apps as they are suggested 38
39 We welcome any help, feedback, or broken apps you can provide! 39
40 More Information and Getting Involved More information on the project can be found at Join our Google Group: owaspbwa Follow us on Submit bugs and security issues to the trackers 40
41 OWASP BROKEN WEB APPLICATIONS (OWASP BWA) 1.0 Release (Candidate) Chuck Willis OWASP AppSec DC April 4, 2012
SYWorks Vulnerable Web Applications Compilation For Penetration Testing Installation Guide
SYWorks Vulnerable Web Applications Compilation For Penetration Testing Installation Guide This document provides installation guide on how to create your own penetration testing environment with the pre-installed
Metasploit Pro Getting Started Guide
Metasploit Pro Getting Started Guide Metasploit Pro Getting Started Guide Release 3.6 March 7, 2011 Table of Contents Metasploit Pro... 1 Getting Started Guide... 1 Welcome... 4 About This Guide... 5 Target
Web Application Security: Exercise Development Approaches
Web Application Security: Exercise Development Approaches James Walden [email protected] Approaches 1. Write your own web application Students evaluate and fix your code. 2. Students write a web application
OpenShift on you own cloud. Troy Dawson OpenShift Engineer, Red Hat [email protected] November 1, 2013
OpenShift on you own cloud Troy Dawson OpenShift Engineer, Red Hat [email protected] November 1, 2013 2 Infrastructure-as-a-Service Servers in the Cloud You must build and manage everything (OS, App Servers,
KonyOne Server Installer - Linux Release Notes
KonyOne Server Installer - Linux Release Notes Table of Contents 1 Overview... 3 1.1 KonyOne Server installer for Linux... 3 1.2 Silent installation... 4 2 Application servers supported... 4 3 Databases
JAVA IN THE CLOUD PAAS PLATFORM IN COMPARISON
JAVA IN THE CLOUD PAAS PLATFORM IN COMPARISON Eberhard Wolff Architecture and Technology Manager adesso AG, Germany 12.10. Agenda A Few Words About Cloud Java and IaaS PaaS Platform as a Service Google
How to Create a Simple Content Management Solution with Joomla! in a vcloud Environment. A VMware Cloud Evaluation Reference Document
How to Create a Simple Content Management Solution with Joomla! in a vcloud Environment A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach to computing
Managing Web & Application Security with OWASP bringing it all together. Tobias Gondrom (OWASP Project Leader)
Managing Web & Application Security with OWASP bringing it all together Tobias Gondrom (OWASP Project Leader) OWASP World OWASP is a worldwide free and open community focused on improving the security
Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member
iweb Management Packages - List of supported services and software
iweb Management Packages - List of supported services and software Introduction Operating Systems and Control s Virtualization Backups Linux Databases (Linux) Web Servers (linux) Programming languages
Virtual Machine daloradius Administrator Guide Version 0.9-9
Virtual Machine daloradius Administrator Guide Version 0.9-9 May 2011 Liran Tal of Enginx Contact Email: daloradius Website: Enginx website: [email protected] http://www.daloradius.com http://www.enginx.com
VPS Cloud Hosting. Call (02) 9934 0594
Hosting With a clustered hosting platform, auto-failover network, built on IBM Blade servers and completely managed by VMware - Netregistry s hosting is a great solution for resellers, creative agencies
Source Control Systems
Source Control Systems SVN, Git, GitHub SoftUni Team Technical Trainers Software University http://softuni.bg Table of Contents 1. Software Configuration Management (SCM) 2. Version Control Systems: Philosophy
A Guide to Preparing for the GSM Capstone Exam
A Guide to Preparing for the GSM Capstone Exam by: Courtney Imbert, [email protected] Last update: November 11, 2015 An Overview of the GSM Capstone Exam The GSM (GIAC Security Manager) is the capstone
Download Virtualization Software Download a Linux-based OS Creating a Virtual Machine using VirtualBox: VM name
Download Virtualization Software You will first need to download and install a virtualization product. This will allow you to create a virtual machine which you can install a Linux distribution on. I recommend
How to Create an Enterprise Content Management Solution Based on Alfresco in a vcloud Environment. A VMware Cloud Evaluation Reference Document
How to Create an Enterprise Content Management Solution Based on Alfresco in a vcloud Environment A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810. October 21, 2013
