<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Abhinav</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Abhinav"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Abhinav"/>
		<updated>2026-05-24T02:58:28Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Suffolk&amp;diff=251739</id>
		<title>Suffolk</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Suffolk&amp;diff=251739"/>
				<updated>2019-05-19T20:25:58Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* TALKS: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Suffolk|extra=The chapter leaders are [mailto:wojciech.cichon@owasp.org Wojciech Cichon] and [mailto:abhinav.sejpal@owasp.org Abhinav Sejpal]. Please follow as on Twitter [https://twitter.com/owaspsuffolk @owaspsuffolk] and subscribe to our [https://www.youtube.com/channel/UCGU_bGraZZZc37pQytdaH6w youtube channel].&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Suffolk|emailarchives=http://lists.owasp.org/pipermail/owasp-Suffolk}}&lt;br /&gt;
&lt;br /&gt;
==Meeting Sponsors==&lt;br /&gt;
The following is the list of organisations who have generously provided us with space for OWASP Suffolk chapter events&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:UOS-IWIC-logo-RGB.jpg|link=https://www.uos.ac.uk/content/ipswich-waterfront-innovation-centre-0|alt=IWIC|200px]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
==Next Meeting/Event(s)==&lt;br /&gt;
===[https://www.meetup.com/OWASP-Suffolk-Chapter/events/261011276/ Tuesday, 21 May 2019 (Ipswich)]===&lt;br /&gt;
Location:   University of Suffolk, Waterfront Building, 19 Neptune Quay, Ipswich IP4 1QJ&lt;br /&gt;
&lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* '''Windows Active Directory Security Lowlights - Barry Myles'''&lt;br /&gt;
:Once an attacker is inside your organisation they very often will misuse Windows Active Directory for almost total compromise of every aspect of an organisation's computing infrastructure and the data it holds. This talk will describe how an attacker might do this, when they have done so  in the past, the kinds of tools they would use, what common mistakes enable this, and how organisations could go about defending themselves both through changes in behaviour and changes to their setup. &lt;br /&gt;
====Speakers====&lt;br /&gt;
* Barry Myles leads an internal penetration testing team at BT, although tries to stay away from very traditional views of pen testing as much as possible. After becoming somewhat bored and jaded with project management work in 2006 he decided the life on an attacker was a very much more fun, but perhaps less constructive way of life. He enjoys large scale scanning, reverse engineering, cryptography, hardware hacking and network protocols a bit too much. &lt;br /&gt;
==Past Meeting/Event(s)==&lt;br /&gt;
===[https://www.meetup.com/OWASP-Suffolk-Chapter/events/260078150/ Tuesday, 23rd April 2019 (Ipswich)]===&lt;br /&gt;
Location:   University of Suffolk, Waterfront Building, 19 Neptune Quay, Ipswich IP4 1QJ&lt;br /&gt;
 &lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* '''Data Protection Act 2018 - Rebecca Moran''' [ [[Media:Owaspsuffolk-20190423.pdf|&amp;lt;nowiki/&amp;gt;]][https://www.slideshare.net/owaspsuffolk/data-protection-within-development PDF] ] [ [https://www.youtube.com/watch?v=8l39NhDwJe4 Video] ]&lt;br /&gt;
:An overview of the requirements of the new Data Protection Act 2018 (GDPR) and it’s influence in development and project management.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
* Rebecca Moran is owner of ReMo InfoSec - qualified ISO27001 lead implementer and auditor – preacher of the ISO27001 bible. Registered GDPR practitioner and all round data protection whiz.&lt;br /&gt;
&lt;br /&gt;
===[https://www.meetup.com/OWASP-Suffolk-Chapter/events/259469036/ Tuesday, 19th March 2019 (Ipswich)]===&lt;br /&gt;
Location:   University of Suffolk, Waterfront Building, 19 Neptune Quay, Ipswich IP4 1QJ&lt;br /&gt;
 &lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* ''' Understanding how to prevent Sensitive Data Exposure - Simon Greatrix [ [[Media:Owaspsuffollk-20190319.pdf|&amp;lt;nowiki/&amp;gt;]][https://www.slideshare.net/owaspsuffolk/understanding-how-to-prevent-sensitive-data-exposure PDF] ] [ [https://www.youtube.com/watch?v=Z1nNq3wt7Bg Video] ]'''&lt;br /&gt;
: Sensitive data is often the target of any attack, and its exposure has the greatest risk of long-term damage. OWASP and the PCI DSS provide many recommendations. The internet provides even more. These can be hard to understand, hard to implement, and contradictory. I will be sharing my understanding of how the cryptographic algorithms work and how they should best be used.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
* Dr Simon Greatrix has been writing software since the late 70s and has worked as a security expert for e-commerce for nearly 20 years. He is currently working on SETL’s block chain product. Java has been his preferred programming language since 1996.&lt;br /&gt;
&lt;br /&gt;
===Monday, 25th February 2019 (Ipswich)===&lt;br /&gt;
Location:  Connexions, 159 Princess Street, Ipswich&lt;br /&gt;
 &lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* '''Yet another talk on OWASP Top 10 - WTC [PDF]'''&lt;br /&gt;
: Brief overview of OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====TICKETS:====&lt;br /&gt;
This event is free to attend for both members and non-members of OWASP and is open to anyone interested in application security and cyber security. Please note that you MUST RSVP to book your place and get a ticket to be admitted to the event by building security - your name will be checked against the guest list.&lt;br /&gt;
Register to attend this event at OWASP Suffolk Chapter - [https://www.meetup.com/OWASP-Suffolk-Chapter/ Meetup] - RSVP to attend&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
We reopened the chapter, and currently we are looking for venue and speakers. &lt;br /&gt;
&lt;br /&gt;
If you have would like to present a talk on Application Security at any incoming OWASP Suffolk Chapter events, please send us the proposed talk title, abstract and your bio via e-mail:&lt;br /&gt;
 wojciech.cichon@owasp.org &lt;br /&gt;
&lt;br /&gt;
 abhinav.sejpal@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Suffolk&amp;diff=250366</id>
		<title>Suffolk</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Suffolk&amp;diff=250366"/>
				<updated>2019-04-20T15:56:36Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: Update the changes.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Suffolk|extra=The chapter leaders are [mailto:wojciech.cichon@owasp.org Wojciech Cichon] and [mailto:abhinav.sejpal@owasp.org Abhinav Sejpal].&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Suffolk|emailarchives=http://lists.owasp.org/pipermail/owasp-Suffolk}}&lt;br /&gt;
&lt;br /&gt;
==Meeting Sponsors==&lt;br /&gt;
The following is the list of organisations who have generously provided us with space for OWASP Suffolk chapter events&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:UOS-IWIC-logo-RGB.jpg|link=https://www.uos.ac.uk/content/ipswich-waterfront-innovation-centre-0|alt=IWIC|200px]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
==Next Meeting/Event(s)==&lt;br /&gt;
===[https://www.meetup.com/OWASP-Suffolk-Chapter/events/260078150/ Tuesday, 23rd April 2019 (Ipswich)]===&lt;br /&gt;
Location:   University of Suffolk, Waterfront Building, 19 Neptune Quay, Ipswich IP4 1QJ&lt;br /&gt;
 &lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* '''Data Protection Act 2018 - Rebecca Moran'''&lt;br /&gt;
:An overview of the requirements of the new Data Protection Act 2018 (GDPR) and it’s influence in development and project management.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
* Rebecca Moran is owner of ReMo InfoSec - qualified ISO27001 lead implementer and auditor – preacher of the ISO27001 bible. Registered GDPR practitioner and all round data protection whiz.&lt;br /&gt;
&lt;br /&gt;
==Past Meeting/Event(s)==&lt;br /&gt;
===[https://www.meetup.com/OWASP-Suffolk-Chapter/events/259469036/ Tuesday, 19th March 2019 (Ipswich)]===&lt;br /&gt;
Location:   University of Suffolk, Waterfront Building, 19 Neptune Quay, Ipswich IP4 1QJ&lt;br /&gt;
 &lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* ''' Understanding how to prevent Sensitive Data Exposure - Simon Greatrix [ [[Media:Owaspsuffollk-20190319.pdf|PDF]] ] [ [https://www.youtube.com/watch?v=Z1nNq3wt7Bg Video] ]'''&lt;br /&gt;
: Sensitive data is often the target of any attack, and its exposure has the greatest risk of long-term damage. OWASP and the PCI DSS provide many recommendations. The internet provides even more. These can be hard to understand, hard to implement, and contradictory. I will be sharing my understanding of how the cryptographic algorithms work and how they should best be used.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
* Dr Simon Greatrix has been writing software since the late 70s and has worked as a security expert for e-commerce for nearly 20 years. He is currently working on SETL’s block chain product. Java has been his preferred programming language since 1996.&lt;br /&gt;
&lt;br /&gt;
===Monday, 25th February 2019 (Ipswich)===&lt;br /&gt;
Location:  Connexions, 159 Princess Street, Ipswich&lt;br /&gt;
 &lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* '''Yet another talk on OWASP Top 10 - WTC [PDF]'''&lt;br /&gt;
: Brief overview of OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====TICKETS:====&lt;br /&gt;
This event is free to attend for both members and non-members of OWASP and is open to anyone interested in application security and cyber security. Please note that you MUST RSVP to book your place and get a ticket to be admitted to the event by building security - your name will be checked against the guest list.&lt;br /&gt;
Register to attend this event at OWASP Suffolk Chapter - [https://www.meetup.com/OWASP-Suffolk-Chapter/ Meetup] - RSVP to attend&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
We reopened the chapter, and currently we are looking for venue and speakers. &lt;br /&gt;
&lt;br /&gt;
If you have would like to present a talk on Application Security at any incoming OWASP Suffolk Chapter events, please send us the proposed talk title, abstract and your bio via e-mail:&lt;br /&gt;
 wojciech.cichon@owasp.org &lt;br /&gt;
&lt;br /&gt;
 abhinav.sejpal@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Suffolk&amp;diff=250365</id>
		<title>Suffolk</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Suffolk&amp;diff=250365"/>
				<updated>2019-04-20T15:49:12Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: Added email info.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Suffolk|extra=The chapter leaders are [mailto:wojciech.cichon@owasp.org Wojciech Cichon] and [mailto:abhinav.sejpal@owasp.org Abhinav Sejpal].&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Suffolk|emailarchives=http://lists.owasp.org/pipermail/owasp-Suffolk}}&lt;br /&gt;
&lt;br /&gt;
==Meeting Sponsors==&lt;br /&gt;
The following is the list of organisations who have generously provided us with space for OWASP Suffolk chapter events&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[Image:UOS-IWIC-logo-RGB.jpg|link=https://www.uos.ac.uk/content/ipswich-waterfront-innovation-centre-0|alt=IWIC|200px]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
==Next Meeting/Event(s)==&lt;br /&gt;
===[https://www.meetup.com/OWASP-Suffolk-Chapter/events/260078150/ Tuesday, 23rd April 2019 (Ipswich)]===&lt;br /&gt;
Location:   University of Suffolk, Waterfront Building, 19 Neptune Quay, Ipswich IP4 1QJ&lt;br /&gt;
 &lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* '''Data Protection Act 2018 - Rebecca Moran'''&lt;br /&gt;
:An overview of the requirements of the new Data Protection Act 2018 (GDPR) and it’s influence in development and project management.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
* Rebecca Moran is owner of ReMo InfoSec - qualified ISO27001 lead implementer and auditor – preacher of the ISO27001 bible. Registered GDPR practitioner and all round data protection whiz.&lt;br /&gt;
&lt;br /&gt;
==Past Meeting/Event(s)==&lt;br /&gt;
===[https://www.meetup.com/OWASP-Suffolk-Chapter/events/259469036/ Tuesday, 19th March 2019 (Ipswich)]===&lt;br /&gt;
Location:   University of Suffolk, Waterfront Building, 19 Neptune Quay, Ipswich IP4 1QJ&lt;br /&gt;
 &lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* ''' Understanding how to prevent Sensitive Data Exposure - Simon Greatrix [ [[Media:Owaspsuffollk-20190319.pdf|PDF]] ] [ [https://www.youtube.com/watch?v=Z1nNq3wt7Bg Video] ]'''&lt;br /&gt;
: Sensitive data is often the target of any attack, and its exposure has the greatest risk of long-term damage. OWASP and the PCI DSS provide many recommendations. The internet provides even more. These can be hard to understand, hard to implement, and contradictory. I will be sharing my understanding of how the cryptographic algorithms work and how they should best be used.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
* Dr Simon Greatrix has been writing software since the late 70s and has worked as a security expert for e-commerce for nearly 20 years. He is currently working on SETL’s block chain product. Java has been his preferred programming language since 1996.&lt;br /&gt;
&lt;br /&gt;
===Monday, 25th February 2019 (Ipswich)===&lt;br /&gt;
Location:  Connexions, 159 Princess Street, Ipswich&lt;br /&gt;
 &lt;br /&gt;
====TALKS:====&lt;br /&gt;
* '''OWASP Suffolk Introduction, Welcome and News - WTC'''&lt;br /&gt;
:Welcome and an update on OWASP Projects &amp;amp; Events from the OWASP Suffolk Chapter Leader.&lt;br /&gt;
* '''Yet another talk on OWASP Top 10 - WTC [PDF]'''&lt;br /&gt;
: Brief overview of OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====TICKETS:====&lt;br /&gt;
This event is free to attend for both members and non-members of OWASP and is open to anyone interested in application security and cyber security. Please note that you MUST RSVP to book your place and get a ticket to be admitted to the event by building security - your name will be checked against the guest list.&lt;br /&gt;
Register to attend this event at OWASP Suffolk Chapter - [https://www.meetup.com/OWASP-Suffolk-Chapter/ Meetup] - RSVP to attend&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
We reopened the chapter, and currently we are looking for venue and speakers. &lt;br /&gt;
&lt;br /&gt;
If you have would like to present a talk on Application Security at any incoming OWASP Suffolk Chapter events, please send me the proposed talk title, abstract and your bio via e-mail:&lt;br /&gt;
 wojciech.cichon@owasp.org &lt;br /&gt;
&lt;br /&gt;
 abhinav.sejpal@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Abhinav&amp;diff=249556</id>
		<title>User:Abhinav</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Abhinav&amp;diff=249556"/>
				<updated>2019-04-02T13:13:42Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Abhinav Sejpal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Abhinav Sejpal ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher, and SecDevOps ninja working at [https://www.accenture.com/ Accenture UK]. Abhinav frequently speaks and runs technical sessions at security events and conferences around the world (OWASP AppSec USA, DevSecCon, OWASP Summit, Null and OWASP Meetup). He has reported security vulnerabilities to 200+ Unique product giants all over the world including Apple, Adobe, Twitter, Linkedin, Yahoo, Superdry, Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused DevSecOps, Android, iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. Abhinav has trained over 50+ researchers and developers in information security for companies and organisations across the world.  &lt;br /&gt;
&lt;br /&gt;
[[File:Abhinav_Sejpal.jpg]]&lt;br /&gt;
&lt;br /&gt;
Blog: [https://www.bugwrangler.in https://bugwrangler.in]&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/AbhinavSejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Abhinav&amp;diff=245036</id>
		<title>User:Abhinav</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Abhinav&amp;diff=245036"/>
				<updated>2018-11-10T00:29:26Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Abhinav Sejpal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Abhinav Sejpal ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher, and SecDevOps ninja working at [https://www.accenture.com/ Accenture UK]. Abhinav frequently speaks and runs technical sessions at security events and conferences around the world (OWASP AppSec USA, DevSecCon, OWASP Summit, Null and OWASP Meetup). He has reported security vulnerabilities to 200+ Unique product giants all over the world including Apple, Adobe, Twitter, Linkedin, Yahoo, Superdry, Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused DevSecOps, Android, iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. Abhinav has trained over 50+ researchers and developers in information security for companies and organisations across the world.  &lt;br /&gt;
&lt;br /&gt;
[[File:Abhinav_Sejpal.jpg]]&lt;br /&gt;
&lt;br /&gt;
Blog: https://bugwrangler.in&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Abhinav&amp;diff=239373</id>
		<title>User:Abhinav</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Abhinav&amp;diff=239373"/>
				<updated>2018-04-05T10:52:00Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: fixed typo.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Abhinav Sejpal ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at [http://www.accenture.com/in-en/digital/Pages/digital-index.aspx Accenture Digital]. He has reported security vulnerabilities 200+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Superdry, Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused DevSecOps, Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Assists organizations, Stakeholders &amp;amp; Customers in achieving real risk reduction by ensuring that they have the people, technologies, and processes in place to enable business operations while preventing, detecting, and responding to attacks by sophisticated cyber adversaries. Deeply skilled in Security Vision, Leadership &amp;amp; Pen-testing. Conducted application penetration testing, Web &amp;amp; Mobile application security reviews, and source code security analysis for internal clients. Identified vulnerabilities posing a high risk to the business and communicated them to the appropriate stakeholders for remediation, resulting in improved security posture and increased attack resiliency.&lt;br /&gt;
&lt;br /&gt;
[[File:Abhinav_Sejpal.jpg]]&lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: https://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Abhinav&amp;diff=226774</id>
		<title>User:Abhinav</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Abhinav&amp;diff=226774"/>
				<updated>2017-02-25T11:16:31Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Abhinav Sejpal ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at [http://www.accenture.com/in-en/digital/Pages/digital-index.aspx Accenture Digital]. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Assists organizations, Stakeholders &amp;amp; Customers in achieving real risk reduction by ensuring that they have the people, technologies, and processes in place to enable business operations while preventing, detecting, and responding to attacks by sophisticated cyber adversaries. Deeply skilled in Security Vision, Leadership &amp;amp; Pen-testing. Conducted application penetration testing, Web &amp;amp; Mobile application security reviews, and source code security analysis for internal clients. Identified vulnerabilities posing a high risk to the business and communicated them to the appropriate stakeholders for remediation, resulting in improved security posture and increased attack resiliency.&lt;br /&gt;
&lt;br /&gt;
[[File:Abhinav_Sejpal.jpg]]&lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: https://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=226773</id>
