OWTF Tool Demo

Null Bangalore Meet

13 December 2014

Slides

Abstract

OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like:

This talk will focus on

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation introduces OWASP OWTF (Offensive Web Testing Framework), a Python-based automated penetration testing framework that organizes security testing operations according to standards like OWASP, NIST, and others. Presented at an OWASP Bangalore meetup, Anant Shrivastava demonstrates OWTF’s capabilities through live demos against test applications, covering its architecture, unique selling points, setup process, and contribution opportunities.

Key Topics Covered

Actionable Takeaways

  1. Use OWTF as an aggregation layer for penetration testing to organize findings by standard (OWASP, NIST) and manage both passive and active test execution from a single dashboard.
  2. Set up OWTF on Kali Linux or Samurai WTF for the best out-of-the-box experience, using the simple three-step installation (git clone, cd, python install).
  3. Leverage OWTF’s pause and resume functionality for long-running assessments where continuous testing is impractical.
  4. Contribute to the OWTF project through GSoC, code contributions, or issue tracker participation to help advance this community-driven security testing framework.
  5. Explore OWTF’s advanced features like botnet mode for distributed scanning and the WAF Bypasser for testing against protected applications.

Social chatter