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810 October 21, 2013 To: RE: All Vendors Request for Information (RFI) The State of Washington, Department
How to Use a LAMP Stack on vcloud for Optimal PHP Application Performance. A VMware Cloud Evaluation Reference Document
How to Use a LAMP Stack on vcloud for Optimal PHP Application Performance A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach to computing that pools
OrangeHRM Web Installation Guide for Windows
OrangeHRM Web Installation Guide for Windows All rights reserved. Published in the United States of America. This publication is protected by copyright, and permission must be obtained from the publisher
Developer Workshop 2015. Marc Dumontier McMaster/OSCAR-EMR
Developer Workshop 2015 Marc Dumontier McMaster/OSCAR-EMR Agenda Code Submission 101 Infrastructure Tools Developing OSCAR Code Submission: Process OSCAR EMR Sourceforge http://www.sourceforge.net/projects/oscarmcmaster
1 Download & Installation... 4. 1 Usernames and... Passwords
Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...
Bigstep Server Management Service Details
Bigstep Server Management Service Details Release date: 08.06.2013 Intro This document provides a reference point for customers regarding the set of services that this covers and more importantly what
JUSTIN J. LITTLE Build and Release Engineer
JUSTIN J. LITTLE Build and Release Engineer TECHNICAL SKILLS Build and deploy automation with ANT, Maven. Continuous Integration, build server setup and management Business process analysis, build and
Tobias Gondrom (OWASP Global Board Member)
Tobias Gondrom (OWASP Global Board Member) OWASP World OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (Internal Attacker - Beginner version) By: magikh0e - [email protected] Last Edit: July 07 2012 This guide assumes a few things... 1. You have installed Backtrack before
HW9 WordPress & Google Analytics
HW9 WordPress & Google Analytics MSCI:3400 Data Communications Due Monday, December 14, 2015 @ 8:00am Late submissions will not be accepted. In this individual assignment you will purchase and configure
Sahana Training Program Day Schedule v0.5
Day 1 Description Duration 9:20 am 9:20 am Welcome to Sahana Training Program Keynote Training Program overview, introduction to trainers and participants Overview of the Sahana system Introduction to
How to Create a Flexible CRM Solution Based on SugarCRM in a vcloud Environment. A VMware Cloud Evaluation Reference Document
How to Create a Flexible CRM Solution Based on SugarCRM in a vcloud Environment A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach to computing that
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
Microsoft Azure: Opção de Nuvem para Todo o Desenvolvedor. Danilo Bordini & Osvaldo Daibert Microsoft Brasil @dbordini @daibert
Microsoft Azure: Opção de Nuvem para Todo o Desenvolvedor Danilo Bordini & Osvaldo Daibert Microsoft Brasil @dbordini @daibert Open Source on Microsoft Azure Two categories Compute Data IaaS, PaaS, and
Java/J2EE or Web Developer. Formal Education. Technical knowledge. Spoken Languages
Jonathan ROUSSEAU 27 years old (3 rd of February 1983) Bruyères, 15/A 4950 Waimes +32 (473) 69 82 42 [email protected] http://www.jrousseau.be Java/J2EE or Web Developer Formal Education 2000:
Preparing for the Cross Site Request Forgery Defense
Preparing for the Cross Site Request Forgery Defense Chuck Willis [email protected] Black Hat DC 2008 February 20, 2008 About Me Principal Consultant with MANDIANT in Alexandria, VA Full spectrum
How to Create a Multi-user Content Management Platform with Drupal in a vcloud Environment. A VMware Cloud Evaluation Reference Document
How to Create a Multi-user Content Management Platform with Drupal in a vcloud Environment A VMware Cloud Evaluation Reference Document Contents About Cloud Computing Cloud computing is an approach to
CDH installation & Application Test Report
CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: [email protected]) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest
Plexxi Control Installation Guide Release 2.1.0
Plexxi Control Installation Guide Release 2.1.0 702-20002-10 Rev 1.2 February 19, 2015 100 Innovative Way - Suite 3322 Nashua, NH 03062 Tel. +1.888.630.PLEX (7539) www.plexxi.com Notices The information
Virtual machine W4M- Galaxy: Installation guide
Virtual machine W4M- Galaxy: Installation guide Christophe Duperier August, 6 th 2014 v03 This document describes the installation procedure and the functionalities provided by the W4M- Galaxy virtual
Trollhättan, Sweden. http://keryx.se/ http://twitter.com/itpastorn/ http://itpastorn.blogspot.com/