		<title>Clickjacking</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=226773"/>
				<updated>2017-02-25T11:14:43Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Clickjacking, also known as a &amp;quot;UI redress attack&amp;quot;, is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is &amp;quot;hijacking&amp;quot; clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.&lt;br /&gt;
&lt;br /&gt;
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.&lt;br /&gt;
&lt;br /&gt;
=Examples=&lt;br /&gt;
&lt;br /&gt;
For example, imagine an attacker who builds a web site that has a button on it that says &amp;quot;click here for a free iPod&amp;quot;.  However, on top of that web page, the attacker has loaded an iframe with your mail account, and lined up exactly the &amp;quot;delete all messages&amp;quot; button directly on top of the &amp;quot;free iPod&amp;quot; button.  The victim tries to click on the &amp;quot;free iPod&amp;quot; button but instead actually clicked on the invisible &amp;quot;delete all messages&amp;quot; button.  In essence, the attacker has &amp;quot;hijacked&amp;quot; the user's click, hence the name &amp;quot;Clickjacking&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
One of the most notorious examples of Clickjacking was an attack against the [http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html Adobe Flash plugin settings page]. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, giving permission for any Flash animation to utilize the computer's microphone and camera.&lt;br /&gt;
&lt;br /&gt;
Clickjacking also made the news in the form of a [http://shiflett.org/blog/2009/feb/twitter-dont-click-exploit Twitter worm]. This clickjacking attack convinced users to click on a button which caused them to re-tweet the location of the malicious page, and propagated massively.&lt;br /&gt;
&lt;br /&gt;
There have also been clickjacking attacks abusing Facebook's &amp;quot;Like&amp;quot; functionality. [http://threatpost.com/en_us/blogs/facebook-jacking-scams-expand-060310 Attackers can trick logged-in Facebook users to arbitrarily like fan pages, links, groups, etc]&lt;br /&gt;
&lt;br /&gt;
= Defending against Clickjacking =&lt;br /&gt;
There are two main ways to prevent clickjacking:&lt;br /&gt;
# Sending the proper X-Frame-Options HTTP response headers that instruct the browser to not allow framing from other domains&lt;br /&gt;
# Employing defensive code in the UI to ensure that the current frame is the most top level window&lt;br /&gt;
&lt;br /&gt;
For more information on Clickjacking defense, please see the the [[Clickjacking Defense Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
* [https://www.linkedin.com/pulse/20141202104842-120953718-why-am-i-anxious-about-clickjacking Why am I anxious about Clickjacking?]&lt;br /&gt;
:  A Basic understanding of Clickjacking Attack&lt;br /&gt;
&lt;br /&gt;
* https://developer.mozilla.org/en-US/docs/The_X-FRAME-OPTIONS_response_header&lt;br /&gt;
: Mozilla developer resource on The X-Frame-Options response header.&lt;br /&gt;
&lt;br /&gt;
* [http://w2spconf.com/2010/papers/p27.pdf Busting Frame Busting: A study of clickjacking vulnerabilites on top sites]&lt;br /&gt;
: A study by the Stanford Web Security Group outlining problems with deployed frame busting code.&lt;br /&gt;
&lt;br /&gt;
* [http://www.sectheory.com/clickjacking.htm Clickjacking, Sec Theory]&lt;br /&gt;
: A paper by Robert Hansen defining the term, its implications against Flash at the time of writing, and a disclosure timeline.&lt;br /&gt;
&lt;br /&gt;
* [https://www.codemagi.com/blog/post/194 https://www.codemagi.com/blog/post/194] &lt;br /&gt;
: Framebreaking defense for legacy browsers that do not support X-Frame-Option headers.&lt;br /&gt;
&lt;br /&gt;
* [[ClickjackFilter_for_Java_EE|Anti-clickjacking J2EE filter]]&lt;br /&gt;
: A simple J2EE servlet filter that sends anti-framing headers to the browser.&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASVS-levels-1.jpg&amp;diff=223379</id>
		<title>File:MASVS-levels-1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASVS-levels-1.jpg&amp;diff=223379"/>
				<updated>2016-11-11T14:34:09Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: OWASP Mobile Application Security Verification Standard (MASVS)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Mobile Application Security Verification Standard (MASVS)&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASVS-levels-2.jpg&amp;diff=223375</id>
		<title>File:MASVS-levels-2.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASVS-levels-2.jpg&amp;diff=223375"/>
				<updated>2016-11-11T14:30:09Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=222809</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=222809"/>
				<updated>2016-10-27T20:17:40Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Previous Meeting Venue and Dates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 26 October 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 24th September 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 24th August 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 09th July 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th June 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore Meet - 19th November 2016, 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=c3RmZGZuNHRpNnF0NzhpdGEyb3AwNW83aG8gaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* [https://null.co.in/event_sessions/1110-android-security-for-beginners Android Security For Beginners by Lokesh Ranjan]&lt;br /&gt;
* [https://null.co.in/event_sessions/1112-introduction-to-vpn-security Introduction to VPN Security by shreedhar]&lt;br /&gt;
* [https://null.co.in/event_sessions/1115-demo-on-netcat Demo on Netcat by Rahul R]&lt;br /&gt;
* [https://null.co.in/event_sessions/1114-case-studies-of-authentication-and-authorization-bypass Case studies of Authentication and Authorization bypass by Sarwar Jahan M]&lt;br /&gt;
* [https://null.co.in/event_sessions/1116-tor-internals-and-hidden-services Tor Internals and Hidden Services by Gabbar]&lt;br /&gt;
* [https://null.co.in/event_sessions/1117-software-defined-radio Software defined radio by veerababu.p]&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br/&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br/&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br/&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Google Maps: [https://goo.gl/VaaEwb https://goo.gl/VaaEwb]&lt;br /&gt;
&lt;br /&gt;
Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br/&amp;gt;&lt;br /&gt;
Laptops have to be declared with serial numbers at the building security.&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 61&lt;br /&gt;
| 16th Octomber 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 60&lt;br /&gt;
| 10th September 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 59&lt;br /&gt;
| 13th August 2016&lt;br /&gt;
| Roadrunnr, T floor (http://goo.gl/L2FLOh)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 58&lt;br /&gt;
| 16th July 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 57&lt;br /&gt;
| 11th June 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 56&lt;br /&gt;
| 7th May 2016&lt;br /&gt;
| Akamai  (https://goo.gl/qqRw4b)&lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=222808</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=222808"/>
				<updated>2016-10-27T20:14:58Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Chapter News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 26 October 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 24th September 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 24th August 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 09th July 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th June 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore Meet - 19th November 2016, 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=c3RmZGZuNHRpNnF0NzhpdGEyb3AwNW83aG8gaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* [https://null.co.in/event_sessions/1110-android-security-for-beginners Android Security For Beginners by Lokesh Ranjan]&lt;br /&gt;
* [https://null.co.in/event_sessions/1112-introduction-to-vpn-security Introduction to VPN Security by shreedhar]&lt;br /&gt;
* [https://null.co.in/event_sessions/1115-demo-on-netcat Demo on Netcat by Rahul R]&lt;br /&gt;
* [https://null.co.in/event_sessions/1114-case-studies-of-authentication-and-authorization-bypass Case studies of Authentication and Authorization bypass by Sarwar Jahan M]&lt;br /&gt;
* [https://null.co.in/event_sessions/1116-tor-internals-and-hidden-services Tor Internals and Hidden Services by Gabbar]&lt;br /&gt;
* [https://null.co.in/event_sessions/1117-software-defined-radio Software defined radio by veerababu.p]&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br/&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br/&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br/&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Google Maps: [https://goo.gl/VaaEwb https://goo.gl/VaaEwb]&lt;br /&gt;
&lt;br /&gt;
Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br/&amp;gt;&lt;br /&gt;
Laptops have to be declared with serial numbers at the building security.&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 60&lt;br /&gt;
| 10th September 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 59&lt;br /&gt;
| 13th August 2016&lt;br /&gt;
| Roadrunnr, T floor (http://goo.gl/L2FLOh)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 58&lt;br /&gt;
| 16th July 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 57&lt;br /&gt;
| 11th June 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 56&lt;br /&gt;
| 7th May 2016&lt;br /&gt;
| Akamai  (https://goo.gl/qqRw4b)&lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=222807</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=222807"/>
				<updated>2016-10-27T19:51:44Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 24th September 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 24th August 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 09th July 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th June 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore Meet - 19th November 2016, 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=c3RmZGZuNHRpNnF0NzhpdGEyb3AwNW83aG8gaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* [https://null.co.in/event_sessions/1110-android-security-for-beginners Android Security For Beginners by Lokesh Ranjan]&lt;br /&gt;
* [https://null.co.in/event_sessions/1112-introduction-to-vpn-security Introduction to VPN Security by shreedhar]&lt;br /&gt;
* [https://null.co.in/event_sessions/1115-demo-on-netcat Demo on Netcat by Rahul R]&lt;br /&gt;
* [https://null.co.in/event_sessions/1114-case-studies-of-authentication-and-authorization-bypass Case studies of Authentication and Authorization bypass by Sarwar Jahan M]&lt;br /&gt;
* [https://null.co.in/event_sessions/1116-tor-internals-and-hidden-services Tor Internals and Hidden Services by Gabbar]&lt;br /&gt;
* [https://null.co.in/event_sessions/1117-software-defined-radio Software defined radio by veerababu.p]&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br/&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br/&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br/&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Google Maps: [https://goo.gl/VaaEwb https://goo.gl/VaaEwb]&lt;br /&gt;
&lt;br /&gt;
Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br/&amp;gt;&lt;br /&gt;
Laptops have to be declared with serial numbers at the building security.&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 60&lt;br /&gt;
| 10th September 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 59&lt;br /&gt;
| 13th August 2016&lt;br /&gt;
| Roadrunnr, T floor (http://goo.gl/L2FLOh)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 58&lt;br /&gt;
| 16th July 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 57&lt;br /&gt;
| 11th June 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 56&lt;br /&gt;
| 7th May 2016&lt;br /&gt;
| Akamai  (https://goo.gl/qqRw4b)&lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=218755</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=218755"/>
				<updated>2016-07-09T15:54:37Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Previous Meeting Venue and Dates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 09th July 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th June 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 16th July 2016 09:30 AM - 05:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=cHJjc2hna2pzazVxNm85YzdhNDhjM2RpYmcgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Beginners Talk on Physical Securty by Manasdeep&lt;br /&gt;
* Android Security Internals by Kartik Lalan&lt;br /&gt;
* Automated Information Gathering Using Recon-ng by narendra kumar sharma&lt;br /&gt;
* Node JS Security by Madhu Akula&lt;br /&gt;
* Security Intelligence by Raghavendran Gopal&lt;br /&gt;
* Platform Security using intel SGX by Pradyumna Padhan&lt;br /&gt;
* Linux Privilege Escalation techniques by Jagan Mohan&lt;br /&gt;
* Twitter Bug Hunt by Avinash&lt;br /&gt;
* MOD_SECURITY WAF by Chandrapal&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix &amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.google.com/maps/place/Citrix+R%26D+India/@12.975391,77.617454,3157m/data=!3m1!1e3!4m5!3m4!1s0x0:0xeb06e6d4193d7cba!8m2!3d12.9753911!4d77.6174541?hl=en-US GoogleMap]&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Laptops have to be declared with serial numbers at the building security.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 57&lt;br /&gt;
| 11th June 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 56&lt;br /&gt;
| 7th May 2016&lt;br /&gt;
| Akamai  (https://goo.gl/qqRw4b)&lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=218754</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=218754"/>
				<updated>2016-07-09T15:53:37Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Chapter News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 09th July 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th June 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 16th July 2016 09:30 AM - 05:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=cHJjc2hna2pzazVxNm85YzdhNDhjM2RpYmcgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Beginners Talk on Physical Securty by Manasdeep&lt;br /&gt;
* Android Security Internals by Kartik Lalan&lt;br /&gt;
* Automated Information Gathering Using Recon-ng by narendra kumar sharma&lt;br /&gt;
* Node JS Security by Madhu Akula&lt;br /&gt;
* Security Intelligence by Raghavendran Gopal&lt;br /&gt;
* Platform Security using intel SGX by Pradyumna Padhan&lt;br /&gt;
* Linux Privilege Escalation techniques by Jagan Mohan&lt;br /&gt;
* Twitter Bug Hunt by Avinash&lt;br /&gt;
* MOD_SECURITY WAF by Chandrapal&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix &amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.google.com/maps/place/Citrix+R%26D+India/@12.975391,77.617454,3157m/data=!3m1!1e3!4m5!3m4!1s0x0:0xeb06e6d4193d7cba!8m2!3d12.9753911!4d77.6174541?hl=en-US GoogleMap]&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Laptops have to be declared with serial numbers at the building security.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 56&lt;br /&gt;
| 7th May 2016&lt;br /&gt;
| Akamai  (https://goo.gl/qqRw4b)&lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=218753</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=218753"/>
				<updated>2016-07-09T15:52:33Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 05th June 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 16th July 2016 09:30 AM - 05:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=cHJjc2hna2pzazVxNm85YzdhNDhjM2RpYmcgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Beginners Talk on Physical Securty by Manasdeep&lt;br /&gt;
* Android Security Internals by Kartik Lalan&lt;br /&gt;
* Automated Information Gathering Using Recon-ng by narendra kumar sharma&lt;br /&gt;
* Node JS Security by Madhu Akula&lt;br /&gt;
* Security Intelligence by Raghavendran Gopal&lt;br /&gt;
* Platform Security using intel SGX by Pradyumna Padhan&lt;br /&gt;
* Linux Privilege Escalation techniques by Jagan Mohan&lt;br /&gt;
* Twitter Bug Hunt by Avinash&lt;br /&gt;
* MOD_SECURITY WAF by Chandrapal&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix &amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.google.com/maps/place/Citrix+R%26D+India/@12.975391,77.617454,3157m/data=!3m1!1e3!4m5!3m4!1s0x0:0xeb06e6d4193d7cba!8m2!3d12.9753911!4d77.6174541?hl=en-US GoogleMap]&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Laptops have to be declared with serial numbers at the building security.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 56&lt;br /&gt;
| 7th May 2016&lt;br /&gt;
| Akamai  (https://goo.gl/qqRw4b)&lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=217666</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=217666"/>
				<updated>2016-06-05T08:59:02Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Chapter News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 11th June 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 14th May 2016 09:30 AM - 05:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=cHJjc2hna2pzazVxNm85YzdhNDhjM2RpYmcgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Android Security - Part 3 by jitendra kumar&lt;br /&gt;
* Targeted Attacks by Rahul Choudhary&lt;br /&gt;
* SQL Injection to shell by Krithika M. M.&lt;br /&gt;
* Case studies of recent network attacks by Devanshu Agarwal&lt;br /&gt;
* How I pwned you online by Nutan Kumar Panda&lt;br /&gt;
* An introduction to Single Sign On [with Demo] by Lakshmikiran&lt;br /&gt;
* Windows Privilege Escalation Techniques by Riyaz Walikar&lt;br /&gt;
* Metasploit basics and db usage by Arun.S&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix &amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.google.com/maps/place/Citrix+R%26D+India/@12.975391,77.617454,3157m/data=!3m1!1e3!4m5!3m4!1s0x0:0xeb06e6d4193d7cba!8m2!3d12.9753911!4d77.6174541?hl=en-US GoogleMap]&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Laptops have to be declared with serial numbers at the building security.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 56&lt;br /&gt;
| 7th May 2016&lt;br /&gt;
| Akamai  (https://goo.gl/qqRw4b)&lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=217665</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=217665"/>
				<updated>2016-06-05T08:58:40Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Previous Meeting Venue and Dates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 011th June 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 14th May 2016 09:30 AM - 05:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=cHJjc2hna2pzazVxNm85YzdhNDhjM2RpYmcgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Android Security - Part 3 by jitendra kumar&lt;br /&gt;
* Targeted Attacks by Rahul Choudhary&lt;br /&gt;
* SQL Injection to shell by Krithika M. M.&lt;br /&gt;
* Case studies of recent network attacks by Devanshu Agarwal&lt;br /&gt;
* How I pwned you online by Nutan Kumar Panda&lt;br /&gt;
* An introduction to Single Sign On [with Demo] by Lakshmikiran&lt;br /&gt;
* Windows Privilege Escalation Techniques by Riyaz Walikar&lt;br /&gt;
* Metasploit basics and db usage by Arun.S&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix &amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.google.com/maps/place/Citrix+R%26D+India/@12.975391,77.617454,3157m/data=!3m1!1e3!4m5!3m4!1s0x0:0xeb06e6d4193d7cba!8m2!3d12.9753911!4d77.6174541?hl=en-US GoogleMap]&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Laptops have to be declared with serial numbers at the building security.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 56&lt;br /&gt;
| 7th May 2016&lt;br /&gt;
| Akamai  (https://goo.gl/qqRw4b)&lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=217664</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=217664"/>
