"...Free/Libre Open Source Software Hacking (FLOSSHack) events are designed to bring together individuals interested in learning more about application security with open source projects and organizations in need of low cost or pro bono security auditing. FLOSSHack provides a friendly, but mildly competitive, workshop environment in which participants learn about and search for vulnerabilities in selected software. In turn, selected open source projects and qualified non-profit organizations benefit from additional quality assurance and security guidance...."
See FLOSSHack_One for the details (and vulnerabilities discovered) of the first event.
OWASP's FLOSSHack is one of those 'magical' spaces where the OWASP's community and its projects can come together and add a lot of value.
In fact I remember the idea of doing something like this at the last Summit(s) but we couldn't find a FLOSS or commercial vendor that wanted to 'play the game' :)
And, just for record, I will be happy to help if an OWASP chapter (or University) wants to do a similar FLOSSHack on TeamMentor
Although TeamMentor (TM) is not OpenSource, it is very close, since the source code is available and SI allowed me to 'open it' as much (if not more) as other OpenSource projects (note that TeamMentor uses O2 Platform's FluentSharp APIs, and there has been significant changes/features in the latest version of O2 which are a direct consequence of my TeamMentor development activities (for example the O2 VisualStudio Extension or the Real-Time Vulnerability Feedback in VisualStudio PoC)).
I'm quite proud of the level of openness that TM has, and I hope that other commercial tools follow these ideas/activities. Here are a couple blog posts I wrote about TM's Security:
- TeamMentor Vulnerability Disclosures: CSRF , ClickJacking and Get Password Hash from Browser Memory - checkout the emdeded pdfs with details of the vulnerabilities
- Couple XSS issues and XSS-By-Design (in TeamMentor) - and why they were not fixed in the current 3.2 release
- 'About' page broken due to ClickJacking protection - good example of the Security TAX that we (developers) have to pay due to security fixes
- Creating an TeamMentor Security Bounty Program - still need to publicly launch this, but for all practical purposes it is active
- Test and Hack TeamMentor server with 3.2 RC5 code and SI library - lastest 'please hack TM' invite
- "...O2 in Seattle..." and "...Please Hack TeamMentor (beta)..." - first 'please hack TM' invite sent last year
- On Testing TM WebServices
- Documenting how to test WebServices using scripts - the story so far - see how hard it is to test WebServices in a real-world app
- Creating a spreadsheet with WebService's Authorization Mappings
- Roadmap for Testing an WebService's Authorization Model
- What is the formula for the WebServices Authentication mappings? - spreadsheet template with Authorisation mappings
- Testing TeamMentor 2.0 security using O2 - how I used a mix of Static and Dynamic Analysis to test the security of the first TM WebService's refactoring
- SecDDev - Security Driven Development - an interesting idea :)
Note that we really embraced Git and GitHub as part of TeamMentor's development and workflow:
- Pretty cool visualisation of the 'GitHub based' TeamMentor Development+QA+Release workflow
- Master source code: https://github.com/TeamMentor/master
- Bugs and issues: https://github.com/TeamMentor/master/issues
- Version with OWASP Top 10 Library (https://github.com/TeamMentor-OWASP/Master) which you can see in action at http://owasp.teammentor.net (note that this is the full engine with the OWASP LIbrary content released under a CC License)
- Bunch of misc code repositories: https://github.com/TeamMentor
My objective is to create a super secure+powerful application, with maximum visibility+openness, while creating documentation on how it happened (which you can see by the current blog posts)
I want/need help in securing TeamMentor, and Its not an easy task :)
One area that I really want to move next, is the implementation of AppSensor-like-capabilities so that malicious activities can be detected and mitigated
Oh, and I could really do with a good layer of .NET ESAPI controls/capabilities :)