[PDF] OWASP Mobile Security Testing Guide 101





Previous PDF Next PDF



Fixing Mobile AppSec

12 мая 2017 г. In mobile app security testing (together with checklist and ... Practical Challenges! https://github.com/OWASP/owasp-mstg/tree/master/Crackmes.



Fixing Mobile AppSec The OWASP Mobile Security Testing Project

• Excel Checklist is available as an alternative https://github.com/OWASP/owasp https://github.com/OWASP/owasp-mstg/blob/master/Document/0x07d-Assessing ...



OWASP Mobile Application Security Verification Standard

As such this is the only category that does not map to technical test cases in the OWASP. Mobile Testing Guide. https://github.com/OWASP/owasp-mstg/blob/ ...



OWASP Penetration Testing Check List

Whilst it is beyond scope of this checklist to prescribe a penetration testing methodology. (this will be covered in OWASP Testing Part Two) we have included a 



owasp - the open web application security standard

24 мар. 2022 г. Source: https://github.com/OWASP/Amass. Page 48. OWASP Dependency-Check ... ▫ OWASP Security Testing Checklist. ▫ OWASP Testing Labs. ▫ OWASP ...



Application Security Verification Standard 4.0 - Final

owasp.org or log a ticket at GitHub to be recognized in future 4.x updates ... OWASP Testing Guide 4.0: Testing for HTTP Verb Tampering. •. Adding Content ...



Security Technical IT CHecklist (STITCH) - Developed by the SCIRT

17 февр. 2022 г. Use the OWASP Session Management Cheat Sheet and the corresponding methods for testing. ... such as URL fuzzers (https://github.com/xmendez/wfuzz) ...



SVEN SCHLEIER AND CARLOS HOGUERA OWASP

TESTING GUIDE. (MSTG) https://github.com/OWASP/owasp- · mstg/tree/master/Checklists. MOBILE APPSEC. CHECKLIST. 7. Page 8. OWASP MOBILE SECURITY TESTING GUIDE ( 



Penetration testing from a software engineering perspective

19 мая 2021 г. test in the OWASP Web Security Testing Guide until all tests were performed. ... https://github.com/tanprathan/OWASP-Testing-Checklist. Page 43.



Fixing Mobile AppSec The OWASP Mobile Security Testing Project

•One of the project leaders for the OWASP Mobile Security Testing Guide (MSTG) https://github.com/OWASP/owasp-mstg/tree/master/Checklists ...



owasp appsec 101 2

WASP/owasp-mstg. Mobile Appsec. Checklist OWASP Mobile Security Testing Guide (MSTG) ... The full list of contributors is available on GitHub:.



OWASP Penetration Testing Check List

OWASP Web Application Penetration Checklist Using this Checklist as an RFP Template. ... About the OWASP Testing Project (Parts One and Two).



Fast forwarding Mobile Security with the MSTG

WASP/owasp-mstg. Mobile Appsec. Checklist OWASP Mobile Security Testing Guide (MSTG) ... The full list of contributors is available on GitHub:.



SVEN SCHLEIER AND CARLOS HOGUERA OWASP

MOBILE SECURITY. TESTING GUIDE. (MSTG) https://github.com/OWASP/owasp- · mstg/tree/master/Checklists. MOBILE APPSEC. CHECKLIST.



Enabling Zero Trust Architecture (ZTA) with

_Building_End_to_End_Secure_Software_Factory_and_Protecting_Cloud-Native_Supply_Chain_Helpful_Cloud-Native_Security_Checklists_and_Demo_on_SPIFFE_and_Not.pdf



Fixing Mobile AppSec

May 12 2560 BE In mobile app security testing (together with checklist and testing guide). MASVS on GitHub http://github.com/OWASP/owasp-masvs ...



Offensive Active Directory 101

?Performance of penetration tests. ?Infrastructure. ?Web. ?Rich-Client. ?Security assessments of Active. Directory environments tacticx GmbH.



BDD Mobile security testing with OWASP MASVS OWASP MSTG

standardized security tests. Implement BDD application specific security tests. Test against acceptance environment. MSTG Test cases. MASVS Checklist.



Web Security Testing Guide v4.2

The OWASP Testing Guide has an important role to play in solving this serious testing framework not merely a simple checklist or prescription of issues ...