				<updated>2016-06-05T08:53:37Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Chapter News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 011th June 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 14th May 2016 09:30 AM - 05:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=cHJjc2hna2pzazVxNm85YzdhNDhjM2RpYmcgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Android Security - Part 3 by jitendra kumar&lt;br /&gt;
* Targeted Attacks by Rahul Choudhary&lt;br /&gt;
* SQL Injection to shell by Krithika M. M.&lt;br /&gt;
* Case studies of recent network attacks by Devanshu Agarwal&lt;br /&gt;
* How I pwned you online by Nutan Kumar Panda&lt;br /&gt;
* An introduction to Single Sign On [with Demo] by Lakshmikiran&lt;br /&gt;
* Windows Privilege Escalation Techniques by Riyaz Walikar&lt;br /&gt;
* Metasploit basics and db usage by Arun.S&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix &amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.google.com/maps/place/Citrix+R%26D+India/@12.975391,77.617454,3157m/data=!3m1!1e3!4m5!3m4!1s0x0:0xeb06e6d4193d7cba!8m2!3d12.9753911!4d77.6174541?hl=en-US GoogleMap]&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Laptops have to be declared with serial numbers at the building security.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=217663</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=217663"/>
				<updated>2016-06-05T08:50:38Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan@owasp.org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 07th May 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 15th March 2016 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 19th March 2016 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;amp;tmeid=NHMyOWw2cWVhYXA2aWc0Nm1maWl0YjZtZDAgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Beginners: Netcat: Swiss Army Knife by Chandrapal&lt;br /&gt;
* iOS Security : Part2 by Anto joseph&lt;br /&gt;
* Snort by Shubhra Verma&lt;br /&gt;
* G4H : Browser Exploitation by AMol NAik&lt;br /&gt;
* An introduction to XXE attacks - OWASP Bangalore Session by Samit Anwer&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br /&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br /&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br /&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Laptops have to be declared with serial numbers at the building security.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 14th May 2016 09:30 AM - 05:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=cHJjc2hna2pzazVxNm85YzdhNDhjM2RpYmcgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Android Security - Part 3 by jitendra kumar&lt;br /&gt;
* Targeted Attacks by Rahul Choudhary&lt;br /&gt;
* SQL Injection to shell by Krithika M. M.&lt;br /&gt;
* Case studies of recent network attacks by Devanshu Agarwal&lt;br /&gt;
* How I pwned you online by Nutan Kumar Panda&lt;br /&gt;
* An introduction to Single Sign On [with Demo] by Lakshmikiran&lt;br /&gt;
* Windows Privilege Escalation Techniques by Riyaz Walikar&lt;br /&gt;
* Metasploit basics and db usage by Arun.S&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix &amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.google.com/maps/place/Citrix+R%26D+India/@12.975391,77.617454,3157m/data=!3m1!1e3!4m5!3m4!1s0x0:0xeb06e6d4193d7cba!8m2!3d12.9753911!4d77.6174541?hl=en-US GoogleMap]&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound.&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Laptops have to be declared with serial numbers at the building security.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 55&lt;br /&gt;
| 16th April 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 19th March 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 54&lt;br /&gt;
| 20th Feb 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 53&lt;br /&gt;
| 16th Jan 2016&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
Pentester/web security evangelist. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://ibreak.software&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M2&amp;diff=212184</id>
		<title>Mobile Top 10 2014-M2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M2&amp;diff=212184"/>
				<updated>2016-03-31T06:14:32Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Insecure Data Storage&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|EASY}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|SEVERE}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Threats agents include the following: an adversary that has attained a lost/stolen mobile device; malware or a other repackaged app acting on the adversary's behalf that executes on the mobile device.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;In the event that an adversary physically attains the mobile device, the adversary hooks up the mobile device to a computer with freely available software. These tools allow the adversary to see all third party application directories that often contain stored personally identifiable information (PII) or other sensitive information assets. An adversary may construct malware or modify a legitimate app to steal such information assets.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Insecure data storage vulnerabilities occur when development teams assume that users or malware will not have access to a mobile device's filesystem and subsequent sensitive information in data-stores on the device.  Filesystems are easily accessible.  Organizations should expect a malicious user or malware to inspect sensitive data stores.&lt;br /&gt;
&lt;br /&gt;
Rooting or jailbreaking a mobile device circumvents any encryption protections.  When data is not protected properly, specialized tools are all that is needed to view application data.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Insecure data storage can result in data loss, in the best case, for one user. In the worst case, for many users. Common valuable pieces of data seen stored include: &lt;br /&gt;
* Usernames&lt;br /&gt;
* Authentication tokens&lt;br /&gt;
* Passwords&lt;br /&gt;
* Cookies&lt;br /&gt;
* Location data&lt;br /&gt;
* UDID/EMEI, Device Name, Network Connection Name&lt;br /&gt;
* Personal Information: DoB, Address, Social, Credit Card Data&lt;br /&gt;
* Application Data: &lt;br /&gt;
** Stored application logs e.g For an android Apps ADB logcat&lt;br /&gt;
** Debug information&lt;br /&gt;
** Cached application messages&lt;br /&gt;
** Transaction histories&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Insecure data storage vulnerabilities typically lead to the following business risks for the organization that owns the risk app:&lt;br /&gt;
* Identity Theft&lt;br /&gt;
* Fraud&lt;br /&gt;
* Reputation Damage&lt;br /&gt;
* External Policy Violation (PCI)&lt;br /&gt;
* or Material Loss.&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=1|risk=1}}&lt;br /&gt;
It is important to threat-model your mobile app to understand the information assets it processes and how the underlying APIs handle those assets.  These APIs should store sensitive information securely. Places OWASP most often sees data being stored insecurely include the following:&lt;br /&gt;
 &lt;br /&gt;
* SQLite databases&lt;br /&gt;
* Log Files&lt;br /&gt;
* Plist Files&lt;br /&gt;
* XML Data Stores or Manifest Files&lt;br /&gt;
* Binary data stores&lt;br /&gt;
* Cookie stores&lt;br /&gt;
* SD Card&lt;br /&gt;
* Cloud synced&lt;br /&gt;
&lt;br /&gt;
When applying encryption and decryption to sensitive information assets, malware may perform a binary attack on the app in order to steal encryption or decryption keys. Once it steals the keys, it will decrypt the local data and steal sensitive information. See OWASP Mobile Top Ten 2014 Category M10 for more information on this topic.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=2|risk=1}}&lt;br /&gt;
The cardinal rule of mobile apps is to not store data unless absolutely necessary. As a developer you have to assume that the data is forfeited as soon as it touches the phone. You also have to consider the implications of losing mobile users' data to a silent jailbreak or root exploit. If the usability versus security trade-off is too much for you, OWASP recommends scrutinizing your platforms data security APIs and making sure you’re calling them appropriately.  The lesson here is to know what data is being stored and protect it appropriately.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''iOS Specific Best Practices:'''&lt;br /&gt;
* Never store credentials on the phone file system. Force the user to authenticate using a standard web or API login scheme (over HTTPS) to the application upon each opening and ensure session timeouts are set at the bare minimum to meet the user experience requirements.&lt;br /&gt;
* Where storage or caching of information is necessary consider using a standard iOS encryption library such as CommonCrypto. However, for particularly sensitive apps, consider using whitebox cryptography solutions that avoid the leakage of binary signatures found within common encryption libraries.&lt;br /&gt;
* If the data is small, using the provided apple keychain API is recommended but, once a phone is jailbroken or exploited the keychain can be easily read. This is in addition to the threat of a bruteforce on the devices PIN, which as stated above is trivial in some cases.&lt;br /&gt;
* For databases consider using SQLcipher for Sqlite data encryption&lt;br /&gt;
* For items stored in the keychain leverage the most secure API designation, kSecAttrAccessibleWhenUnlocked (now the default in iOS 5) and for enterprise managed mobile devices ensure a strong PIN is forced, alphanumeric, larger than 4 characters.&lt;br /&gt;
* For larger or more general types of consumer-grade data, Apple’s File Protection mechanism can safely be used (see NSData Class Reference for protection options).&lt;br /&gt;
* Avoid using NSUserDefaults to store sensitive pieces of information as it stores data in plist files.&lt;br /&gt;
* Be aware that all data/entities using NSManagedObects will be stored in an unencrypted database file.&lt;br /&gt;
* Avoid exclusively relying upon hardcoded encryption or decryption keys when storing sensitive information assets.&lt;br /&gt;
* Consider providing an additional layer of encryption beyond any default encryption mechanisms provided by the operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Android Specific Best Practices:'''&lt;br /&gt;
* For local storage the enterprise android device administration API can be used to force encryption to local file-stores using “setStorageEncryption”&lt;br /&gt;
* For SD Card Storage some security can be achieved via the ‘javax.crypto’ library. You have a few options, but an easy one is simply to encrypt any plain text data with a master password and AES 128.&lt;br /&gt;
* Ensure any shared preferences properties are '''NOT''' MODE_WORLD_READABLE unless explicitly required for information sharing between apps.&lt;br /&gt;
* Avoid exclusively relying upon hardcoded encryption or decryption keys when storing sensitive information assets.&lt;br /&gt;
* Consider providing an additional layer of encryption beyond any default encryption mechanisms provided by the operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=3|risk=1}}&lt;br /&gt;
&lt;br /&gt;
'''A Visual Example:'''&lt;br /&gt;
&lt;br /&gt;
iGoat is a purposefully vulnerable mobile app for the security community to explore these types of vulnerabilities first hand. In the exercise below, we enter our credentials and log in to the fake bank app. Then, we navigate to the file system. Within the applications directory, we can see a database called “credentials.sqlite”. Exploring this database reveals that the application is storing our username and credentials (Jason:pleasedontstoremebro!) in plain text.&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen%20Shot%202012-12-19%20at%206.34.23%20AM.png]] &lt;br /&gt;
[[Image:Screen%20Shot%202012-12-19%20at%206.44.51%20AM.png]] &lt;br /&gt;
[[Image:Screen%20Shot%202012-12-19%20at%2010.11.15%20AM.png]]&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=1}}&lt;br /&gt;
* [https://www.owasp.org/index.php/IOS_Developer_Cheat_Sheet OWASP ][https://www.owasp.org/index.php/IOS_Developer_Cheat_Sheet IOS Developer Cheat Sheet]&lt;br /&gt;
* [http://source.android.com/tech/security/ Google Androids Developer Security Topics 1]&lt;br /&gt;
* [http://developer.android.com/training/articles/security-tips.html Google Androids Developer Security Topics 2]&lt;br /&gt;
* [https://developer.apple.com/library/mac/ Apple's Introduction to Secure Coding]&lt;br /&gt;
* [http://h30499.www3.hp.com/t5/Application-Security-Fortify-on/Exploring-The-OWASP-Mobile-Top-10-M1-Insecure-Data-Storage/ba-p/5904609 Fortify On Demand Blog - Exploring The OWASP Mobile Top 10:  Insecure Data Storage]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=205465</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=205465"/>
				<updated>2015-12-24T04:43:43Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 20th Dec 2015 ===&lt;br /&gt;
* Details of the OWASP Bangalore Christmas special meeting has been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
== OWASP Christmas Special Bangalore meet - 25th December 09:45 AM - 02:00 PM ==&lt;br /&gt;
Please note that although this is a free session, registration is mandatory. You will be allowed to attend after your name is confirmed in the registration list. &lt;br /&gt;
&lt;br /&gt;
'''Registrations will close on Thursday 24th December 02:00 PM'''&lt;br /&gt;
=== '''Registration''' ===&lt;br /&gt;
&lt;br /&gt;
[['''Dears - The event has been cancelled due to due to unavoidable circumstance''']]&lt;br /&gt;
&lt;br /&gt;
Please register using the following link: &amp;lt;br/&amp;gt;&lt;br /&gt;
[https://docs.google.com/forms/d/1oLjqmUtXAUI2bQad9_1QKbDMDgHP3TiWXoPDM1ieCK4/viewform Click here to register]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=Z21mMjE1dGxnMGVob3RoMzNzOWljYmRrNDAgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* 09:45 AM - 10:00 AM: Introductions&lt;br /&gt;
* 10:00 AM - 11:45 AM: Xtreme Web Hacking c0c0n2015 CTF Style by Akash Mahajan &amp;amp; Riyaz Walikar&lt;br /&gt;
* 11:45 AM - 12:00 PM: Break&lt;br /&gt;
* 12:00 PM - 01:15 PM: Xtreme Web Hacking c0c0n2015 CTF Style contd.&lt;br /&gt;
* 01:15 PM - 01:20 PM: Break&lt;br /&gt;
* 01:20 PM - 01:50 PM: Questions &amp;amp; Answers in Application Security &amp;amp; Pentesting by Akash Mahajan &amp;amp; Riyaz Walikar&lt;br /&gt;
* 01:50 PM - 02:00 PM: Feedback &amp;amp; Closing&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 52&lt;br /&gt;
| 12th Dec 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=204614</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=204614"/>
				<updated>2015-12-05T15:20:41Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Chapter News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 05th Dec 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
== OWASP Bangalore Meet - 12th December 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=NmlyMWR1c3NoY2xldmlvaDljcWY0OGs5MzAgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*[http://null.co.in/event_sessions/609-zap-proxy ZAP Proxy by TAS ]&lt;br /&gt;
*[http://null.co.in/event_sessions/611-intro-to-xposed-framework Xposted Framework by Abhinav Chourasia]&lt;br /&gt;
*[http://null.co.in/event_sessions/615-security-analytics Security Analytics by Prakash naw]&lt;br /&gt;
*[http://null.co.in/event_sessions/614-owasp-bengaluru-session OWASP Bangalore session by Akash Mahajan]&lt;br /&gt;
*[http://null.co.in/event_sessions/613-radare2-demo Radare 2 Demo by Amol Naik]&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=204613</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=204613"/>
				<updated>2015-12-05T15:19:53Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Previous Meeting Venue and Dates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
== OWASP Bangalore Meet - 12th December 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=NmlyMWR1c3NoY2xldmlvaDljcWY0OGs5MzAgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*[http://null.co.in/event_sessions/609-zap-proxy ZAP Proxy by TAS ]&lt;br /&gt;
*[http://null.co.in/event_sessions/611-intro-to-xposed-framework Xposted Framework by Abhinav Chourasia]&lt;br /&gt;
*[http://null.co.in/event_sessions/615-security-analytics Security Analytics by Prakash naw]&lt;br /&gt;
*[http://null.co.in/event_sessions/614-owasp-bengaluru-session OWASP Bangalore session by Akash Mahajan]&lt;br /&gt;
*[http://null.co.in/event_sessions/613-radare2-demo Radare 2 Demo by Amol Naik]&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 51&lt;br /&gt;
| 21st Nov 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=204612</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=204612"/>
				<updated>2015-12-05T15:16:14Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 11th Nov 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18th Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
== OWASP Bangalore Meet - 12th December 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://calendar.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=NmlyMWR1c3NoY2xldmlvaDljcWY0OGs5MzAgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*[http://null.co.in/event_sessions/609-zap-proxy ZAP Proxy by TAS ]&lt;br /&gt;
*[http://null.co.in/event_sessions/611-intro-to-xposed-framework Xposted Framework by Abhinav Chourasia]&lt;br /&gt;
*[http://null.co.in/event_sessions/615-security-analytics Security Analytics by Prakash naw]&lt;br /&gt;
*[http://null.co.in/event_sessions/614-owasp-bengaluru-session OWASP Bangalore session by Akash Mahajan]&lt;br /&gt;
*[http://null.co.in/event_sessions/613-radare2-demo Radare 2 Demo by Amol Naik]&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 50&lt;br /&gt;
| 17th Oct 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 49&lt;br /&gt;
| 27th Sept 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb)  &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=201087</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=201087"/>
				<updated>2015-09-25T18:04:19Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Chapter News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 25 Sep 2015 ===&lt;br /&gt;
*  September month meet is moved by a day to Sunday 27th Sept at the same venue due to the Bangalore strike. &lt;br /&gt;
&lt;br /&gt;
=== 18 Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 27th Sep 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai&lt;br /&gt;
*Demystifying Web Application Firewall by Sarwar Jahan M&lt;br /&gt;
*Django - Bypassing CSRF Protection by Deepam Kanjani&lt;br /&gt;
*RFID hacking by Jayesh&lt;br /&gt;
*Network security with Artificial Intelligence by Shiva&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Maps: https://goo.gl/bm3fJT&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=201086</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=201086"/>
				<updated>2015-09-25T18:02:30Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* OWASP Bangalore meet - 26th Sep 2015 09:30 AM - 02:00 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 18 Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 27th Sep 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai&lt;br /&gt;
*Demystifying Web Application Firewall by Sarwar Jahan M&lt;br /&gt;
*Django - Bypassing CSRF Protection by Deepam Kanjani&lt;br /&gt;
*RFID hacking by Jayesh&lt;br /&gt;
*Network security with Artificial Intelligence by Shiva&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Maps: https://goo.gl/bm3fJT&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200847</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200847"/>
				<updated>2015-09-19T15:20:58Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Chapter News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 18 Sep 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 26th Sep 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai&lt;br /&gt;
*Demystifying Web Application Firewall by Sarwar Jahan M&lt;br /&gt;
