[Owasp-leaders] Introducing FLOSSHack

Dinis Cruz dinis.cruz at owasp.org
Thu Nov 8 13:21:54 UTC 2012

Yes, its a great idea. FLOSSHack <https://www.owasp.org/index.php/FLOSSHack> is
one of those 'magical' spaces where the OWASP's community and its projects
can come together and add a lot of value.

In fact I remember the idea of doing something like this at the last
Summit(s) but we couldn't find a FLOSS or commercial vendor that wanted to
'play the game' :)

Btw, I will be happy to help if a chapter wants to do a similar FLOSSHack
on TeamMentor <http://owasp.teammentor.net> (which is the project I'm
currently the lead developer and architect)

Although TeamMentor (TM) is not OpenSource, it is very close, since the source
code is available <https://github.com/TeamMentor-OWASP/Master> and SI
allowed me to 'open it' as much (if not more) as other OpenSource projects
(note that TeamMentor uses O2 Platform FluentSharp
and there has been significant changes/features in the latest version
of O2<http://diniscruz.blogspot.co.uk/p/owasp-o2-platform.html>which
are a direct consequence of my TeamMentor development activities (for
example the O2 VisualStudio
the  Real-Time
Vulnerability Feedback in

I'm quite proud of the level of openness that TM has, and I hope that other
commercial tools follow these ideas/activities. Here are a couple blog
posts I wrote about TM's Security:

   - TeamMentor Vulnerability Disclosures: CSRF , ClickJacking and Get
   Password Hash from Browser
   - checkout the emdeded pdfs with details of the vulnerabilities
   - Couple XSS issues and XSS-By-Design (in
   - and why they were not fixed in the current 3.2 release
   - 'About' page broken due to ClickJacking
   - good example of the Security TAX that we (developers) have to pay due to
   security fixes
   - Creating an TeamMentor Security Bounty
   still need to publicly launch this, but for all practical purposes it is
   - Test and Hack TeamMentor server with 3.2 RC5 code and SI
   lastest 'please hack TM' invite
   - "...O2 in Seattle..." and "...Please Hack TeamMentor
   - first 'please hack TM' invite sent last year
   - On Testing TM WebServices
      - Documenting how to test WebServices using scripts - the story
so far<http://diniscruz.blogspot.co.uk/2012/05/documenting-how-to-test-webservices.html>
      - see how hard it is to test WebServices in a real-world app
      - Creating a spreadsheet with WebService's Authorization

      - Roadmap for Testing an WebService's Authorization

      - What is the formula for the WebServices Authentication
- spreadsheet template
      with Authorisation mappings
      - Testing TeamMentor 2.0 security using
      how I used a mix of Static and Dynamic Analysis to test the security the
      first TM WebService's refactoring
   - SecDDev - Security Driven
   an interesting idea :)

Note that we really embraced Git and GitHub as part of TeamMentor's
development and workflow:

   - Pretty cool visualisation of the 'GitHub based' TeamMentor

   - Master source code: https://github.com/TeamMentor/master
   - Bugs and issues: https://github.com/TeamMentor/master/issues
   - Version with OWASP Top 10 Library (
   https://github.com/TeamMentor-OWASP/Master) which you can see in action
   at http://owasp.teammentor.net (note that this is the full engine with
   the OWASP LIbrary content released under a CC
   - Bunch of misc code repositories: https://github.com/TeamMentor

My objective is to create a super secure+powerful application, with
maximum visibility+openness, while creating documentation on how it
happened (which you can see by the current blog posts)

I think that TeamMentor is a good case study for the challenges of writing
secure code, since it is a real-world app, with real-world complexity,
real-world legacy stuff and real-world security compromises. This is a
great learning opportunity to *look at the 'sausage making process' that is
software/application developmen*t (with a bunch of  .Net, Asmx, jQuery,
Javascript, and  xml files which can be easily deployed to the 'cloud'). We
always talk how OWASP needs to engage with developers, work with them, help
them to secure the app.... well here is a good opportunity to do just that.

*I want/need help in securing TeamMentor, and Its not an easy task :)*

One area that I really want to move next, is the implementation of
AppSensor-like-capabilities so that malicious activities can be detected
and mitigated

Oh, and I could really do with a good layer of .NET ESAPI
controls/capabilities :)

Dinis Cruz
A Developer

On 7 November 2012 23:05, Jim Manico <jim.manico at owasp.org> wrote:

> I see this as a service that completely serves the mission of OWASP.
> You should be proud of yourself for doing this. Bravo!
> --
> Jim Manico
> @Manicode
> (808) 652-3805
> On Nov 7, 2012, at 11:41 PM, Tim Morgan <tim.morgan at owasp.org> wrote:
> >
> > Greetings OWASP Leaders,
> >
> > I want to bring to your attention an experimental project that the
> > Portland, Oregon OWASP chapter has been working on this year.  The
> > project is structured as a hacking competition and workshop and is
> > motivated by two observations I've made over the years:
> >
> > * It's hard to find good pentesters
> >
> > * Lots of organizations need application security testing, but simply
> >  can't afford it
> >
> >
> > Free/Libre Open Source Software Hacking (FLOSSHack) events are
> > designed to bring together individuals interested in learning more
> > about application security with open source projects and organizations
> > in need of low cost or pro bono security auditing.  FLOSSHack provides
> > a friendly, but mildly competitive, workshop environment in which
> > participants learn about and search for vulnerabilities in selected
> > software. In turn, selected open source projects and qualified
> > non-profit organizations benefit from additional quality assurance and
> > security guidance.
> >
> > You can learn more about my thoughts on how best to organize FLOSSHack
> > events here:
> >  https://www.owasp.org/index.php/FLOSSHack
> >
> > We held our first FLOSSHack event in July and I think it was quite
> > successful(*):
> >  https://www.owasp.org/index.php/FLOSSHack_One
> >
> > We learned a lot about what works and what doesn't, so I hope to make
> > our next FLOSSHack even more effective.  My ultimate goal is that
> > these events become more streamlined and organized to where other
> > OWASP chapters can easily throw their own FLOSSHack events.  If any of
> > you are interested in holding a similar event or would like to help in
> > other ways, please let me know.
> >
> > Thanks!
> > tim
> >
> >
> > * Thanks much to Wil Clouser, Michael Coates, Ushahidi, and all of the
> >  participants who made this possible
> > _______________________________________________
> > OWASP-Leaders mailing list
> > OWASP-Leaders at lists.owasp.org
> > https://lists.owasp.org/mailman/listinfo/owasp-leaders
> _______________________________________________
> OWASP-Leaders mailing list
> OWASP-Leaders at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-leaders
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20121108/d904d8fa/attachment.html>

More information about the OWASP-Leaders mailing list