OWASP Web Application Penetration Checklist - OWASP Foundation

OWASP to develop a checklist that they can use when they do undertake penetration testing to promote consistency among both internal testing teams and external vendors As such this list has been developed to be used in several ways including; • RFP Template • Benchmarks • Testing Checklist



Testing Guide 4 - OWASP

Testing for Stored Cross Site Scripting (OTG-INPVAL-002) Testing for HTTP Verb Tampering (OTG-INPVAL-003) Testing for HTTP Parameter pollution (OTG-INPVAL-004) Testing for SQL Injection (OTG-INPVAL-005) Oracle Testing MySQL Testing SQL Server Testing Testing PostgreSQL (from OWASP BSP) MS Access Testing



20 RELEASE - OWASP Foundation

OWASP Testing Guide Initially code review was covered in the Testing Guide as it seemed like a good idea at the time Howev - er the topic of security code review is too big and evolved into its own stand-alone guide I started the Code Review Project in 2006 This current edition was started in April 2013 via the OWASP Project Reboot initia -



OWASP Application Security Verification Standard 40-en

OWASP Application Security Verification Standard 4 0 10 Level 1 is the only level that is completely penetration testable using humans All others require access to documentation source code configuration and the people involved in the development process



Application Security Checklist - Guidacent

The Guidacent Application Security Checklist is a combination of OWASP and SANS documents included below and designed to help Guidacent DevSecOps clients and their respective development teams evaluate their coding from a security perspective



Searches related to owasp testing checklist github filetype:pdf

OWASP is an open community dedicated to enabling organizations to conceive develop acquire operate and maintain applications that can be trusted All of the OWASP tools documents forums and chapters arefreeand open to anyone interested in improving application security

What is included in the OWASP testing guide?

    For the purpose of the OWASP Testing Guide, only the security threats related to web applications will be considered and not threats to web servers (e.g., the infamous “%5c escape code” into Microsoft IIS web server). Further reading suggestions will be provided in the references section for interested readers.

What is OWASP monitoring & detection?

    Monitoring.Detection Used for issues related to the detection of attacks on an application, how attacks should be handled, what information should be gathered, and who should be notified. Title OWASP Penetration Testing Check List Author

Are OWASP Top 10 logging requirements level 1?

    As the OWASP Top 10 2018 is the bare minimum to avoid negligence, we have deliberately made all but specific logging Top 10 requirements Level 1 controls, making it easier for OWASP Top 10 adopters to step up to an actual security standard.

How do I purchase OWASP secure software?

    The buyer can simply set a requirement that the software they wish to procure must be developed at ASVS level X, and request that the seller proves that the software satisfies ASVS level X. This works well when combined with the OWASP Secure Software Contract Annex
OWASP MOBILE SECURITY TESTING GUIDE 101Jeroen Willemsen -Open Security Summit

About meJeroen Willemsen@commjoeniejeroen.willemsen@owasp.org"Security architect""Full-stack developer""Mobile security"@OWASP_MSTG

Agenda•Introduction into the MASVS•Introduction into the MSTG•Some examples

Mobile security1.Can you do a Cross Site Scripting (XSS) attack in a native app? 1.What if there is no webview?2.Can you do a Cross-Site Request Forgery (CSRF) attack in a native app without a webview?

Mobile security?•So CSRF and XSS do not easily apply.•But path-traversals do...

Mobile security?•So CSRF and XSS do not easily apply.•But path-traversals do...•And then there is... Data leakage-through logging, -through insecure storage,-Through IPC.•What about weak authentication mechanisms?•What about reverse engineering?

How do we fix this?Mobile Application SecurityVerification Standardhttps://github.com/OWASP/owasp-masvsMobile Security Testing Guide https://github.com/OWASP/owasp-mstgMobile AppsecChecklist

OWASP Mobile AppSec Verification Standard•Started as a fork of the OWASP ASVS•Formalizes best practices and other security requirements•Mobile-specific, high-level, OS-agnostic•Why?•Shift left: give security requirements a-priori.•Give a clear goal during implementation•Give a clear goal during penetration testing

OWASP Mobile AppSec Verification Standard•Architecture & design•Data storage & privacy•Cryptography•Authentication & Session management•Network Communication•Platform Interaction•Code quality & build settings•Resilience requirements

OWASP Mobile AppSec Verification StandardV2: Data Storage and Privacy Requirements

Your turn!•https://github.com/OWASP/owasp-masvs•https://mobile-security.gitbook.io/masvs/üDownload itüRead it üUse itüGive Feedback! Create an issue or a PRüTweet about it (@OWASP_MSTG)

OWASP Mobile Security Testing Guide (MSTG)•Manual for testing security maturity of iOS and Android (mostly) native apps.•Maps on MASVS requirements.•Why?•Educate developers and penetration testers.•Provide a baseline for automated checks

OWASP Mobile Security Testing Guide (MSTG)•General testing guide•Android Testing guide•iOS Testing guide

OWASP Mobile Security Testing Guide (MSTG)•General testing guide•Android Testing guide•iOS Testing guide•Crackme's& ChallengesKudos to Bernhard Mueller @bernhardmfor his hard work!