Trollhättan, Sweden Lars Gunther is a web developer, computer science teacher and a pastor, who lives in Trollhättan, Sweden. He is the lead editor of several courses for WaSP Interact and invited expert
OpenNebula Cloud Platform for Data Center Virtualization
OSDC 2013 Nüremberg, Germany 17-18 April, 2013 OpenNebula Cloud Platform for Data Center Virtualization Constantino Vázquez Blanco OpenNebula Project Engineer @tinova79 OpenNebula Project. Creative Commons
inforouter V8.0 Server & Client Requirements
inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended
DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:
DTWMS Required Software Engineers 1. Senior Java Programmer (3 Positions) Responsibilities: Responsible to deliver quality software solutions using standard end to end software development cycle Collaborate
Evaluation of Penetration Testing Software. Research
Evaluation of Penetration Testing Software Research Penetration testing is an evaluation of system security by simulating a malicious attack, which, at the most fundamental level, consists of an intellectual
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Deployment - post Xserve
MONTREAL 1/3 JULY 2011 Deployment - post Xserve Pascal Robert Miguel Arroz David LeBer The Menu Deployment options Deployment on CentOS Linux Deployment on Ubuntu Linux Deployment on BSD Hardware/environment
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
The AppSec How-To: Achieving Security in DevOps
The AppSec How-To: Achieving Security in DevOps How do you integrate security within a Continuous Deployment (CD) environment - where every 5 minutes a feature, an enhancement, or a bug fix needs to be
ALERT installation setup
ALERT installation setup In order to automate the installation process of the ALERT system, the ALERT installation setup is developed. It represents the main starting point in installing the ALERT system.
Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May 2012 - Belfast
Building & Measuring Security in Web Applications Fabio Cerullo Cycubix Limited 30 May 2012 - Belfast Brief Bio - CEO & Founder Cycubix Limited - 10+ years security experience in Technology, Manufacturing,
Open Source Technologies on Microsoft Azure
Open Source Technologies on Microsoft Azure A Survey @DChappellAssoc Copyright 2014 Chappell & Associates The Main Idea i Open source technologies are a fundamental part of Microsoft Azure The Big Questions
Security Tools - Hands On
Security Tools - Hands On SecAppDev 2014 Ken van Wyk, @KRvW! Leuven, Belgium 10-14 February 2014 Caveats and Warnings This is not a sales pitch for any product(s) If you want to talk to a sales person,
User Manual of the Pre-built Ubuntu 9 Virutal Machine
SEED Document 1 User Manual of the Pre-built Ubuntu 9 Virutal Machine Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
How To Run A Hello World On Android 4.3.3 (Jdk) On A Microsoft Ds.Io (Windows) Or Android 2.7.3 Or Android 3.5.3 On A Pc Or Android 4 (
Developing Android applications in Windows Below you will find information about the components needed for developing Android applications and other (optional) software needed to connect to the institution
Directions for VMware Ready Testing for Application Software
Directions for VMware Ready Testing for Application Software Introduction To be awarded the VMware ready logo for your product requires a modest amount of engineering work, assuming that the pre-requisites
Managed Servers ASA Extract FY14
Managed Servers ASA Extract FY14 1.0 Service Summary 1.1 Name Managed Servers 1.7 Mission/Vision UW IT currently manages over 900 managed servers for various owners and functions. There are 2 primary types
EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual
EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual Released January 2015 Updated March 2015 Table of Contents Overview...2 General Installation Considerations...2
Guide to Shared Hosting
Guide to Shared Hosting OFFICE AU 2/45 Ena Street, Terrigal, NSW 2260 Australia OFFICE UK Home Farm, Cottesbrooke, Northamptonshire NN6 8PH United Kingdom WEB www.qiq.cc [email protected] Hello! With thousands
How to hack a website with Metasploit
How to hack a website with Metasploit By Sumedt Jitpukdebodin Normally, Penetration Tester or a Hacker use Metasploit to exploit vulnerability services in the target server or to create a payload to make
INUVIKA OVD INSTALLING INUVIKA OVD ON RHEL 6
INUVIKA OVD INSTALLING INUVIKA OVD ON RHEL 6 Mathieu SCHIRES Version: 0.96.1 Published January 19, 2015 http://www.inuvika.com Contents 1 Prerequisites: RHEL 6 3 1.1 System Requirements...................................