*Django - Bypassing CSRF Protection by Deepam Kanjani&lt;br /&gt;
*RFID hacking by Jayesh&lt;br /&gt;
*Network security with Artificial Intelligence by Shiva&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Maps: https://goo.gl/bm3fJT&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200846</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200846"/>
				<updated>2015-09-19T15:20:01Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Previous Meeting Venue and Dates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 26th Sep 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai&lt;br /&gt;
*Demystifying Web Application Firewall by Sarwar Jahan M&lt;br /&gt;
*Django - Bypassing CSRF Protection by Deepam Kanjani&lt;br /&gt;
*RFID hacking by Jayesh&lt;br /&gt;
*Network security with Artificial Intelligence by Shiva&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Maps: https://goo.gl/bm3fJT&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 48&lt;br /&gt;
| 29th Aug 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200845</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200845"/>
				<updated>2015-09-19T15:18:19Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 26th Sep 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai&lt;br /&gt;
*Demystifying Web Application Firewall by Sarwar Jahan M&lt;br /&gt;
*Django - Bypassing CSRF Protection by Deepam Kanjani&lt;br /&gt;
*RFID hacking by Jayesh&lt;br /&gt;
*Network security with Artificial Intelligence by Shiva&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Maps: https://goo.gl/bm3fJT&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200844</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200844"/>
				<updated>2015-09-19T15:16:46Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 26th Sep 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai&lt;br /&gt;
*Demystifying Web Application Firewall by Sarwar Jahan M&lt;br /&gt;
*Django - Bypassing CSRF Protection by Deepam Kanjani&lt;br /&gt;
*RFID hacking by Jayesh&lt;br /&gt;
*Network security with Artificial Intelligence by Shiva&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Maps: https://maps.google.com/?cid=12920202068831693947&amp;amp;hl=en&amp;amp;gl=us&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=&amp;amp;ll=12.935178,77.694553&amp;amp;spn=0.006295,0.006295&amp;amp;t=m&amp;amp;iwloc=A&amp;amp;source=embed&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200843</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=200843"/>
				<updated>2015-09-19T15:15:53Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 26th Sep 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
*Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai&lt;br /&gt;
*Demystifying Web Application Firewall by Sarwar Jahan M&lt;br /&gt;
*Django - Bypassing CSRF Protection by Deepam Kanjani&lt;br /&gt;
*RFID hacking by Jayesh&lt;br /&gt;
*Network security with Artificial Intelligence by Shiva&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty Ulsoor Road, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Yellappa Chetty Layout, Sivanchetti Gardens&amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560042&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Maps: https://goo.gl/VaaEwb&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=199095</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=199095"/>
				<updated>2015-08-15T17:38:54Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Chapter News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 15th Aug 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 29th Aug 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Proposed sessions for this event:&lt;br /&gt;
* Owasp Mobile Top 10 - M9: Improper Session Handling by Apoorva&lt;br /&gt;
* Exploiting Version Control Systems by Anant Shrivastava&lt;br /&gt;
* Cross Origin Resource Sharing by Ishan&lt;br /&gt;
* Android rooting Internals by Anto joseph&lt;br /&gt;
* Kerberos Golden Ticket by Ashish&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
InMobi &amp;lt;br&amp;gt;&lt;br /&gt;
8th Floor, Cafeteria &amp;lt;br&amp;gt;&lt;br /&gt;
Delta Block  &amp;lt;br&amp;gt; &lt;br /&gt;
Embassy Tech Square &amp;lt;br&amp;gt; &lt;br /&gt;
Marathahalli-Sarjapur Outer Ring Rd  &amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560103, India &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Maps: https://goo.gl/VaaEwb&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=199094</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=199094"/>
				<updated>2015-08-15T17:37:58Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 29th Aug 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* Proposed sessions for this event:&lt;br /&gt;
* Owasp Mobile Top 10 - M9: Improper Session Handling by Apoorva&lt;br /&gt;
* Exploiting Version Control Systems by Anant Shrivastava&lt;br /&gt;
* Cross Origin Resource Sharing by Ishan&lt;br /&gt;
* Android rooting Internals by Anto joseph&lt;br /&gt;
* Kerberos Golden Ticket by Ashish&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
InMobi &amp;lt;br&amp;gt;&lt;br /&gt;
8th Floor, Cafeteria &amp;lt;br&amp;gt;&lt;br /&gt;
Delta Block  &amp;lt;br&amp;gt; &lt;br /&gt;
Embassy Tech Square &amp;lt;br&amp;gt; &lt;br /&gt;
Marathahalli-Sarjapur Outer Ring Rd  &amp;lt;br&amp;gt;&lt;br /&gt;
Bengaluru, Karnataka 560103, India &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Maps: https://goo.gl/VaaEwb&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=199093</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=199093"/>
				<updated>2015-08-15T17:34:00Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Previous Meeting Venue and Dates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 14th July 2015 ===&lt;br /&gt;
* Venue and links updated. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 25th July 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* OWASP Mobile Top Ten - M8 - Shivang Desai&lt;br /&gt;
* PHP Remote Code Execution bugs - Rahul Sasi&lt;br /&gt;
* Quantum Cryptography - Sidhant&lt;br /&gt;
* Grinder Tool demo - Amol Naik&lt;br /&gt;
* Content Security Policy - Riyaz Walikar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:July_Month_Meet-up.png]]&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Citrix Systems,&amp;lt;br /&amp;gt;&lt;br /&gt;
No. 33, Prestige Dynasty&amp;lt;br /&amp;gt;&lt;br /&gt;
Ulsoor Road, Sivanchetti Gardens,&amp;lt;br /&amp;gt;&lt;br /&gt;
Behind Taj Vivanta (MG Road)&amp;lt;br /&amp;gt;&lt;br /&gt;
Bengaluru, 560042&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Maps: https://goo.gl/VaaEwb&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
1. Please bring a Government issued ID card (Pan, Driving license, etc) for entry into the compound. &amp;lt;br /&amp;gt;&lt;br /&gt;
2. If required, laptops have to be declared with serial numbers at the building security. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 47&lt;br /&gt;
| 25th July 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=197373</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=197373"/>
				<updated>2015-07-12T12:19:26Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Sessions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp-bangalore-logo.png|OWASP Bangalore Chapter]]&lt;br /&gt;
{{Chapter Template|chaptername=Bangalore|extra=The chapter leaders are [mailto:kvprashant@owasp.org Prashant Kv], [mailto:riyaz.walikar@owasp.org Riyaz Walikar] and [[User:Makash | Akash Mahajan]] [mailto:akash.mahajan@owasp.org (akash.mahajan AT OWASP DOT org)] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''Stay Updated''' =&lt;br /&gt;
=== Join our low traffic mailing list for event information === &lt;br /&gt;
[[File:Mail-50%25smaller.jpeg]]&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-bangalore Subscribe to OWASP Bangalore Mailing list]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Follow @owaspbangalore for event updates on Twitter ===&lt;br /&gt;
[[File:Twitter-bird-cropped-onwhite-40%25smaller.png]]&lt;br /&gt;
'''[https://twitter.com/owaspbangalore OWASP Bangalore Twitter Account]'''&lt;br /&gt;
&lt;br /&gt;
=== Short Links for sharing and easy to remember ===&lt;br /&gt;
* Wiki Page - '''[https://bit.ly/owaspblr https://bit.ly/owaspblr]'''&lt;br /&gt;
* Next OWASP Bangalore Meet '''[https://bit.ly/owaspblr-meet https://bit.ly/owaspblr-meet]'''&lt;br /&gt;
* OWASP Bangalore Mailing List '''[https://bit.ly/owaspblr-mailinglist http://bit.ly/owaspblr-mailinglist]'''&lt;br /&gt;
* OWASP Global Google Calendar '''[https://bit.ly/owaspblr-googlecal http://bit.ly/owaspblr-googlecal]'''&lt;br /&gt;
&lt;br /&gt;
= '''Chapter News''' =&lt;br /&gt;
&lt;br /&gt;
=== 2nd July 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th June 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd June 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 25th May 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 20th May 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 24th March 2015 ===&lt;br /&gt;
* Details of the next OWASP Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 12th March 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 01st February 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 02nd January 2015 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th December 2014 ===&lt;br /&gt;
* Details of the next combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 29th November 2014 ===&lt;br /&gt;
* We have added @abhinav_sejpal to tweet from @owaspbangalore. Looking forward to a more vibrant twitter account!&lt;br /&gt;
&lt;br /&gt;
=== 26th November 2014 ===&lt;br /&gt;
* Many thanks to [https://twitter.com/shruthi76 @shruthi76] for creating a logo for OWASP Bangalore&lt;br /&gt;
&lt;br /&gt;
=== 17th November 2014 ===&lt;br /&gt;
* Details of the OWASP Banglore Workshop on XWH2014 by Riyaz Walikar have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 16th November 2014 ===&lt;br /&gt;
* Details of the next Combined null/OWASP/G4H Bangalore meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 4th November 2014 ===&lt;br /&gt;
* Our special meeting details have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link]&lt;br /&gt;
&lt;br /&gt;
=== 14th October 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 17th September 2014 ===&lt;br /&gt;
* The OWASP Testing Guide v4 was released today. Our very own [https://www.owasp.org/index.php/User:Anant_Shrivastava Anant Shrivastava] from the Bangalore chapter has contributed a chapter on Fingerprinting Web Servers. Please follow the [https://www.owasp.org/index.php/Fingerprint_Web_Server_(OTG-INFO-002) link] to read the specific section.&lt;br /&gt;
&lt;br /&gt;
=== 13th September 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 28th August 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
* Riyaz Walikar updated his profile.&lt;br /&gt;
&lt;br /&gt;
=== 11th July 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 6th Jun 2014 ===&lt;br /&gt;
* Details of the next meeting have been posted. Please follow the [https://www.owasp.org/index.php/Bangalore#tab=Next_Meeting link] for more information.&lt;br /&gt;
&lt;br /&gt;
=== 5th Jun 2014 === &lt;br /&gt;
* Very excited to have [mailto:riyaz.walikar@owasp.org Riyaz Walikar] joining us the third OWASP Bangalore Chapter Lead&lt;br /&gt;
&lt;br /&gt;
=== Older News === &lt;br /&gt;
* null/OWASP combined meet up on 24th May 2014&lt;br /&gt;
* We have a new twitter account [https://twitter.com/owaspbangalore @owaspbangalore]&lt;br /&gt;
&lt;br /&gt;
= '''Next Meeting''' =&lt;br /&gt;
&lt;br /&gt;
== OWASP Bangalore meet - 25th July 2015 09:30 AM - 02:00 PM ==&lt;br /&gt;
&lt;br /&gt;
'''Add to Google Calendar''' &lt;br /&gt;
[https://www.google.com/calendar/hosted/owasp.org/event?action=TEMPLATE&amp;amp;tmeid=ZGw5bGNpbmZscTBiN3Vvc2c3bzVkamQxdjQgaGw2Y2pnczZlcDFoN29uaXFndWV1MmJoYm9AZw&amp;amp;tmsrc=hl6cjgs6ep1h7oniqgueu2bhbo%40group.calendar.google.com Google Calendar Link]&lt;br /&gt;
&lt;br /&gt;
=== '''Sessions''' ===&lt;br /&gt;
* OWASP Mobile Top Ten - M8 - Shivang Desai&lt;br /&gt;
* PHP Remote Code Execution bugs - Rahul Sasi&lt;br /&gt;
* Quantum Cryptography - Sidhant&lt;br /&gt;
* Grinder Tool demo - Amol Naik&lt;br /&gt;
* Content Security Policy - Riyaz Walikar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:July_Month_Meet-up.png]]&lt;br /&gt;
&lt;br /&gt;
=== '''Venue''' ===&lt;br /&gt;
Will update soon&lt;br /&gt;
&lt;br /&gt;
=== '''Instructions''' ===&lt;br /&gt;
Will update soon&lt;br /&gt;
&lt;br /&gt;
= '''Previous Meeting Venue and Dates'''  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! No &lt;br /&gt;
! Date &lt;br /&gt;
! Venue &lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 46&lt;br /&gt;
| 20th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 45&lt;br /&gt;
| 6th June 2015&lt;br /&gt;
| Citrix R&amp;amp;D (https://goo.gl/VaaEwb) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 44&lt;br /&gt;
| 30th May 2015&lt;br /&gt;
| Microsoft Technology Center (http://goo.gl/69VZrL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 43&lt;br /&gt;
| 16th May 2015&lt;br /&gt;
| Philips Innovation Campus (https://goo.gl/fAVWl9) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 42&lt;br /&gt;
| 25th April 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 41&lt;br /&gt;
| 21st March 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 40&lt;br /&gt;
| 21st February 2015&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 39&lt;br /&gt;
| 17th January 2015&lt;br /&gt;
| Sapient Consulting (http://goo.gl/hZmwyV) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 38&lt;br /&gt;
| 13th December 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 37&lt;br /&gt;
| 29th November 2014&lt;br /&gt;
| Triad Square Infosec (https://bit.ly/owaspmeet-xwh2014) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 36&lt;br /&gt;
| 22nd November 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 35&lt;br /&gt;
| 15th November 2014&lt;br /&gt;
| PayPal Office (http://goo.gl/quBKaG) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 34&lt;br /&gt;
| 18th October 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 33&lt;br /&gt;
| 20th September 2014&lt;br /&gt;
| InMobi Technologies (http://goo.gl/v6WsoT) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 32&lt;br /&gt;
| 30th August 2014&lt;br /&gt;
| EMC Corporation (http://goo.gl/19Ueet) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| 19th July 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| 14th June 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 09:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| 24th May 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL) &lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| 8th February 2014&lt;br /&gt;
| Paypal Office&lt;br /&gt;
| 10:00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| 18th January 2014&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| 14th December 2013&lt;br /&gt;
| ThoughtWorks Office (http://goo.gl/bokSL)&lt;br /&gt;
| 9:30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| 1st November 2012&lt;br /&gt;
| KPMG Office&lt;br /&gt;
| 7 PM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 24 &lt;br /&gt;
| 16th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 23 &lt;br /&gt;
| 19th May 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 22 &lt;br /&gt;
| 21th April 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 21 &lt;br /&gt;
| 10th March 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 20 &lt;br /&gt;
| 04th February 2012 &lt;br /&gt;
| Kieon (http://g.co/maps/dahhv)&lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 19 &lt;br /&gt;
| 07th January 2012 &lt;br /&gt;
| Kieon  &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 18 &lt;br /&gt;
| 3rd October 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 17 &lt;br /&gt;
| 19th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 16 &lt;br /&gt;
| 5th September 2009 &lt;br /&gt;
| Praxeva India &lt;br /&gt;
| 10 AM&lt;br /&gt;
|-&lt;br /&gt;
| 15 &lt;br /&gt;
| 12 July 2009 &lt;br /&gt;
| Cubbon Park &lt;br /&gt;
| 10.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 14 &lt;br /&gt;
| 07 June 2009 &lt;br /&gt;
| ICH, Church Street &lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 13 &lt;br /&gt;
| 11 April 2009 &lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2]) &lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12 &lt;br /&gt;
| 07 March 2009 &lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park &lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11 &lt;br /&gt;
| 02 February 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10 &lt;br /&gt;
| 11 January 2009 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9 &lt;br /&gt;
| 14 December 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8 &lt;br /&gt;
| 16 November 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7 &lt;br /&gt;
| 13 September 2008 &lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6 &lt;br /&gt;
| 09 August 2008 &lt;br /&gt;
| Microland Office &lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5 &lt;br /&gt;
| 12 July 2008 &lt;br /&gt;
| RSA Office (Part of Secure Camp) &lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4 &lt;br /&gt;
| 29 June 2008 &lt;br /&gt;
| India Coffee House, MG Road &lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3 &lt;br /&gt;
| 28 June 2007 &lt;br /&gt;
| (Part of Barcamp Bangalore-4) &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1 &lt;br /&gt;
| 2006 &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= '''Meeting Summaries'''  =&lt;br /&gt;
[[Bangalore/Archives|Summaries from Past Meetings]]&lt;br /&gt;
&lt;br /&gt;
= '''Chapter Leaders'''=&lt;br /&gt;
== Current Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== KV Prashanth (2012 - Present) ===&lt;br /&gt;
=== Akash Mahajan (2012 - Present) ===&lt;br /&gt;
&lt;br /&gt;
I am ''The Web Application Security Guy''. Apart from running a company offering application security consulting, I spend majority of my time doing volunteer work for OWASP as the Bangalore chapter leader and null - The Open Security Community as a Community Manager. I tweet about security quite regularly on twitter account [https://twitter.com/makash @makash]. Feel free to get in touch.&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/makash @makash]&lt;br /&gt;
&lt;br /&gt;
=== Riyaz Walikar (2014 - Present) ===&lt;br /&gt;
&lt;br /&gt;
For food and shelter, I work as a pentester/web security tester+evangelist at a Big4. I have been active in the security community for the better part of the last 7 years by working closely with the Bangalore OWASP chapter and null - The Open Security community.&lt;br /&gt;
&lt;br /&gt;
My technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, researching devices that fall under the Internet of Things category and penetration testing networks exposed to the Internet. When not writing/breaking code, you can find me sleeping, playing football, reading or fishing.&lt;br /&gt;
&lt;br /&gt;
Blog:  http://www.riyazwalikar.com&lt;br /&gt;
 &lt;br /&gt;
Twitter: [https://www.twitter.com/riyazwalikar @riyazwalikar]&lt;br /&gt;
&lt;br /&gt;
== Current Chapter volunteers  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Abhinav Sejpal (2015 - Present) ===&lt;br /&gt;
 &lt;br /&gt;
Fell in love with the power of software at age 17, and he is still in love. He is a security researcher working at Accenture Digital. He has reported security vulnerabilities 50+ Unique product giants all over the world including Apple, Adobe , Twitter, Linkedin, Yahoo , Pinterest, VK etc. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Android , iOS Mobile App and open source project like ASVS, OWASP Mobile Top 10, Mobile Security Framework etc. &lt;br /&gt;
&lt;br /&gt;
Speaker @ OWASP, Null , Weekend Testing Bangalore Chapter&lt;br /&gt;
&lt;br /&gt;
Blog: http://bugwrangler.in  &lt;br /&gt;
&lt;br /&gt;
Twitter: [https://www.twitter.com/Abhinav_Sejpal @Abhinav_Sejpal]&lt;br /&gt;
&lt;br /&gt;