OWASP Mobile Security Testing Guide (MSTG)•General testing guide•Android Testing guide•iOS Testing guide•Crackme's& Challenges•MSTG playground (External)

Current status MSTGAuthorsCo-AuthorsTop ContributorsReviewersEditorsBernhard MuellerJeroen Willemsen (@jeroenwillemsen)Sven Schleier(@sushi2k)Carlos HolgueraRomuald SzkudlarekJeroen BeckersPawel RzepaFrancesco StillavatoAndreas HappeAlexander AnthukHenry HoggardWen Bin KongAbdessamadTemmarBolotKerimbaevCláudio AndréSlawomirKosowskiSjoerdLangkemperAnantShrivastavaJeroen BeckersHeaven HodgesCaitlin AndrewsNick EpsonAnita DiamondAnna SzkudlarekThe full list of contributors is available on GitHub:https://github.com/OWASP/owasp-mstg/graphs/contributors

MSTG Project status

MSTG Project status -allwaysmore work•Update toiOS 12/13 & Android Pie/Q•RestructureMSTG•Addmissing testcases•AutomateMSTG playground& mergewithcrackmes

Your turn!•https://github.com/OWASP/owasp-mstghttps://mobile-security.gitbook.io/mstg/üDownload itüRead it üUse itüGive Feedback (file an issue)üFix issues: send in your Pull Requests!üTweet about it (@OWASP_MSTG)

Network Communication Requirements

OWASP Mobile Application Security Verification Standard v1.1 21

V5: Network Communication Requirements

Control Objective

The purpose of the controls listed in this section is to ensure the confidentiality and integrity of information exchanged between the mobile app and remote service endpoints. At the very least, a mobile app must set up a secure, encrypted channel for network communication using the TLS protocol with appropriate settings. Level 2 lists additional defense-in-depth measure such as SSL pinning.

Security Verification Requirements

# Description L1 L2 5.1 Data is encrypted on the network using TLS. The secure channel is used consistently throughout the app. 5.2 The TLS settings are in line with current best practices, or as close as possible if the mobile operating system does not support the recommended standards. 5.3 The app verifies the X.509 certificate of the remote endpoint when the secure channel is established. Only certificates signed by a trusted CA are accepted. 5.4 The app either uses its own certificate store, or pins the endpoint certificate or public key, and subsequently does not establish connections with endpoints that offer a different certificate or key, even if signed by a trusted CA. 5.5 The app doesn't rely on a single insecure communication channel (email or SMS) for critical operations, such as enrollments and account recovery.

5.6 The app only depends on up-to-date connectivity and security libraries.

References

The OWASP Mobile Security Testing Guide provides detailed instructions for verifying the requirements listed in this section. • Android - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-

Network-Communication.md

• iOS - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06g-Testing-

Network-Communication.md

For more information, see also:

• OWASP Mobile Top 10: M3 - Insecure Communication: • CWE: https://cwe.mitre.org/data/definitions/319.html • CWE: https://cwe.mitre.org/data/definitions/295.html

Network Communication Requirements•The MSTG willguide youon howtoreview thecode & do dynamicanalysis of-The usageof TLS in general-The settingsof theTLS connectionin general-Certificatevalidation(general, iOS andAndroid specific)

OWASP Mobile Application Security Verification Standard v1.1 21

V5: Network Communication Requirements

Control Objective

The purpose of the controls listed in this section is to ensure the confidentiality and integrity of information exchanged between the mobile app and remote service endpoints. At the very least, a mobile app must set up a secure, encrypted channel for network communication using the TLS protocol with appropriate settings. Level 2 lists additional defense-in-depth measure such as SSL pinning.