Linux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
Database Build and Release will get started soon
#sqlinthecity Database Build and Release will get started soon Ernest Hwang Principal Software Engineer, Practice Fusion http://practicefusion.com/careers/ While you re waiting, check out SQL Prompt #sqlinthecity
A New Era. A New Edge. Phishing within your company
Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security
How To Fix A Snare Server On A Linux Server On An Ubuntu 4.5.2 (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking
Snare System Version 6.3.5 Release Notes is pleased to announce the release of Snare Server Version 6.3.5. Snare Server Version 6.3.5 Bug Fixes: The Agent configuration retrieval functionality within the
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Bitrix Site Manager. VMBitrix Virtual Machine. Quick Start And Usage Guide
Bitrix Site Manager VMBitrix Virtual Machine. Quick Start And Usage Guide Contents Introduction... 3 Chapter 1. Starting The VMBitrix Virtual Machine... 4 Minimum Requirements For VMWare Player / VMBitrix...
Gabriel Iuga. London, United Kingdom Tel: 0747 856 2661; Email: [email protected] Website: www.gabriel-iuga.com
Employment History: Gabriel Iuga London, United Kingdom Tel: 0747 856 2661; Email: [email protected] Website: www.gabriel-iuga.com November 2014 Present November 2015 to Present November 2014 to November
ModSecurity as Universal Cross-platform Web Protection Tool
ModSecurity as Universal Cross-platform Web Protection Tool Ryan Barnett Greg Wroblewski Abstract For many years ModSecurity was a number one free open source web application firewall for the Apache web
Interoperabilnost LINUX-Windows. It is easily possible for Linux & Windows to coexist & even work together.
Interoperabilnost LINUX-Windows It is easily possible for Linux & Windows to coexist & even work together. 1. Crossplatform software 2. File formats 3. Remote control 4. Samba 5. Running Windows in Linux
Snare System Version 6.3.4 Release Notes
Snare System Version 6.3.4 Release Notes is pleased to announce the release of Snare Server Version 6.3.4. Snare Server Version 6.3.4 New Features The behaviour of the Snare Server reflector has been modified
OCS Virtual image. User guide. Version: 1.3.1 Viking Edition
OCS Virtual image User guide Version: 1.3.1 Viking Edition Publication date: 30/12/2012 Table of Contents 1. Introduction... 2 2. The OCS virtualized environment composition... 2 3. What do you need?...