Github: [https://github.com/bugwrangler bugwrangler]&lt;br /&gt;
&lt;br /&gt;
=== Satish Govindappa (2015 - Present) ===&lt;br /&gt;
&lt;br /&gt;
14+ years of significant, progressive expertise in security architecture practices, secure coding practices, secure code review, web application pen-testing,security testing tools and secure software development training.&lt;br /&gt;
Build and facilitate company-wide security architecture practice and secure software development programs&lt;br /&gt;
&lt;br /&gt;
== Previous Chapter Leaders == &lt;br /&gt;
&lt;br /&gt;
=== Harinath (2002 - 2012) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:July_Month_Meet-up.png&amp;diff=197372</id>
		<title>File:July Month Meet-up.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:July_Month_Meet-up.png&amp;diff=197372"/>
				<updated>2015-07-12T12:18:31Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: Bangalore meet up  schedule&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Bangalore meet up  schedule&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Project&amp;diff=196626</id>
		<title>OWASP Mobile Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Project&amp;diff=196626"/>
				<updated>2015-06-27T21:10:08Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* About this list */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Home =&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Security Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications.  Through the project, our goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.&lt;br /&gt;
&lt;br /&gt;
Our primary focus is at the application layer.  While we take into consideration the underlying mobile platform and carrier inherent risks when threat modeling and building controls, we are targeting the areas that the average developer can make a difference.  Additionally, we focus not only on the mobile applications deployed to end user devices, but also on the broader server-side infrastructure which the mobile apps communicate with.  We focus heavily on the integration between the mobile application, remote authentication services, and cloud platform-specific features.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We have a Google Doc where anyone who wants to be involved with the project can add their thoughts, suggestions, and take ownership of initiatives - [https://docs.google.com/document/d/1bScrvrLJLOHcSbztjBxYoN-jN3kR8bViy9tF8Nx0c08/edit Click here]. There are various tasks that people have started over the past 6 months with varying levels of quality and completeness.'''&lt;br /&gt;
&lt;br /&gt;
This project is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads or feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well! &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]] [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks Project Email List]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
{{Template:Contact | name = Mike Zusman&lt;br /&gt;
| email = mike.zusman@owasp.org&lt;br /&gt;
| username = schmoilito }}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Tony DeLaGrange&lt;br /&gt;
| email = mobisec@secureideas.net&lt;br /&gt;
| username = Tony DeLaGrange&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Sarath Geethakumar&lt;br /&gt;
| email = sarath.geethakumar@owasp.org&lt;br /&gt;
| username =  Sarath Geethakumar&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Tom Eston&lt;br /&gt;
| email = teston@securestate.com&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Don Williams&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jason Haddix&lt;br /&gt;
| email = jason.haddix@hp.com&lt;br /&gt;
| username =  Jason Haddix&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Zach Lanier&lt;br /&gt;
| email = zach.lanier@n0where.org&lt;br /&gt;
| username = Zach_Lanier&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jim Manico&lt;br /&gt;
| email = jim.manico@owasp.org&lt;br /&gt;
| username = jmanico&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Ludovic Petit&lt;br /&gt;
| email = ludovic.petit@owasp.org&lt;br /&gt;
| username =  Ludovic Petit&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Swapnil Deshmukh&lt;br /&gt;
| email = sd.swapz@gmail.com&lt;br /&gt;
| username =  Swapnil Deshmukh&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Beau Woods&lt;br /&gt;
| email = owasp@beauwoods.com&lt;br /&gt;
| username =  Beau Woods&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jonathan Carter&lt;br /&gt;
| email = jonathan.carter@owasp.org&lt;br /&gt;
| username =  Jonathan Carter&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = David Martin Aaron&lt;br /&gt;
| email = davidmartinaaron@gmail.com&lt;br /&gt;
| username =  David Martin Aaron&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Luca De Fulgentis&lt;br /&gt;
| email = luca@securenetwork.it&lt;br /&gt;
| username =  Daath&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Milan Singh Thakur&lt;br /&gt;
| email = milanthakur2010@gmail.com&lt;br /&gt;
| username =  Milan Singh Thakur&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Andrew Pannell&lt;br /&gt;
| email = andrew.pannell@owasp.org&lt;br /&gt;
| username =  Andipannell&lt;br /&gt;
}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 Mobile Risks =&lt;br /&gt;
&lt;br /&gt;
Please visit the [https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks project page] for current information. &lt;br /&gt;
&lt;br /&gt;
== About this list  ==&lt;br /&gt;
In 2013, we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
[[File:Mobile_Top_10_2014.png|right|640px]]&lt;br /&gt;
Our goals for the 2014 list included the following:&lt;br /&gt;
&lt;br /&gt;
* Updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc;&lt;br /&gt;
* Generation of more data; and&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
This list has been finalized after a 90-day feedback period from the community. Based on feedback, we intend on releasing a Mobile Top Ten 2015 list following a similar approach of collecting data, grouping the data in logical and consistent ways.&lt;br /&gt;
&lt;br /&gt;
Feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well!&lt;br /&gt;
&lt;br /&gt;
== Call to Action for 2015 ==&lt;br /&gt;
We are currently looking for vendors, consultants, or other industry experts within the appsec community that are willing to participate in the OWASP Mobile Top Ten 2015.  Participation could include any of the following: gathering data, promoting awareness, etc.&lt;br /&gt;
&lt;br /&gt;
We have published a [https://docs.google.com/viewer?a=v&amp;amp;pid=forums&amp;amp;srcid=MTM2MzA3NTkyMzA4NjgxNjcwNjQBMTU5NDg1NTE3NTg0NTgyOTMzOTgBUmEtcUZEUFNUVzRKATAuMQFvd2FzcC5vcmcBdjI Call for Data document] and have also (in the name of transparency) [https://docs.google.com/spreadsheets/d/16bW_VhEIlFU4cfN8BOOk40-XN93FM0f0Sxcx67NwPcg/edit?usp=sharing published a document] which lists which entities/vendors/individuals/etc that we have reached out to. These requests were made because we know these entities to be thought leaders in the mobile application space. If we missed you, and you have data or feedback to contribute, we apologize. Please email one of us!&lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Final List 2014 ==&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Mobile Tools =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Reverse_Engineering_Arsenals.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IOS_Arsenal.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== iMAS  ==&lt;br /&gt;
&lt;br /&gt;
iMAS is a collaborative research project from the MITRE Corporation focused on open source iOS security controls. Today, iOS meets the enterprise security needs of customers, however many security experts cite critical vulnerabilities and have demonstrated exploits, which pushes enterprises to augment iOS deployments with commercial solutions. The iMAS intent is to protect iOS applications and data beyond the Apple provided security model and reduce the adversary’s ability and efficiency to perform recon, exploitation, control and execution on iOS mobile applications. iMAS will transform the effectiveness of the existing iOS security model across major vulnerability areas including the System Passcode, jailbreak, debugger / run-time, flash storage, and the system keychain. Research outcomes include an open source secure application framework, including an application container, developer and validation tools/techniques.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_iMAS_iOS_Mobile_Application_Security_Project iMas Project Page]&lt;br /&gt;
&lt;br /&gt;
The source code for iMAS is available on GitHub: [https://github.com/project-imas/about iMAS Source Code]&lt;br /&gt;
&lt;br /&gt;
== GoatDroid  ==&lt;br /&gt;
&lt;br /&gt;
OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security. GoatDroid requires minimal dependencies and is ideal for both Android beginners as well as more advanced users. The project currently includes two applications: FourGoats, a location-based social network, and Herd Financial, a mobile banking application. There are also several features that greatly simplify usage within a training environment or for absolute beginners who want a good introduction to working with the Android platform.&lt;br /&gt;
&lt;br /&gt;
As the Android SDK introduces new features, the GoatDroid contributors will strive to implement up-to-date lessons that can educate developers and security testers on new security issues. The project currently provides coverage for most of the OWASP Top 10 Mobile Risks and also includes a bunch of other problems as well.&lt;br /&gt;
&lt;br /&gt;
You can find GoatDroid on GitHub: [https://github.com/jackMannino/OWASP-GoatDroid-Project GoatDroid Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_GoatDroid_Project GoatDroid Project Page]&lt;br /&gt;
&lt;br /&gt;
== iGoat ==&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
# Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_iGoat_Project iGoat Project Page]&lt;br /&gt;
&lt;br /&gt;
The iGoat source code is available on Google Code [http://code.google.com/p/owasp-igoat/ iGoat Source Code]&lt;br /&gt;
&lt;br /&gt;
== Damn Vulnerable iOS Application ==&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.&lt;br /&gt;
&lt;br /&gt;
The current challenge categories:&lt;br /&gt;
&lt;br /&gt;
* Insecure Data Storage (4 exercises)&lt;br /&gt;
* Jailbreak Detection (2 exercises)&lt;br /&gt;
* Runtime Manipulation (3 exercises)&lt;br /&gt;
* Transport Layer Security (1 exercise)&lt;br /&gt;
* Client Side Injection (1 exercise)&lt;br /&gt;
* Broken Cryptography (1 exercise)&lt;br /&gt;
* Binary Patching (4 exercises)&lt;br /&gt;
&lt;br /&gt;
[http://damnvulnerableiosapp.com DVIA Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_DVIA DVIA OWASP Project Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/prateek147/DVIA DVIA Github Source]&lt;br /&gt;
&lt;br /&gt;
[http://damnvulnerableiosapp.com/#learn DVIA Learning Resources]&lt;br /&gt;
&lt;br /&gt;
== MobiSec ==&lt;br /&gt;
&lt;br /&gt;
The MobiSec Live Environment Mobile Testing Framework project is a live environment for testing mobile environments, including devices, applications, and supporting infrastructure. The purpose is to provide attackers and defenders the ability to test their mobile environments to identify design weaknesses and vulnerabilities. The MobiSec Live Environment provides a single environment for testers to leverage the best of all available open source mobile testing tools, as well as the ability to install additional tools and platforms, that will aid the penetration tester through the testing process as the environment is structured and organized based on an industry­‐proven testing framework. Using a live environment provides penetration testers the ability to boot the MobiSec Live Environment on any Intel-­based system from a DVD or USB flash drive, or run the test environment within a virtual machine. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_MobiSec Project Page]&lt;br /&gt;
&lt;br /&gt;
MobiSec can be downloaded from Sourceforge: [http://sourceforge.net/p/mobisec/wiki/Home/ MobiSec Download Repository]&lt;br /&gt;
&lt;br /&gt;
== Androick  ==&lt;br /&gt;
&lt;br /&gt;
Androick is a collaborative research project from PHONESEC Ltd. With our tool, you can evaluate some risks on Android mobile applications.&lt;br /&gt;
Androick is a tool that allows any user to analyze an Android application. It can get the apk file, all the datas and the databases in sqlite3 and csv format. &lt;br /&gt;
Only for Pentesters or Researchers.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Androick_Project Androick Project Page]&lt;br /&gt;
&lt;br /&gt;
== NowSecure App Testing Community Edition ==&lt;br /&gt;
&lt;br /&gt;
The NowSecure App Testing Community Edition is the freely downloadable version of the powerful App Testing suite. Users are offered a number of features such as network capture, automation, import / export, and reporting to test and secure mobile apps.&lt;br /&gt;
&lt;br /&gt;
It provides the opportunity to complete mobile app security tests on any application on Android or iOS mobile devices (or installed in an emulator).&lt;br /&gt;
&lt;br /&gt;
The suite is provided as a preconfigured virtual machine (VM). After downloading the VM and licensing your version of the suite you will have everything you need to test the security of mobile apps.&lt;br /&gt;
&lt;br /&gt;
Built in emulator - Don’t have a device? No worries. The suite includes a built in Emulator that may be used to test the security of your mobile applications.&lt;br /&gt;
&lt;br /&gt;
[https://www.nowsecure.com/apptesting/community/ NowSecure App Testing Suite]&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
OWASP SeraphimDroid is educational, privacy and device protection application for android devices that helps users learn about risks and threats coming from other android applications. SeraphimDroid is also an application firewall for android devices not allowing malicious SMS or MMS to be sent, USSD codes to be executed or calls to be called without user permission and knowledge. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP Seraphimdroid project page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/nikolamilosevic86/owasp-seraphimdroid OWASP Seraphimdroid code]&lt;br /&gt;
&lt;br /&gt;
[https://play.google.com/store/apps/details?id=org.owasp.seraphimdroid OWASP Seraphimdroid on Google Play]&lt;br /&gt;
&lt;br /&gt;
== OWASP Summer of Code 2008 ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation sponsored the OWASP Application Security Verification Standard Project during the OWASP Summer of Code 2008.&lt;br /&gt;
&lt;br /&gt;
= Mobile Security Testing =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
A major priority of the OWASP Mobile Security Project is to help standardize and disseminate mobile application testing methodologies. While specific techniques exist for individual platforms, a general mobile threat model can be used to assist test teams in creating a mobile security testing methodology for any platform. The outline which follows describes a general mobile application testing methodology which can be tailored to meet the security tester’s needs. It is high level in some places, and over time will be customized on a per-platform basis.&lt;br /&gt;
&lt;br /&gt;
This guide is targeted towards application developers and security testers. Developers can leverage this guide to ensure that they are not introducing the security flaws described within the guide. Security testers can use it as a reference guide to ensure that they are adequately assessing the mobile application attack surface. The ideal mobile assessment combines dynamic analysis, static analysis, and forensic analysis to ensure that the majority of the mobile application attack surface is covered. &lt;br /&gt;
&lt;br /&gt;
On some platforms, it may be necessary to have root user or elevated privileges in order to perform all of the the required analysis on devices during testing. Many applications write information to areas that cannot be accessed without a higher level of access than the standard shell or application user generally has. For steps that generally require elevated privileges, it will be stated that this is the case. &lt;br /&gt;
&lt;br /&gt;
This guide is broken up into three sections:&lt;br /&gt;
*'''Information Gathering-''' describes the steps and things to consider when you are in the early stage reconnaissance and mapping phases of testing as well as determining the application’s magnitude of effort and scoping.&lt;br /&gt;
*'''Static Analysis'''- Analyzing raw mobile source code, decompiled or disassembled code. &lt;br /&gt;
*'''Dynamic Analysis''' - executing an application either on the device itself or within a simulator/emulator and interacting with the remote services with which the application communicates. This includes assessing the application’s local interprocess communication surface, forensic analysis of the local filesystem, and assessing remote service dependencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How To Use This Resource ===&lt;br /&gt;
&lt;br /&gt;
As this guide is not platform specific, you will need to know the appropriate techniques &amp;amp; tools for your target platform. The OWASP Mobile Security Project has also developed a number of other supporting resources which may be able to be leveraged for your needs.&lt;br /&gt;
&lt;br /&gt;
'''In this current draft release, the guide is a work in progress. We need additional contributors to help fill in the blanks. If you think something is missing (there certainly is), add it.'''&lt;br /&gt;
&lt;br /&gt;
As this guide is not platform specific, you will need to know the appropriate techniques &amp;amp; tools for your target platform. The OWASP Mobile Security Project has also developed a number of other supporting resources which may be able to be leveraged for your needs,&lt;br /&gt;
&lt;br /&gt;
The steps required to properly test an Android application are very different than those of testing an iOS application. Likewise, Windows Phone is very different from the other platforms. Mobile security testing requires a diverse skillset over many differing operating systems and a critical ability to analyze various types of source code.&lt;br /&gt;
&lt;br /&gt;
In many cases, a mobile application assessment will require coverage in all three areas identified within this testing reference. A dynamic assessment will benefit from an initial thorough attempt at Information Gathering, some level of static analysis against the application’s binary, and a forensic review of the data created and modified by the application’s runtime behavior.&lt;br /&gt;
&lt;br /&gt;
Please use this guide in an iterative fashion, where work in one area may require revisiting previous testing steps. As an example, after completing a transaction you may likely need to perform additional forensic analysis on the device to ensure that sensitive data is removed as expected and not cached in an undesired fashion. As you learn more about the application at runtime, you may wish to examine additional parts of the code to determine the best way to evade a specific control. Likewise, during static analysis it may be helpful to populate the application with certain data in order to prove or refute the existence of a security flaw.&lt;br /&gt;
&lt;br /&gt;
In the future, contributors to the testing guide should consider adding entries under each section relevant to a specific platform. Over time, OWASP contributors will write platform specific guides and expand upon this body of knowledge. &lt;br /&gt;
&lt;br /&gt;
If a specific area of interest is not covered in this guide, please feel free to either: &lt;br /&gt;
&lt;br /&gt;
*write the material yourself by registering for a wiki account and contributing content: [https://www.owasp.org/index.php/Special:RequestAccount Wiki Registration]&lt;br /&gt;