Security Verification Requirements

# Description L1 L2 5.1 Data is encrypted on the network using TLS. The secure channel is used consistently throughout the app. 5.2 The TLS settings are in line with current best practices, or as close as possible if the mobile operating system does not support the recommended standards. 5.3 The app verifies the X.509 certificate of the remote endpoint when the secure channel is established. Only certificates signed by a trusted CA are accepted. 5.4 The app either uses its own certificate store, or pins the endpoint certificate or public key, and subsequently does not establish connections with endpoints that offer a different certificate or key, even if signed by a trusted CA. 5.5 The app doesn't rely on a single insecure communication channel (email or SMS) for critical operations, such as enrollments and account recovery.

5.6 The app only depends on up-to-date connectivity and security libraries.

References

The OWASP Mobile Security Testing Guide provides detailed instructions for verifying the requirements listed in this section. • Android - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-

Network-Communication.md

• iOS - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06g-Testing-

Network-Communication.md

For more information, see also:

• OWASP Mobile Top 10: M3 - Insecure Communication: • CWE: https://cwe.mitre.org/data/definitions/319.html • CWE: https://cwe.mitre.org/data/definitions/295.html

Network Communication Requirements

OWASP Mobile Application Security Verification Standard v1.1 21

V5: Network Communication Requirements

Control Objective

The purpose of the controls listed in this section is to ensure the confidentiality and integrity of information exchanged between the mobile app and remote service endpoints. At the very least, a mobile app must set up a secure, encrypted channel for network communication using the TLS protocol with appropriate settings. Level 2 lists additional defense-in-depth measure such as SSL pinning.

Security Verification Requirements

# Description L1 L2 5.1 Data is encrypted on the network using TLS. The secure channel is used consistently throughout the app. 5.2 The TLS settings are in line with current best practices, or as close as possible if the mobile operating system does not support the recommended standards. 5.3 The app verifies the X.509 certificate of the remote endpoint when the secure channel is established. Only certificates signed by a trusted CA are accepted. 5.4 The app either uses its own certificate store, or pins the endpoint certificate or public key, and subsequently does not establish connections with endpoints that offer a different certificate or key, even if signed by a trusted CA. 5.5 The app doesn't rely on a single insecure communication channel (email or SMS) for critical operations, such as enrollments and account recovery.

5.6 The app only depends on up-to-date connectivity and security libraries.

References

The OWASP Mobile Security Testing Guide provides detailed instructions for verifying the requirements listed in this section. • Android - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-

Network-Communication.md

• iOS - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06g-Testing-

Network-Communication.md

For more information, see also:

• OWASP Mobile Top 10: M3 - Insecure Communication: • CWE: https://cwe.mitre.org/data/definitions/319.html • CWE: https://cwe.mitre.org/data/definitions/295.html

SSL pinningVersionCertificate Serial NumberCertificate AlgorithmIdentifier forCertificate Issuer's SignatureIssuerValidity PeriodSubjectSubjectPublic-Key InformationIssuer Unique IdentifierSubject Unique IdentifierExtensionsAlgorithm IdentifierPublic-keyValueCertification Authority's Digital SignatureRoot CAIntermediate Leaf certTLS

Network Communication Requirements•The MSTG helpsin findingwaystodo pinning-In Android (OKHttp, WebView, networkSecurityConfig, usingTrustManagers, -In iOS (NSURLConnection, TrustKit, AFNetworking, Alamofire)-Hybrid/multiplatform: Apache Cordova, Xamarin, Phonegap.•But whataboutverifyingit? Or bypassingit?

SSL Pinning-verifywhetheritis on•Android:-Below Android 7: installyourBurp/mitmproxy/Zap CA on thedevice,-Android 7 andabove: reworknetworksecurityconfig.xml-TrytoMiTMtheapplication.•iOS:-InstallinstallyourBurp/mitmproxy/Zap CA on thedevice-TrytoMiTMtheapplication.

SSL Pinning-bypassingit•iOS: SSL KillswitchV2•iOS: Frida & Objection•Android: Xposed•Android: Frida & Objection

SSL Pinning -SSL killswitch V2 Two easy ways to break most pinners:1.Jailbreak àuse Cydia & SSL Killswitch V22.Do dynamic instrumentation on a non-jailbroken deviceSee https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04f-Testing-Network-Communication.mdand https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06g-Testing-Network-Communication.md

SSL Pinning-SSL killswitchV2 SSL killswitchMobile substrateMobile app @ iOS 10 / 11 tls_helper_create_peer_trustMobile app @ iOS 10 / 11 tls_helper_create_peer_trustMobile app @ iOS 10 / 11 tls_helper_create_peer_trustPatch underlyingSSL handshakeimplementationUsedbyNSURLConnectionFor allapps...MSHookFunctionMobile app @ iOS 9SSLHandshake, SSLSetSessionOption, SSLCreateContextMobile app @ iOS 9SSLHandshake, SSLSetSessionOption, SSLCreateContextMobile app @ iOS 9SSLHandshake, SSLSetSessionOption, SSLCreateContext

What if you don't want to jailbreak?•Jailbroken devices require maintenance•Jailbreaks are getting harder to find•What about jailbreak protection of the app?•Let's patch the app itself!