App Central: Developer's Guide. For APKG 2.0
App Central: Developer's Guide For APKG 2.0 Revision: 2.0.0 Update: Aug 1, 2013 1 Table of Content 1 System Requirements... 3 1.1 Build Machine... 3 1.2 Target Machine... 3 2 About APKG... 4 2.1 Getting
Snare System Version 6.3.6 Release Notes
Snare System Version 6.3.6 Release Notes is pleased to announce the release of Snare Server Version 6.3.6. Snare Server Version 6.3.6 New Features Added objective and user documentation to the email header,
How to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit)
How to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit) Introduction Prerequisites This tutorial will show you step-by-step on how to install Multicraft 1.8.2 on a new VPS or dedicated
Nipper Studio Beginner s Guide
Nipper Studio Beginner s Guide Multiple Award Winning Security Software Version 2.1 Published March 2015 Titania Limited 2014. All Rights Reserved This document is intended to provide advice and assistance
Virtual Desktop Infrastructure in
Introducing Virtual Desktop Infrastructure in Propalms TSE 6.0 1. Introduction: Propalms TSE 6.0 introduces the Virtual Desktop Infrastructure that lets you harness the power of virtualization technology.
User Manual of the Pre-built Ubuntu 12.04 Virutal Machine
SEED Labs 1 User Manual of the Pre-built Ubuntu 12.04 Virutal Machine Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US
6 CURRENT JOB OPENINGS:
TO ALL GRADUATING STUDENTS: Looking for an opportunity to enter the exciting Mobile App Development industry? We have the right place for you and we want you! We are Singapore s pioneering mobile app development
The Open Cyber Challenge Platform *
The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service
Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing
ZABBIX. An Enterprise-Class Open Source Distributed Monitoring Solution. Takanori Suzuki MIRACLE LINUX CORPORATION October 22, 2009
ZABBIX An Enterprise-Class Open Source Distributed Monitoring Solution Takanori Suzuki MIRACLE LINUX CORPORATION October 22, 2009 Outline Biography ZABBIX New release ZABBIX 1.8 Activity in Japan Biography
ITEC 495 Capstone Project Ideas
ITEC 495 Capstone Project Ideas Open Source Content Filtering OpenDNS A 25 person architectural firm with one single location needs to implement a low cost, secure, easy to deploy and administer web content
FEATURE HACK THE WEB. Hack safely do it on VirtualBox
FEATURE HACK THE WEB The best way to defend yourself on the web is to know how the enemy works. Learn to hack the web, and keep your server safe from the dodgy side of the internet. Hack safely do it on
Small-Scale Cyber Security Competitions
Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale
Installation & Upgrade Guide
Installation & Upgrade Guide Document Release: September 2012 SnapLogic, Inc. 71 East Third Avenue San Mateo, California 94401 U.S.A. www.snaplogic.com Copyright Information 2011-2012 SnapLogic, Inc. All
Security Testing for Developers using OWASP ZAP
JavaOne San Fransisco 2014 The OWASP Foundation http://www.owasp.org Security Testing for Developers using OWASP ZAP Simon Bennetts OWASP ZAP Project Lead Mozilla Security Team [email protected] Copyright
13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
Enterprise Network Deployment, 10,000 25,000 Users
Enterprise Network Deployment, 10,000 25,000 Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering
Table of Contents Introduction and System Requirements 9 Installing VMware Server 35
Table of Contents Introduction and System Requirements 9 VMware Server: Product Overview 10 Features in VMware Server 11 Support for 64-bit Guest Operating Systems 11 Two-Way Virtual SMP (Experimental
Accessing RCS IBM Console in Windows Using Linux Virtual Machine
Accessing RCS IBM Console in Windows Using Linux Virtual Machine For Graphics Simulation Experiment, Real Time Applications, ECSE 4760 Quan Wang Department of ECSE, Rensselaer Polytechnic Institute March,
Matt Renfro. Frisco, TX. [email protected]. www.mattrenfro.com. Overview:
Matt Renfro Frisco, TX [email protected] www.mattrenfro.com Overview: I have 10 years experience, in IT, Web development, Web Design, and Server administration, in LAMP and Windows environments. As
Pro Puppet. Jeffrey McCune. James TurnbuII. Apress* m in
Pro Puppet m in James TurnbuII Jeffrey McCune Apress* About the Authors About the Technical Reviewer Acknowledgments Introduction Chapter 1: Getting Started with Puppet What Is Puppet? Deployment Configuration
Online Vulnerability Scanner Quick Start Guide
Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.