*bring this up as a topic on the Mobile Project’s mailing list: [https://lists.owasp.org/mailman/listinfo/owasp-mobile-security-project Mobile Mailing List]&lt;br /&gt;
&lt;br /&gt;
Collaboration on building the guide is being performed within Google Docs. You can find the latest and greatest material here: [https://docs.google.com/document/m/?id=1N7zMXlFHtWfc00xa6lRHnVB60U4BZO4SbUrWYMbojVM&amp;amp;pli=1&amp;amp;login=1 Testing Guide Google Doc]&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
As a result of this initial information gathering exercise, the tester will be better prepared for the future testing phases. Testers, Developers and Security people often fail to take the time to learn the target application and supporting infrastructure, opting to dive in blind, possibly losing valuable time and missing possible attack vectors. Without a solid understanding of how the application “should” work as well as the technologies in use, the tester will not be able to identify when the application behaves in a manner that it “shouldn’t”.&lt;br /&gt;
&lt;br /&gt;
Prerequisites of this phase may require specific operating systems, platform specific software development kits (SDK’s), rooted or jailbroken devices, the ability to man-in-the-middle secure communications (i.e. HTTPS) and bypass invalid certificate checks.&lt;br /&gt;
&lt;br /&gt;
*Manually navigate through the running application to understand the basic functionality and workflow of the application. This can be performed on a real device or within a simulator/emulator. For deeper understanding of application functionality tester can proxy and sniff all network traffic from either a physical mobile device or an emulator/simulator recording and logging traffic (if your proxy tool permits logging, which most should).&lt;br /&gt;
&lt;br /&gt;
*Identify the networking interfaces used by the application, for instance:&lt;br /&gt;
**Mobile Communication (GSM, GPRS, EDGE, LTE)&lt;br /&gt;
**Wireless (Wi-Fi (802.11 standards), Bluetooth, NFC)&lt;br /&gt;
**Virtual Interfaces (i.e. VPN)&lt;br /&gt;
&lt;br /&gt;
*Determine what the application supports for access 3G, 4G, wifi and or others&lt;br /&gt;
&lt;br /&gt;
*What networking protocols are in use?&lt;br /&gt;
**Are secure protocols used where needed?&lt;br /&gt;
**Can they be switched with insecure protocols?&lt;br /&gt;
&lt;br /&gt;
*Does the application perform commerce transactions?&lt;br /&gt;
**Credit card transactions and/or stored payment information (certain industry regulations may be required (i.e. PCI DSS)).&lt;br /&gt;
**In-app purchasing of goods or features&lt;br /&gt;
**Make note for future phases to determine does the application store payment information? How is payment information secured?&lt;br /&gt;
&lt;br /&gt;
*Monitor and identify the hardware components that the application may potentially interact with&lt;br /&gt;
**NFC&lt;br /&gt;
**Bluetooth&lt;br /&gt;
**GPS&lt;br /&gt;
**Camera&lt;br /&gt;
**Microphone&lt;br /&gt;
**Sensors&lt;br /&gt;
**USB&lt;br /&gt;
&lt;br /&gt;
*Perform open source intelligence gathering (search engines, source code repositories, developer forums, etc.) to identify source code or configuration information that may be exposed (i.e. 3rd party components integrated within the application)&lt;br /&gt;
&lt;br /&gt;
*What frameworks are in use?&lt;br /&gt;
&lt;br /&gt;
*Identify if the application appears to interact with any other applications, services, or data such as:&lt;br /&gt;
**Telephony (SMS, phone)&lt;br /&gt;
**Contacts&lt;br /&gt;
**Auto correct / dictionary services&lt;br /&gt;
**Receiving data from apps and other on-device services&lt;br /&gt;
**Google Wallet&lt;br /&gt;
**iCloud&lt;br /&gt;
**Social networks (i.e. Facebook, Twitter, LinkedIn, Google+)&lt;br /&gt;
**Dropbox&lt;br /&gt;
**Evernote&lt;br /&gt;
**Email&lt;br /&gt;
**Etc.&lt;br /&gt;
&lt;br /&gt;
*Can you determine anything about the server side application environment?&lt;br /&gt;
**Hosting provider (AWS, App Engine, Heroku, Rackspace, Azure, etc.)&lt;br /&gt;
**Development environment (Rails, Java, Django, ASP.NET, etc.)&lt;br /&gt;
**Does the application leverage Single Sign On or Authentication APIs (Google Apps, Facebook, iTunes, OAuth, etc.)&lt;br /&gt;
**Any other APIs in use&lt;br /&gt;
***Payment gateways&lt;br /&gt;
***SMS messaging&lt;br /&gt;
***Social networks&lt;br /&gt;
***Cloud file storage&lt;br /&gt;
***Ad networks&lt;br /&gt;
&lt;br /&gt;
*Perform a thorough crawl of exposed web resources and sift through the requests and responses to identify potentially interesting data or behavior&lt;br /&gt;
**Leaking sensitive information (i.e. credentials) in the response&lt;br /&gt;
**Resources not exposed through the UI&lt;br /&gt;
**Error messages&lt;br /&gt;
**Cacheable information&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Static Analysis ==&lt;br /&gt;
&lt;br /&gt;
There are two primary ways static analysis will generally be performed on a mobile application: &lt;br /&gt;
#Analyzing source code obtained from development team (prefered) &lt;br /&gt;
#Using a compiled binary. &lt;br /&gt;
&lt;br /&gt;
Some level of static analysis should be performed for both dynamic and forensic analysis, as the application’s code will almost always provide valuable information to the tester (i.e. logic, backend targets, APIs, etc).&lt;br /&gt;
&lt;br /&gt;
In scenarios where the primary goal is to identify programmatic examples of security flaws, your best bet is to review pure source code as opposed to reverse engineering compiled software. For source code reviews, it is highly beneficial to have access to either a development or production instance of any web services. This includes both source code and a working test environment to perform the assessment within in order to expedite understanding of the code.&lt;br /&gt;
&lt;br /&gt;
=== Getting Started ===&lt;br /&gt;
*If the source is not directly available, decompile or disassemble the application’s binary&lt;br /&gt;
**extract the application from the device&lt;br /&gt;
**follow the appropriate steps for your platform’s application reverse engineering&lt;br /&gt;
**some applications may also require decryption prior to reverse engineering (note: decryption and code obfuscation are not the same thing)&lt;br /&gt;
&lt;br /&gt;
*Review the permissions the application requests as well as the resources that it is authorized to access (i.e. AndroidManifest.xml, iOS Entitlements or Windows Phone's WMAppManifest.xml)&lt;br /&gt;
&lt;br /&gt;
*Are there any easy to identify misconfigurations within the application found within the configuration files? Debugging flags set, world readable/writable permissions, etc.&lt;br /&gt;
&lt;br /&gt;
*What frameworks are in use? Is the application built using a cross-platform framework?&lt;br /&gt;
&lt;br /&gt;
*Identify the libraries in use including both platform provided as well as third party. Perform a quick review on the web to determine if these libraries:&lt;br /&gt;
**are up to date&lt;br /&gt;
**are free of vulnerabilities&lt;br /&gt;
**expose functionality that requires elevated privileges (access to location or contact data)&lt;br /&gt;
**native code&lt;br /&gt;
&lt;br /&gt;
*Does the application check for rooted/jailbroken devices? How is this done? How can this be circumvented? Is it as easy as changing the case of a file name or name of executable or path?&lt;br /&gt;
&lt;br /&gt;
*Determine what types of objects are implemented to create the various views within the application. This may significantly alter your test cases, as some views implement web browser functionality while others are native UI controls only.&lt;br /&gt;
&lt;br /&gt;
*Is all code expected to run within the platform’s standard runtime environment, or are some files/libraries dynamically loaded or called outside of that environment at runtime?&lt;br /&gt;
&lt;br /&gt;
*Attempt to match up every permission that the application requests with an actual concrete implementation of it within the application. Often, developers request more permission than they actually need. Identify if the same functionality could be enabled with lesser privileges.&lt;br /&gt;
&lt;br /&gt;
*Locate hard coded secrets within the application such as API keys, credentials, or proprietary business logic.&lt;br /&gt;
&lt;br /&gt;
*Identify every entry point for untrusted data entry and determine how it enforces access controls, validates and sanitizes inbound data, and passes the data off to other interpreters&lt;br /&gt;
**From web service calls&lt;br /&gt;
**Receiving data from other apps and on-device services&lt;br /&gt;
**Inbound SMS messages&lt;br /&gt;
**Reading information from the filesystem&lt;br /&gt;
&lt;br /&gt;
=== Authentication ===&lt;br /&gt;
&lt;br /&gt;
*Locate the code which handles user authentication through the UI. Assess the possible methods of user impersonation via vectors such as parameter tampering, replay attacks, and brute force attacks.&lt;br /&gt;
&lt;br /&gt;
*Check if authentication is done online/offline. Sometimes authentication is done offline, so here you can try SQLi to bypass authentication.&lt;br /&gt;
&lt;br /&gt;
*Determine if the application utilizes information beyond username/password such as&lt;br /&gt;
**contextual information (i.e.- device identifiers, location)&lt;br /&gt;
**certificates&lt;br /&gt;
**tokens&lt;br /&gt;
&lt;br /&gt;
*Does the application utilize visual swipe or touch passwords vs. conventional usernames and passwords?&lt;br /&gt;
**Assess the method of mapping the visual objects to an authentication string to determine if adequate entropy exists&lt;br /&gt;
&lt;br /&gt;
*Does the application implement functionality that permits inbound connections from other devices? (i.e.- Wi-Fi Direct, Android Beam, network services)&lt;br /&gt;
**Does the application properly authenticate the remote user or peer prior to granting access to device resources?&lt;br /&gt;
**How does the application handle excessive failed attempts at authentication?&lt;br /&gt;
**are failed attempts logged?&lt;br /&gt;
**what mechanisms exist to inform the user of a potential attack?&lt;br /&gt;
&lt;br /&gt;
*Is there account lockout implemented for limited invalid login attempts?&lt;br /&gt;
**How many invalid attempts are allowed?&lt;br /&gt;
**Does application handles DOS performed using account lockout feature?&lt;br /&gt;
**How does it unlock the user account? &lt;br /&gt;
&lt;br /&gt;
*Single Sign On, e.g.&lt;br /&gt;
**OAuth&lt;br /&gt;
**Facebook&lt;br /&gt;
**Google Apps&lt;br /&gt;
&lt;br /&gt;
*SMS&lt;br /&gt;
**How is the sender authenticated?&lt;br /&gt;
***password&lt;br /&gt;
***header information&lt;br /&gt;
***Other mechanism?&lt;br /&gt;
**Are one time passwords (OTP) used or is other sensitive account data transmitted via SMS?&lt;br /&gt;
***Can other applications access this data?&lt;br /&gt;
**What if attacker tampers OTP using gprs modem?&lt;br /&gt;
**Can application validate the tampered OTP?&lt;br /&gt;
&lt;br /&gt;
*USSD&lt;br /&gt;
**Does application use USSD/Flash messages to authenticate use?&lt;br /&gt;
***USSD based authentication is more reliable than SMS&lt;br /&gt;
&lt;br /&gt;
*Push Notifications&lt;br /&gt;
**If the application consumes information via push notifications, how does the application verify the identity of the sender?&lt;br /&gt;
&lt;br /&gt;
=== Authorization ===&lt;br /&gt;
*Review file permissions for files created at runtime&lt;br /&gt;
&lt;br /&gt;
*Determine if it is possible to access functionality not intended for your role&lt;br /&gt;
&lt;br /&gt;
**Identify if the application has role specific functionality within the mobile application&lt;br /&gt;
&lt;br /&gt;
**Locate any potential flags or values that may be set on the client from any untrusted source that can be a point of privilege elevation such as&lt;br /&gt;
***databases&lt;br /&gt;
***flat files&lt;br /&gt;
***HTTP responses&lt;br /&gt;
&lt;br /&gt;
**Find places within an application that were not anticipated being directly accessed without following the application’s intended workflow&lt;br /&gt;
&lt;br /&gt;
*Licensing&lt;br /&gt;
**Can licensing checks be defeated locally to obtain access to paid-for data resources? (i.e.- patching a binary, modifying it at runtime, or by modifying a local configuration file)&lt;br /&gt;
**Does the code suggest that licensed content is served with a non-licensed app but restricted by UI controls only?&lt;br /&gt;
**Are licensing checks performed properly by the server or platform licensing services?&lt;br /&gt;
**How does the application detect and respond to tampering?&lt;br /&gt;
***Are alerts sent to and expected by the developer?&lt;br /&gt;
***Does the application fail open or fail closed?&lt;br /&gt;
***Does the application wipe its data?&lt;br /&gt;
&lt;br /&gt;
=== Session Management ===&lt;br /&gt;
&lt;br /&gt;
*Ensure that sessions timeout locally as well as server side.&lt;br /&gt;
**Make sure Session Timeout is set to minimal value.&lt;br /&gt;
&lt;br /&gt;
*Is sensitive information utilized within the application flushed from memory upon session expiration?&lt;br /&gt;
&lt;br /&gt;
*No Session IDs should be passed in URL, ensure usage of POST method or hidden fields.&lt;br /&gt;
&lt;br /&gt;
*Detect Session Fixation/Tampering on Server Side.&lt;br /&gt;
&lt;br /&gt;
*Ensure Session tokens are randomized and are not guessable or in sequence.&lt;br /&gt;
&lt;br /&gt;
=== Data Storage ===&lt;br /&gt;
&lt;br /&gt;
*Encryption&lt;br /&gt;
**Are the algorithms used “best of breed” or do they contain known issues?&lt;br /&gt;
**How are keys derived from i.e. a password?&lt;br /&gt;
**Based on the algorithms and approaches used to encrypt data, do implementation issues exist that degrade the effectiveness of encryption?&lt;br /&gt;
**How are keys managed and stored on the device? Can this reduce the complexity in breaking the encryption?&lt;br /&gt;
&lt;br /&gt;
*Identify if the application utilizes storage areas external to the “sandboxed” locations to store unencrypted data such as:&lt;br /&gt;
**Places with limited access control granularity (SD card, tmp directories, etc.)&lt;br /&gt;
**Directories that may end up in backups or other undesired locations (iTunes backup, external storage, etc.)&lt;br /&gt;
**Cloud storage services such as Dropbox, Google Drive, or S3&lt;br /&gt;
&lt;br /&gt;
*Does the application write sensitive information to the file system at any point, such as:&lt;br /&gt;
**Credentials&lt;br /&gt;
***Username and/or password&lt;br /&gt;
***API keys&lt;br /&gt;
***Authentication tokens&lt;br /&gt;
**Payment information&lt;br /&gt;
**Patient data&lt;br /&gt;
**Signature files&lt;br /&gt;
&lt;br /&gt;
*Is sensitive information written to data stores via platform exposed APIs such as contacts?&lt;br /&gt;
&lt;br /&gt;
=== Information Disclosure ===&lt;br /&gt;
&lt;br /&gt;
*Logs&lt;br /&gt;
**Does the application log data? Is sensitive information accessible?&lt;br /&gt;
**How are the logs accessed, if so, and by which mechanism/functionality? Is log access protected?&lt;br /&gt;
**Can any of the logged information be considered a privacy violation?&lt;br /&gt;
**Is the device identifier sent that could be used to identify the user? (i.e.UDID in Apple devices)&lt;br /&gt;
**Does the application upload any log file to the server?&lt;br /&gt;
***Is the log file extension validated before upload?&lt;br /&gt;
***Is the content of the log file validated before upload? What if malicious code is embedded in log file?&lt;br /&gt;
&lt;br /&gt;
*Caches&lt;br /&gt;
**Predictive text&lt;br /&gt;
**Location information&lt;br /&gt;
**Copy and paste&lt;br /&gt;
**Application snapshot&lt;br /&gt;
**Browser cache&lt;br /&gt;
**Non-standard cache locations (i.e the various SQLite databases that apps can create if they use HTML UI components)&lt;br /&gt;
**Are HTTPS responses being cached?&lt;br /&gt;
&lt;br /&gt;
*Exceptions&lt;br /&gt;
**Does sensitive data leak in crash logs?&lt;br /&gt;
**How does application handle data/logs outside its container?&lt;br /&gt;
&lt;br /&gt;
*Third Party Libraries and APIs&lt;br /&gt;
**What permissions do they require?&lt;br /&gt;
**Do they access or transmit sensitive information?&lt;br /&gt;
Review licensing requirements for any potential violations.&lt;br /&gt;
**Can their runtime behavior expose users to privacy issues and unauthorized tracking?&lt;br /&gt;
&lt;br /&gt;
=== Web Application Issues ===&lt;br /&gt;
&lt;br /&gt;
*XSS and HTML Injection&lt;br /&gt;
**Identify places where the application passes untrusted data into a web view or browser&lt;br /&gt;
**Determine if the application properly output encodes or sanitizes the data within the appropriate context&lt;br /&gt;
*OS Command Injection (if the application utilizes a shell)&lt;br /&gt;
**Where the application permits usage of the shell, identify the entry points to manipulate or alter the commands via user input or external untrusted data&lt;br /&gt;
**Determine if an attacker can inject arbitrary commands or manipulate the intended command in any way&lt;br /&gt;
*CSRF&lt;br /&gt;
*SQL Injection&lt;br /&gt;
*Cookies&lt;br /&gt;
*HTML5&lt;br /&gt;
*XML Injection&lt;br /&gt;
*Check Cross Domain Policy&lt;br /&gt;
&lt;br /&gt;
=== Networking ===&lt;br /&gt;
&lt;br /&gt;
*Are insecure protocols used to send or receive sensitive information? Examples- FTP, SNMP v1, SSH v1&lt;br /&gt;
&lt;br /&gt;
*Are there any known issues with the specific libraries you are using to implement the protocol?&lt;br /&gt;
&lt;br /&gt;
=== Transport Layer Protection ===&lt;br /&gt;
*Does the application properly implement Certificate Pinning?&lt;br /&gt;
&lt;br /&gt;
*Are certificates validated to determine if:&lt;br /&gt;
**The certificate has not expired&lt;br /&gt;
**The certificate was issued by a valid certificate authority&lt;br /&gt;
**The remote destination information matches the information within the certificate?&lt;br /&gt;
&lt;br /&gt;
*Are certificates validated only by the operating system or also by the application that relies on it?&lt;br /&gt;
&lt;br /&gt;
*Identify if code exist to alter the behavior for traffic transiting different interfaces (i.e.- 3G/4G comms vs. Wi-Fi)? If so, is encryption applied universally across each of them&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Helpful Search Strings and Regular Expressions ===&lt;br /&gt;
&lt;br /&gt;
*DEBUG&lt;br /&gt;
*printStackTrace&lt;br /&gt;
*username/userID/password/passwd/pwd/&lt;br /&gt;
*key/encrypt/decrypt/MD5/MD4&lt;br /&gt;
*timeout/session.invalidate&lt;br /&gt;
*root/jailbreak&lt;br /&gt;
*test/demo/&lt;br /&gt;
*sqlconnection/sqlevents/sqldemo/sqlconn/sqltest&lt;br /&gt;
*account/URL/hostname/ipaddress&lt;br /&gt;
*proxy&lt;br /&gt;
&lt;br /&gt;
== Dynamic Analysis ==&lt;br /&gt;
&lt;br /&gt;
Armed with data collected during the Information Gathering and Static Analysis phases, the tester can begin an informed vulnerability assessment of the mobile application client, server and associated services.&lt;br /&gt;
&lt;br /&gt;
Dynamic analysis is conducted against the backend services and APIs and the type of tests varies depending on mobile application type.&lt;br /&gt;
&lt;br /&gt;
=== Application Types ===&lt;br /&gt;
&lt;br /&gt;
*Native Mobile Application: Native mobile applications can be installed on to the device. This type of applications generally store most of their code on the device. Any information required can be requested to the server using the HTTP/s protocol&lt;br /&gt;
&lt;br /&gt;
*Web services for Mobile Application: Native mobile application that uses SOAP or REST based web services to communicate between client and Server&lt;br /&gt;
&lt;br /&gt;
*Mobile Browser Based Application: Web browser based applications can be accessed using device’s browsers such as Safari or Chrome. Most of the commercial applications are nowadays specifically designed and optimized for mobile browsers. These applications are no different than traditional web application and all the web application vulnerabilities apply to these apps and these should be tested as traditional web apps.&lt;br /&gt;
&lt;br /&gt;
*Mobile Hybrid Applications:Applications can leverage web browser functionality within native applications, blending the risks from both classes of applications.&lt;br /&gt;