SSL pinning-non-jailbrokendevice

SSL Pinning -ObjectionPatch underlying SSL handshake implementationUsed by NSURLConnectionFor oneapp.Mobile app1.Frida server in Gadget waits2.Objection connects to server with explore REPL3.Objection calls script that patches underlying SSL handshake implementation

SSL Pinningin Android -ObjectionLet'sdo similarruntimepatchingin Android... SSL Pinningin Android -XposedLet'spickitup fromtherooteddevice again...

Authenticationrequirements

OWASP Mobile Application Security Verification Standard v1.1 19 V4: Authentication and Session Management Requirements

Control Objective

In most cases, users logging into a remote service is an integral part of the overall mobile app architecture. Even though most of the logic happens at the endpoint, MASVS defines some basic requirements regarding how user accounts and sessions are to be managed.

Security Verification Requirements

# Description L1 L2 4.1 If the app provides users access to a remote service, some form of authentication, such as username/password authentication, is performed at the remote endpoint. 4.2 If stateful session management is used, the remote endpoint uses randomly generated session identifiers to authenticate client requests without sending the user's credentials. 4.3 If stateless token-based authentication is used, the server provides a token that has been signed using a secure algorithm.

4.4 The remote endpoint terminates the existing session when the user logs out.

4.5 A password policy exists and is enforced at the remote endpoint.

4.6 The remote endpoint implements a mechanism to protect against the submission of credentials an excessive number of times. 4.7 Biometric authentication, if any, is not event-bound (i.e. using an API that simply returns "true" or "false"). Instead, it is based on unlocking the keychain/keystore. 4.8 Sessions are invalidated at the remote endpoint after a predefined period of inactivity and access tokens expire. 4.9 A second factor of authentication exists at the remote endpoint and the 2FA requirement is consistently enforced.

4.10 Sensitive transactions require step-up authentication.

4.11 The app informs the user of all login activities with their account. Users are able view a list of devices used to access the account, and to block specific devices.

References

The OWASP Mobile Security Testing Guide provides detailed instructions for verifying the requirements listed in this section. • For Android - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05f-

Testing-Authentication.md

• For iOS - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06f-Testing-

Authentication-and-Session-Management.md

TouchIDthewrong way: usingLAContextThere are 2 ways to use TouchID:1. Protect an entry in the keychain and unlock it via TouchID2. Use the LocalAuthenticationContext:LocalAuthenticationContext.evaluatePolicy(.deviceOwnerAuthenticationWithBiometrics, localizedReason: reasonString) { success, evaluateErrorin {If success { successmethods()} else { ....}Whatifwe call thesuccessmethods() directly?

BypassingTouch-ID•With•With•Both cases: useFrida tohookonto`evaluatePolicy:localizedReason:reply`-Ensures that when evaluatePolicyis calls that the reply its success is set to true (E.g.: call success methods)See https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06f-Testing-Local-Authentication.md

Data storage & privacy requirements

OWASP Mobile Application Security Verification Standard v1.1 16

V2: Data Storage and Privacy Requirements

Control Objective

The protection of sensitive data, such as user credentials and private information, is a key focus in mobile security. Firstly, sensitive data can be unintentionally exposed to other apps running on the same device if operating system mechanisms like IPC are used improperly. Data may also unintentionally leak to cloud storage, backups, or the keyboard cache. Additionally, mobile devices can be lost or stolen more easily compared to other types of devices, so an adversary gaining physical access is a more likely scenario. In that case, additional protections can be implemented to make retrieving the sensitive data more difficult. Note that, as the MASVS is app-centric, it does not cover device-level policies such as those enforced by MDM solutions. We encourage the use of such policies in an Enterprise context to further enhance data security.

Definition of Sensitive Data

Sensitive data in the context of the MASVS pertains to both user credentials and any other data considered sensitive in the particular context, such as:

• Personally identifiable information (PII) that can be abused for identity theft: Social security

numbers, credit card numbers, bank account numbers, health information; • Highly sensitive data that would lead to reputational harm and/or financial costs if compromised: Contractual information, information covered by non-disclosure agreements, management information; • Any data that must be protected by law or for compliance reasons.

Security Verification Requirements

The vast majority of data disclosure issues can be prevented by following simple rules. Most of the controls listed in this chapter are mandatory for all verification levels. # Description L1 L2 2.1 System credential storage facilities are used appropriately to store sensitive data, such as PII, user credentials or cryptographic keys. 2.2 No sensitive data should be stored outside of the app container or system credential storage facilities.

2.3 No sensitive data is written to application logs.

2.4 No sensitive data is shared with third parties unless it is a necessary part of the architecture.

2.5 The keyboard cache is disabled on text inputs that process sensitive data.

2.6 No sensitive data is exposed via IPC mechanisms.

2.7 No sensitive data, such as passwords or pins, is exposed through the user interface. 2.8 No sensitive data is included in backups generated by the mobile operating system. OWASP Mobile Application Security Verification Standard v1.1 17

2.9 The app removes sensitive data from views when backgrounded.

2.10 The app does not hold sensitive data in memory longer than necessary, and memory is cleared explicitly after use. 2.11 The app enforces a minimum device-access-security policy, such as requiring the user to set a device passcode. 2.12 The app educates the user about the types of personally identifiable information processed, as well as security best practices the user should follow in using the app.

References

The OWASP Mobile Security Testing Guide provides detailed instructions for verifying the requirements listed in this section. • For Android - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-

Testing-Data-Storage.md

• For iOS - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06d-Testing-

Data-Storage.md

For more information, see also:

• OWASP Mobile Top 10: M2 - Insecure Data Storage: • CWE: https://cwe.mitre.org/data/definitions/922.html

Thereis muchmore!üRoot/ JailbreakDetectionüAnti-DebuggingüDetectingReverse Engineering ToolsüEmulatorDetection/ Anti-EmulationüFile and Memory IntegrityChecksüDeviceBindingüObfuscation•Reverse Engineering

Thereis muchmore!•Reverse Engineering•Analysis & best practicesfor-Storage-Cryptography-LocalAuthentication-Network Communication-Platform interaction-Code quality& buildsettings

THANK YOU!@OWASP_MSTGjeroen.willemsen@owasp.org

MOBILE SECURITY TESTING GUIDE ONBOARDINGJeroen Willemsen -Open Security Summit

Agenda•Introductionintothecurrentstate of theMSTG.-Issues-Milestones-Project Page•Release process.•Contributionguidelines.•Outlineof theactivitiesplannedforthisweek.•How toget started•Notesforcontributors& reviewers

How to get started1.Fork the repo you want to work on:-https://github.com/OWASP/owasp-mstg-https://github.com/OWASP/owasp-masvs2.Setup localgit at yoursystem (preferrablywithsshkeys)3.Clonetherepotoyoursystem4.Addtheupstream repo(MASVS/MSTG) toyourrepoconfiguration5.Createa branch, start yourwork, commitandpush whenready6.Pull requestandaskourattention tospeed itup J.7.Review feedback? Parseitas soonas youcan, soyoucanmove forward andaddyourstuff.

Notes for contributors•For any tool: focus on the installation, basics and guide towards it's own (online) help•For every feature of a platform: focus on its working, best practices, pitfalls and insecurities

Notes for reviewers•Really bad PR? Ask to get in touch and work together•Ok-ishPR with big errors: comments•Small issues: try to comment•In parallel: PR for your own fixes, but keep it to a ### level per PR to cause less conflicts

FINAL NOTES:•ALL EVENING sessions are in villa 708!quotesdbs_dbs14.pdfusesText_20
[PDF] owasp testing guide

[PDF] owasp testing guide 4.1 pdf

[PDF] owasp testing guide github

[PDF] owasp top 10

[PDF] owasp web application checklist xls

[PDF] owasp web security testing guide pdf

[PDF] owasp wstg

[PDF] owl apa abbreviations

[PDF] owl apa table of contents sample

[PDF] owl purdue apa

[PDF] owl purdue apa sample paper 6th edition

[PDF] owls nest ucc edu login

[PDF] owner of air asia

[PDF] owners manual 2010 honda civic lx

[PDF] owning a kayak in singapore