&lt;br /&gt;
In this phase, the mobile client, backend services, and host platform is analyzed/scanned in attempt to uncover potential risks, vulnerabilities and threats. The use of an intercepting proxy tool as well as automated vulnerability scanners are core to this phase. In many cases, you will also need some type of shell access to the device.&lt;br /&gt;
&lt;br /&gt;
The following outline can be used as a “Dynamic Analysis” guide in planning a mobile assessment.&lt;br /&gt;
&lt;br /&gt;
=== Establishing a Baseline ===&lt;br /&gt;
&lt;br /&gt;
*Generate File System Baseline Fingerprint (before app installation)&lt;br /&gt;
**Application interactions with the host file system must be reviewed and analyzed at various stages of testing; starting with baseline capture. This may require a shell or GUI depending on platform and/or preference.&lt;br /&gt;
&lt;br /&gt;
*Install, Configure and Use the Application&lt;br /&gt;
**Manually inspect the file system to determine what files/databases were created, what and how data is stored. Did the application store sensitive data unencrypted or trivially protected (i.e. encoded)?&lt;br /&gt;
**Generally, pay attention to credentials, payment information, or other highly sensitive information being saved to the device. Also take a look at databases, log files, predictive text caches, and crash logs.&lt;br /&gt;
&lt;br /&gt;
=== Debugging ===&lt;br /&gt;
&lt;br /&gt;
*Attach a debugger to an application to step through code execution and setting breakpoints at interesting code within the application&lt;br /&gt;
&lt;br /&gt;
*Monitor logged messages and notifications generated at runtime&lt;br /&gt;
&lt;br /&gt;
*Observe interprocess communications between the target application and other applications and services running on the mobile device.&lt;br /&gt;
&lt;br /&gt;
=== Active Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Local Testing ====&lt;br /&gt;
&lt;br /&gt;
*Exposed IPC interfaces&lt;br /&gt;
**Sniff&lt;br /&gt;
**Fuzz&lt;br /&gt;
**Bypass authorization checks&lt;br /&gt;
&lt;br /&gt;
===== Cryptography =====&lt;br /&gt;
&lt;br /&gt;
*Brute force attacks against keys, pins, and hashes&lt;br /&gt;
*Attempt to reconstruct encrypted data through recovery of keys, hardcoded secrets, and any other information exposed by the application&lt;br /&gt;
&lt;br /&gt;
===== Web Applications =====&lt;br /&gt;
&lt;br /&gt;
*XSS and HTML Injection&lt;br /&gt;
**Is it possible to inject client side code (i.e. JavaScript) or HTML into the application to either modify the inner working of the application or it's user interface?&lt;br /&gt;
&lt;br /&gt;
*Command Injection (if the application utilizes a shell)&lt;br /&gt;
&lt;br /&gt;
*CSRF&lt;br /&gt;
&lt;br /&gt;
*SQL Injection&lt;br /&gt;
&lt;br /&gt;
*Cookies&lt;br /&gt;
**Are cookies issued by a server secured by using the HTTP-only and Secure flag?&lt;br /&gt;
**Is there any sensitive information stored in the cookies?&lt;br /&gt;
&lt;br /&gt;
*HTML5 Storage&lt;br /&gt;
&lt;br /&gt;
===== Authentication =====&lt;br /&gt;
&lt;br /&gt;
*Assess the methods an application uses to authenticate peers&lt;br /&gt;
**NFC&lt;br /&gt;
**SMS&lt;br /&gt;
**Push notifications&lt;br /&gt;
**Across IPC channels (identify the calling application’s privileges and identity)&lt;br /&gt;
&lt;br /&gt;
===== Authorization =====&lt;br /&gt;
*Instrument, patch, or interact with application at runtime to bypass methods intended to prevent usage of privileged or premium features&lt;br /&gt;
&lt;br /&gt;
*Determine if configuration or locally stored data can be manipulated in order to elevate a user’s privileges&lt;br /&gt;
&lt;br /&gt;
*Check the filesystem permissions for any files created at runtime&lt;br /&gt;
&lt;br /&gt;
===== File System Analysis =====&lt;br /&gt;
&lt;br /&gt;
*Assess the application’s behavior throughout it’s lifecycle to determine if special functionality is triggered to persist an application’s state when it enters different stages:&lt;br /&gt;
**Placed into the foreground&lt;br /&gt;
**Sent into the background&lt;br /&gt;
**Upon exiting the application&lt;br /&gt;
&lt;br /&gt;
*Data  storage in Cache&lt;br /&gt;
&lt;br /&gt;
*Looking for artifacts left on device&lt;br /&gt;
&lt;br /&gt;
*Unencrypted data storage on the device&lt;br /&gt;
&lt;br /&gt;
*Encryption of data in backups&lt;br /&gt;
&lt;br /&gt;
*Username/password, or app-specific unique device id stored on the device&lt;br /&gt;
&lt;br /&gt;
*Application Permissions , Privileges and Access controls on the device&lt;br /&gt;
&lt;br /&gt;
*Generally, pay attention to credentials, payment information, or other highly sensitive information being saved to the device. Also take a look at log files, predictive text caches, and crash logs.&lt;br /&gt;
&lt;br /&gt;
*Is sensitive information cached within the application’s UI back stack?&lt;br /&gt;
&lt;br /&gt;
*Utilize forensic tools to determine if deleted data can be recovered from the filesystem as well as within databases&lt;br /&gt;
&lt;br /&gt;
===== Memory Analysis =====&lt;br /&gt;
&lt;br /&gt;
*Determine if sensitive information persists within memory after performing the following actions:&lt;br /&gt;
**Logging out of the application&lt;br /&gt;
**Transition between UI components&lt;br /&gt;
&lt;br /&gt;
*Is it possible to obtain encryption keys, credentials, payment information and other sensitive information by dumping device or application memory?&lt;br /&gt;
&lt;br /&gt;
==== Remote Application/Service Testing ====&lt;br /&gt;
&lt;br /&gt;
===== Authentication =====&lt;br /&gt;
&lt;br /&gt;
*What methods are available (3G, 4G, Wifi, etc)?&lt;br /&gt;
&lt;br /&gt;
*What happens if the remote authentication service becomes unavailable?&lt;br /&gt;
&lt;br /&gt;
*Assess strength of password requirements&lt;br /&gt;
&lt;br /&gt;
*Test how account lockouts are implemented&lt;br /&gt;
&lt;br /&gt;
*Analyze (monitor traffic) how each method performs authentication. Note target wifi as this is a common area where authentication can be weak. Ensure authentication is robust and not based on trivial attributes (i.e. MDN, ESN, etc).&lt;br /&gt;
&lt;br /&gt;
*Verify that authentication tokens are terminated after a user initiates a password reset&lt;br /&gt;
&lt;br /&gt;
*Single Sign On (SSO)&lt;br /&gt;
&lt;br /&gt;
*SMS Based&lt;br /&gt;
**One Time Passwords (OTP)&lt;br /&gt;
**Two Factor Authentication&lt;br /&gt;
&lt;br /&gt;
*Push Notifications&lt;br /&gt;
&lt;br /&gt;
*Licensing&lt;br /&gt;
&lt;br /&gt;
===== Authorization =====&lt;br /&gt;
&lt;br /&gt;
*What happens if the remote authorization handling service becomes unavailable?&lt;br /&gt;
&lt;br /&gt;
*Test if direct access to backend resources is possible&lt;br /&gt;
&lt;br /&gt;
*Access controls to server side resources not enforced&lt;br /&gt;
&lt;br /&gt;
*Vertical and horizontal privilege escalation&lt;br /&gt;
&lt;br /&gt;
===== Session Management =====&lt;br /&gt;
&lt;br /&gt;
*Entropy analysis&lt;br /&gt;
*Device identifier related?&lt;br /&gt;
*Are session tokens refreshed between logouts?&lt;br /&gt;
*Lifetime and expiration&lt;br /&gt;
*Handling the session token on the device (stored, in memory, etc.)&lt;br /&gt;
*Privilege Escalation&lt;br /&gt;
*Ineffective Session Termination&lt;br /&gt;
*Session Fixation&lt;br /&gt;
*Pre-login/Login/Post-login Session checks&lt;br /&gt;
*Unique Session Generation&lt;br /&gt;
&lt;br /&gt;
===== Transport Layer Testing =====&lt;br /&gt;
*Man-in-the-middle attacks&lt;br /&gt;
*Eavesdropping&lt;br /&gt;
*SSL checks (cypher strengths/weakness etc.)&lt;br /&gt;
*SSL Striping&lt;br /&gt;
&lt;br /&gt;
===== Server Side Attacks =====&lt;br /&gt;
&lt;br /&gt;
*Triggering unhandled exceptions&lt;br /&gt;
*Cross-Site Scripting&lt;br /&gt;
*SQL Injection&lt;br /&gt;
*XML Bombs&lt;br /&gt;
*Buffer overflow&lt;br /&gt;
*Unrestricted File Upload&lt;br /&gt;
*Open Redirect&lt;br /&gt;
*Cross Origin Resource Sharing&lt;br /&gt;
&lt;br /&gt;
===== Server, Network &amp;amp; Application Scanning =====&lt;br /&gt;
&lt;br /&gt;
*Based on prior phases you should have 1 or more target servers (i.e. URLs) as candidates for automated vulnerability scanning. Mobile applications often leverage existing web services/applications (i.e. hybrid applications) which must be tested for security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Conclusion =====&lt;br /&gt;
&lt;br /&gt;
Mobile applications are continuing to mature and evolve thus to be effective, security testers must strive to advance their knowledge and skills. Please check back periodically for updates and share your feedback with us.&lt;br /&gt;
&lt;br /&gt;
= Mobile Cheat Sheet  =&lt;br /&gt;
== Mobile Cheat Sheet Series  ==&lt;br /&gt;
&lt;br /&gt;
Cheat sheets provide the information most relevant to a developer or security engineer with minimal &amp;quot;fluff&amp;quot;. The goal of the project is to build a collection of cheat sheets that provide actionable, useful, and straight to the point guidance for a plethora of mobile security issues.&lt;br /&gt;
&lt;br /&gt;
== Platform Agnostic ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Mobile_Jailbreaking_Cheat_Sheet Mobile Jailbreaking Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
== Android ==&lt;br /&gt;
&lt;br /&gt;
== iOS ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/IOS_Developer_Cheat_Sheet iOS Developer Cheat Sheet]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet iOS Application Security Testing Cheat Sheet]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Windows Phone (Developer Unlock) ==&lt;br /&gt;
&lt;br /&gt;
Developer Unlock:&lt;br /&gt;
You need to have machine with Windows 8 64-bit OS in it.&lt;br /&gt;
Connect your phone to Win8 machine using USB cable and start Visual Studio 2013 (with Windows Mobile package installed).&lt;br /&gt;
Go to Tool Windows Phone 8.1  Developer Unlock.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
XAP file deployment and Local Storage Check on Windows Mobile with OS 8+ &lt;br /&gt;
1.	You need to have machine with Windows 8 64-bit OS running in it.&lt;br /&gt;
2.	Install Windows 8 power tools (WP8).&lt;br /&gt;
Download WP8 here: http://wptools.codeplex.com/&lt;br /&gt;
3.	Connect your Windows Phone to Win8 machine using USB cable and WP8 will detect your device.&lt;br /&gt;
4.	You can now: install XAP files, update XAP files, check local storage (isolated storage), and get various attributes.&lt;br /&gt;
&lt;br /&gt;
== RIM ==&lt;br /&gt;
&lt;br /&gt;
= Secure Mobile Development =&lt;br /&gt;
'''Secure Mobile Development Guidelines Objective'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Development Guidelines provides developers with the knowledge they need to build secure mobile applications. An extendable framework will be provided that includes the core security flaws found across nearly all mobile platforms. It will be a living reference where contributors can plug in newly exposed APIs for various platforms and provide good/bad code examples along with remediation guidance for those issues.&lt;br /&gt;
&lt;br /&gt;
== Mobile Application Coding Guidelines ==&lt;br /&gt;
The purpose of this section is to provide application developers guidelines on how to build secure mobile applications, given the differences in security threat between applications running on a typical desktop as compared to those running on a mobile device (such as tablets or cell phones). &lt;br /&gt;
&lt;br /&gt;
Using the guidance provided here, developers should code their applications to mitigate these malicious attacks. While more general coding guidelines should still be followed as applicable, this page lists additional considerations and/or modifications to common guidelines and is written using the best knowledge available at this time.&lt;br /&gt;
&lt;br /&gt;
=== Authentication and Password Management ===&lt;br /&gt;
This is a set of controls used to verify the identity of a user, or other entity, interacting with the software, and also to ensure that applications handle the management of passwords in a secure fashion.&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Instances where the mobile application requires a user to create a password or PIN (say for offline access), the application should never use a PIN but enforce a password which follows a strong password policy.&lt;br /&gt;
&amp;lt;li&amp;gt; Mobile devices may offer the possibility of using password patterns which are never to be utilized in place of passwords as sufficient entropy cannot be ensured and they are easily vulnerable to smudge-attacks.&lt;br /&gt;
&amp;lt;li&amp;gt; Mobile devices may also offer the possibility of using biometric input to perform authentication which should never be used due to issues with false positives/negatives, among others.&lt;br /&gt;
&amp;lt;li&amp;gt; Wipe/clear memory locations holding passwords directly after their hashes are calculated.&lt;br /&gt;
&amp;lt;li&amp;gt; Based on risk assessment of the mobile application, consider utilizing two-factor authentication.&lt;br /&gt;
&amp;lt;li&amp;gt; For device authentication, avoid solely using any device-provided identifier (like UID or MAC address) to identify the device, but rather leverage identifiers specific to the application as well as the device (which ideally would not be reversible). For instance, create an app-unique “device-factor” during the application install or registration (such as a hashed value which is based off of a combination of the length of the application package file itself, as well as the current date/time, the version of the OS which is in use, and a randomly generated number). In this manner the device could be identified (as no two devices should ever generate the same “device-factor” based on these inputs) without revealing anything sensitive. This app-unique device-factor can be used with user authentication to create a session or used as part of an encryption key.&lt;br /&gt;
&amp;lt;li&amp;gt; In scenarios where offline access to data is needed, add an intentional X second delay to the password entry process after each unsuccessful entry attempt (2 is reasonable, also consider a value which doubles after each incorrect attempt).&lt;br /&gt;
&amp;lt;li&amp;gt; In scenarios where offline access to data is needed, perform an account/application lockout and/or application data wipe after X number of invalid password attempts (10 for example).&lt;br /&gt;
&amp;lt;li&amp;gt; When utilizing a hashing algorithm, use only a NIST approved standard such as SHA-2 or an algorithm/library.&lt;br /&gt;
&amp;lt;li&amp;gt; Salt passwords on the server-side, whenever possible. The length of the salt should at least be equal to, if not bigger than the length of the message digest value that the hashing algorithm will generate. &lt;br /&gt;
&amp;lt;li&amp;gt; Salts should be sufficiently random (usually requiring them to be stored) or may be generated by pulling constant and unique values off of the system (by using the MAC address of the host for example or a device-factor; see 3.1.2.g.). Highly randomized salts should be obtained via the use of a Cryptographically Secure Pseudorandom Number Generator (CSPRNG). When generating seed values for salt generation on mobile devices, ensure the use of fairly unpredictable values (for example, by using the x,y,z magnetometer and/or temperature values) and store the salt within space available to the application.&lt;br /&gt;
&amp;lt;li&amp;gt; Provide feedback to users on the strength of passwords during their creation.&lt;br /&gt;
&amp;lt;li&amp;gt; Based on a risk evaluation, consider adding context information (such as IP location, etc…) during authentication processes in order to perform Login Anomaly Detection.&lt;br /&gt;
&amp;lt;li&amp;gt; Instead of passwords, use industry standard authorization tokens (which expire as frequently as practicable) which can be securely stored on the device (as per the OAuth model) and which are time bounded to the specific service, as well as revocable (if possible server side).&lt;br /&gt;
&amp;lt;li&amp;gt; Integrate a CAPTCHA solution whenever doing so would improve functionality/security without inconveniencing the user experience too greatly (such as during new user registrations, posting of user comments, online polls, “contact us” email submission pages, etc…).&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure that separate users utilize different salts.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Code Obfuscation ===&lt;br /&gt;
This is a set of controls used to prevent reverse engineering of the code, increasing the skill level and the time required to attack the application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Abstract sensitive software within static C libraries.&lt;br /&gt;
&amp;lt;li&amp;gt; Obfuscate all sensitive application code where feasible by running an automated code obfuscation program using either 3rd party commercial software or open source solutions.&lt;br /&gt;
&amp;lt;li&amp;gt; For applications containing sensitive data, implement anti-debugging techniques (e.g. prevent a debugger from attaching to the process; android:debuggable=”false”).&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure logging is disabled as logs may be interrogated other applications with readlogs permissions (e.g. on Android system logs are readable by any other application prior to being rebooted).&lt;br /&gt;
&amp;lt;li&amp;gt; So long as the architecture(s) that the application is being developed for supports it (iOS 4.3 and above, Android 4.0 and above), Address Space Layout Randomization (ASLR) should be taken advantage of to hide executable code which could be used to remotely exploit the application and hinder the dumping of application’s memory.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Communication Security ===&lt;br /&gt;
This is a set of controls to help ensure the software handles the sending and receiving of information in a secure manner.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Assume the provider network layer is insecure. Modern network layer attacks can decrypt provider network encryption, and there is no guarantee a Wi-Fi network (if in-use by the mobile device) will be appropriately encrypted.&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure the application actually and properly validates (by checking the expiration date, issuer, subject, etc…) the server’s SSL certificate (instead of checking to see if a certificate is simply present and/or just checking if the hash of the certificate matches). To note, there are third party libraries to assist in this; search on “certificate pinning”.&lt;br /&gt;
&amp;lt;li&amp;gt; The application should only communicate with and accept data from authorized domain names/systems. It is permissible to allow application updates which will modify the list of authorized systems and/or for authorized systems to obtain a token from an authentication server, present a token to the client which the client will accept.&lt;br /&gt;
&amp;lt;li&amp;gt; To protect against attacks which utilize software such as SSLStrip, implement controls to detect if the connection is not HTTPS with every request when it is known that the connection should be HTTPS (e.g. use JavaScript, Strict Transport Security HTTP Header, disable all HTTP traffic).&lt;br /&gt;
&amp;lt;li&amp;gt; The UI should make it as easy as possible for the user to find out if a certificate is valid (so the user is not totally reliant upon the application properly validating any certificates).  &lt;br /&gt;
&amp;lt;li&amp;gt; When using SSL/TLS, use certificates signed by trusted Certificate Authority (CA) providers.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Data Storage and Protection ===&lt;br /&gt;
This is a set of controls to help ensure the software handles the storing and handling of information in a secure manner. Given that mobile devices are mobile, they have a higher likelihood of being lost or stolen which should be taken into consideration here. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Only collect and disclose data which is required for business use of the application. Identify in the design phase what data is needed, its sensitivity and whether it is appropriate to collect, store and use each data type.&lt;br /&gt;
&amp;lt;li&amp;gt; Classify data storage according to sensitivity and apply controls accordingly (e.g. passwords, personal data, location, error logs, etc.). Process, store and use data according to its classification&lt;br /&gt;
&amp;lt;li&amp;gt; Store sensitive data on the server instead of the client-end device, whenever possible. Assume any data written to device can be recovered.&lt;br /&gt;
&amp;lt;li&amp;gt; Beyond the time required by the application, don’t store sensitive information on the device (e.g. GPS/tracking).&lt;br /&gt;
&amp;lt;li&amp;gt; Do not store temp/cached data in a world readable directory. Assume shared storage is untrusted.&lt;br /&gt;
&amp;lt;li&amp;gt; Encrypt sensitive data when storing or caching it to non-volatile memory (using a NIST approved encryption standard such as AES-256, 3DES, or Skipjack).&lt;br /&gt;
&amp;lt;li&amp;gt; Use the PBKDF2 function to generate strong keys for encryption algorithms while ensuring high entropy as much as possible. The number of iterations should be set as high as may be tolerated for the environment (with a minimum of 1000 iterations) while maintaining acceptable performance.&lt;br /&gt;
&amp;lt;li&amp;gt; Sensitive data (such as encryption keys, passwords, credit card #’s, etc…) should stay in RAM for as little time as possible.&lt;br /&gt;
&amp;lt;li&amp;gt; Encryption keys should not remain in RAM during the instance lifecycle of the app. Instead, keys should be generated real time for encryption/decryption as needed and discarded each time.&lt;br /&gt;
&amp;lt;li&amp;gt; So long as the architecture(s) that the application is being developed for supports it (iOS 4.3 and above, Android 4.0 and above), Address Space Layout Randomization (ASLR) should be taken advantage of to limit the impact of attacks such as buffer overflows.&lt;br /&gt;
&amp;lt;li&amp;gt; Do not store sensitive data in the keychain of iOS devices due to vulnerabilities in their cryptographic mechanisms.&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure that sensitive data (e.g. passwords, keys etc.) are not visible in cache or logs.&lt;br /&gt;
&amp;lt;li&amp;gt; Never store any passwords in clear text within the native application itself nor on the browser (e.g. save password feature on the browser).&lt;br /&gt;
&amp;lt;li&amp;gt; When displaying sensitive information (such as full account numbers), ensure that the sensitive information is cleared from memory (such as from the webView) when no longer needed/displayed.&lt;br /&gt;
&amp;lt;li&amp;gt; Do not store sensitive information in the form of typical strings. Instead use character arrays or NSMutableString (iOS specific) and clear their contents after they are no longer needed. This is because strings are typically immutable on mobile devices and reside within memory even when assigned (pointed to) a new value.&lt;br /&gt;
&amp;lt;li&amp;gt; Do not store sensitive data on external storage like SD cards if it can be avoided.&lt;br /&gt;
&amp;lt;li&amp;gt; Consider restricting access to sensitive data based on contextual information such as location (e.g. wallet app not usable if GPS data shows phone is outside Europe, car key not usable unless within 100m of car etc...).&lt;br /&gt;
&amp;lt;li&amp;gt; Use non-persistent identifiers which are not shared with other apps wherever possible - e.g. do not use the device ID number as an identifier, use a randomly generated number instead.&lt;br /&gt;
&amp;lt;li&amp;gt; Make use of remote wipe and kill switch APIs to remove sensitive information from the device in the event of theft or loss.&lt;br /&gt;
&amp;lt;li&amp;gt; Use a time based (expiry) type of control which will wipe sensitive data from the mobile device once the application has not communicated with its servers for a given period of time.&lt;br /&gt;
&amp;lt;li&amp;gt; Automatic application shutdown and/or lockout after X minutes of inactivity (e.g. 5 mins of inactivity).&lt;br /&gt;
&amp;lt;li&amp;gt; Avoid cached application snapshots in iOS: iOS can capture and store screen captures and store them as images when an application suspends. To avoid any sensitive data getting captured, use one or both of the following options: 1. Use the ‘willEnterBackground’ callback, to hide all the sensitive data. 2. Configure the application in the info.plist file to terminate the app when pushed to background (only use if multitasking is disabled).&lt;br /&gt;
&amp;lt;li&amp;gt; Prevent applications from being moved and/or run from external storage such as via SD cards.&lt;br /&gt;
&amp;lt;li&amp;gt; When handling sensitive data which does not need to be presented to users (e.g. account numbers), instead of using the actual value itself, use a token which maps to the actual value on the server-side. This will prevent exposure of sensitive information.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Paywall Controls ===&lt;br /&gt;
This is a set of practices to ensure the application properly enforces access controls related to resources which require payment in order to access (such as access to premium content, access to additional functionality, access to improved support, etc…). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Maintain logs of access to paid-for resources in a non-repudiable format (e.g. a signed receipt sent to a trusted server backend – with user consent) and make them securely available to the end-user for monitoring.&lt;br /&gt;
&amp;lt;li&amp;gt; Warn users and obtain consent for any cost implications for application behavior.&lt;br /&gt;
&amp;lt;li&amp;gt; Secure account/pricing/billing/item information as it relates to users. If client has made any purchases via the application for instance, we should ensure that what they bought, the size of purchase, the quantity of the purchase, etc… should all be treated as sensitive information.&lt;br /&gt;
&amp;lt;li&amp;gt; Use a white-list model by default for paid-for resource addressing.&lt;br /&gt;
&amp;lt;li&amp;gt; Check for anomalous usage patterns in paid-for resource usage and trigger re- authentication. E.g. significant change in location occurs, user-language changes, etc...&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Server Controls ===&lt;br /&gt;
This is a set of practices to ensure the server side program which interfaces with the mobile application is properly safeguarded. These controls would also apply in cases where the mobile application may be integrating with vended solutions hosted outside of the typical network.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure that the backend system(s) are running with a hardened configuration with the latest security patches applied to the OS, Web Server and other application components.&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure adequate logs are retained on the backend in order to detect and respond to incidents and perform forensics (within the limits of data protection law).&lt;br /&gt;
&amp;lt;li&amp;gt; Employ rate limiting and throttling on a per-user/IP basis (if user identification is available) to reduce the risk from DoS type of attacks.&lt;br /&gt;
&amp;lt;li&amp;gt; Carry out a specific check of your code for any sensitive data unintentionally transferred between the mobile application and the back-end servers, and other external interfaces (e.g. is location or other information included transmissions?).&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure the server rejects all unencrypted requests which it knows should always arrive encrypted.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Session Management ===&lt;br /&gt;
This is a set of controls to help ensure mobile applications handle sessions in a secure manner.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Perform a check at the start of each activity/screen to see if the user is in a logged in state and if not, switch to the login state.&lt;br /&gt;
&amp;lt;li&amp;gt; When an application’s session is timed out, the application should discard and clear all memory associated with the user data, and any master keys used to decrypt the data.&lt;br /&gt;
&amp;lt;li&amp;gt; Session tokens should be revocable (particularly on the server side).&lt;br /&gt;
&amp;lt;li&amp;gt; Use lower timeout values to invalidate expired sessions (in contrast to the typical timeout values on traditional (non-mobile) applications).&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Use of 3rd Party Libraries/Code ===&lt;br /&gt;
This is a set of practices to ensure the application integrates securely with code produced from outside parties.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Vet the security/authenticity of any third party code/libraries used in your mobile application (e.g. making sure they come from a reliable source, will continue to be supported, contain no backdoors) and ensure that adequate internal approval is obtained to use the code/library.&lt;br /&gt;
&amp;lt;li&amp;gt; Track all third party frameworks/API’s used in the mobile application for security patches and perform upgrades as they are released.&lt;br /&gt;
&amp;lt;li&amp;gt; Pay particular attention to validating all data received from and sent to non-trusted third party apps (e.g. ad network software) before incorporating their use into an application.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Mobile Application Provisioning/Distribution/Testing ==&lt;br /&gt;
This is a set of controls to ensure that software is tested and released relatively free of vulnerabilities, that there are mechanisms to report new security issues if they are found, and also that the software has been designed to accept patches in order to address potential security issues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Design &amp;amp; distribute applications to allow updates for security patches.&lt;br /&gt;
&amp;lt;li&amp;gt; Provide &amp;amp; advertise feedback channels for users to report security problems with applications (such as a MobileAppSecurity@ntrs.com email address).&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure that older versions of applications which contain security issues and are no longer supported are removed from app-stores/app-repositories.&lt;br /&gt;
&amp;lt;li&amp;gt; Periodically test all backend services (Web Services/REST) which interact with a mobile application as well as the application itself for vulnerabilities using enterprise approved automatic or manual testing tools (including internal code reviews).&lt;br /&gt;
&amp;lt;li&amp;gt; Based on risk assessment of the application, have the application go through Security Assessment for a review of security vulnerabilities following the Team’s internal security testing of the application.&lt;br /&gt;
&amp;lt;li&amp;gt; Utilize the Enterprise provisioning process (e.g. IDM) to request and approve access for users on the mobile application.&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure the application is sufficiently obfuscated prior to release by conducting tests which attempt to reverse engineer the obfuscated application.&lt;br /&gt;
&amp;lt;li&amp;gt; Distribute applications via an app-store type of interface (when appropriate) as many app-stores monitor applications for insecure code which we may benefit from.&lt;br /&gt;
&amp;lt;li&amp;gt; Digitally sign applications using a code signing certificate obtained via a trusted Certificate Authority (CA).&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Top 10 Mobile Controls =&lt;br /&gt;
==OWASP/ENISA Collaboration==&lt;br /&gt;
&lt;br /&gt;
OWASP and the European Network and Information Security Agency (ENISA) collaborated to build a joint set of controls. ENISA has published the results of the collaborative effort as the &amp;quot;Smartphone Secure Development Guideline&amp;quot;: http://www.enisa.europa.eu/activities/application-security/smartphone-security-1/smartphone-secure-development-guidelines&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Mobile_Top_10_Controls.jpg|center|800px]]&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
This document has been jointly produced with ENISA as well as the following individuals:&lt;br /&gt;
*Vinay Bansal, Cisco Systems&lt;br /&gt;
*Nader Henein, Research in Motion&lt;br /&gt;
*Giles Hogben, ENISA&lt;br /&gt;
*Karsten Nohl, Srlabs&lt;br /&gt;
*Jack Mannino, nVisium Security&lt;br /&gt;
*Christian Papathanasiou, Royal Bank of Scotland&lt;br /&gt;
*Stefan Rueping, Infineon&lt;br /&gt;
*Beau Woods, Stratigos Security&lt;br /&gt;
&lt;br /&gt;
== Top 10 mobile controls and design principles==&lt;br /&gt;
&lt;br /&gt;
'''[[#section control_1|1. Identify and protect sensitive data on the mobile device]]'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Unsafe sensitive data storage, attacks on decommissioned phones unintentional disclosure: Mobile devices (being mobile) have a higher risk of loss or theft. Adequate protection should be built in to minimize the loss of sensitive data on the device.&lt;br /&gt;
&lt;br /&gt;
*1.1 In the design phase, classify data storage according to sensitivity and apply controls accordingly (e.g. passwords, personal data, location, error logs, etc.). Process, store and use data according to its classification. Validate the security of API calls applied to sensitive data.&lt;br /&gt;
*1.2 Store sensitive data on the server instead of the client-end device. This is based on the assumption that secure network connectivity is sufficiently available and that protection mechanisms available to server side storage are superior. The relative security of client vs server-side security also needs to be assessed on a case-by-case basis (see ENISA cloud risk assessment (3) or the OWASP Cloud top 10 (4) for decision support).&lt;br /&gt;
*1.3 When storing data on the device, use a file encryption API provided by the OS or other trusted source. Some platforms provide file encryption APIs which use a secret key protected by the device unlock code and deleteable on remote kill. If this is available, it should be used as it increases the security of the encryption without creating extra burden on the end-user. It also makes stored data safer in the case of loss or theft. However, it should be born in mind that even when protected by the device unlock key, if data is stored on the device, its security is dependent on the security of the device unlock code if remote deletion of the key is for any reason not possible.&lt;br /&gt;
*1.4 Do not store/cache sensitive data (including keys) unless they are encrypted and if possible stored in a tamper-proof area (see control 2).&lt;br /&gt;
*1.5 Consider restricting access to sensitive data based on contextual information such as location (e.g. wallet app not usable if GPS data shows phone is outside Europe, car key not usable unless within 100m of car etc...).&lt;br /&gt;
*1.6 Do not store historical GPS/tracking or other sensitive information on the device beyond the period required by the application (see controls 1.7, 1.8).&lt;br /&gt;
*1.7 Assume that shared storage is untrusted - information may easily leak in unexpected ways through any shared storage. In particular:&lt;br /&gt;
**Be aware of caches and temporary storage as a possible leakage channel, when shared with other apps.&lt;br /&gt;
**Be aware of public shared storage such as address book, media gallery and audio files as a possible leakage channel. For example storing images with location metadata in the media-gallery allows that information to be shared in unintended ways.&lt;br /&gt;
**Do not store temp/cached data in a world readable directory.&lt;br /&gt;
*1.8 For sensitive personal data, deletion should be scheduled according to a maximum retention period, (to prevent e.g. data remaining in caches indefinitely).&lt;br /&gt;
*1.9 There is currently no standard secure deletion procedure for flash memory (unless wiping the entire medium/card). Therefore data encryption and secure key management are especially important.&lt;br /&gt;
*1.10 Consider the security of the whole data lifecycle in writing your application (collection over the wire, temporary storage, caching, backup, deletion etc)&lt;br /&gt;
*1.11 Apply the principle of minimal disclosure - only collect and disclose data which is required for business use of the application. Identify in the design phase what data is needed, its sensitivity and whether it is appropriate to collect, store and use each data type.&lt;br /&gt;
*1.12 Use non-persistent identifiers which are not shared with other apps wherever possible - e.g. do not use the device ID number as an identifier unless there is a good reason to do so (use a randomly generated number – see 4.3). Apply the same data minimization principles to app sessions as to http sessions/cookies etc.&lt;br /&gt;
*1.13 Applications on managed devices should make use of remote wipe and kill switch APIs to remove sensitive information from the device in the event of theft or loss. (A kill-switch is the term used for an OS-level or purpose-built means of remotely removing applications and/or data).&lt;br /&gt;
*1.14 Application developers may want to incorporate an application-specific &amp;quot;data kill switch&amp;quot; into their products, to allow the per-app deletion of their application's sensitive data when needed (strong authentication is required to protect misuse of such a feature).&lt;br /&gt;
&lt;br /&gt;
'''2. Handle password credentials securely on the device'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Spyware, surveillance, financial malware. A user's credentials, if stolen, not only provide unauthorized access to the mobile backend service, they also potentially compromise many other services and accounts used by the user. The risk is increased by the widespread of reuse of passwords across different services.&lt;br /&gt;
&lt;br /&gt;
*2.1 Instead of passwords consider using longer term authorization tokens that can be securely stored on the device (as per the OAuth model). Encrypt the tokens in transit (using SSL/TLS). Tokens can be issued by the backend service after verifying&lt;br /&gt;
￼￼￼Smartphones secure development guidelines for app developers ￼the user credentials initially. The tokens should be time bounded to the specific service as well as revocable (if possible server side), thereby minimizing the damage in loss scenarios. Use the latest versions of the authorization standards (such as OAuth 2.0). Make sure that these tokens expire as frequently as practicable.&lt;br /&gt;
*2.2 In case passwords need to be stored on the device, leverage the encryption and key-store mechanisms provided by the mobile OS to securely store passwords, password equivalents and authorization tokens. Never store passwords in clear text. Do not store passwords or long term session IDs without appropriate hashing or encryption.&lt;br /&gt;
*2.3 Some devices and add-ons allow developers to use a Secure Element e.g. (5) (6) – sometimes via an SD card module - the number of devices offering this functionality is likely to increase. Developers should make use of such capabilities to store keys, credentials and other sensitive data. The use of such secure elements gives a higher level of assurance with the standard encrypted SD card certified at FIPS 140-2 Level 3. Using the SD cards as a second factor of authentication though possible, isn't recommended, however, as it becomes a pseudo-inseparable part of the device once inserted and secured.&lt;br /&gt;
*2.4 Provide the ability for the mobile user to change passwords on the device.&lt;br /&gt;
*2.5 Passwords and credentials should only be included as part of regular backups in encrypted or hashed form.&lt;br /&gt;
*2.6 Smartphones offer the possibility of using visual passwords which allow users to memorize passwords with higher entropy. These should only be used however, if sufficient entropy can be ensured. (7)&lt;br /&gt;
*2.7 Swipe-based visual passwords are vulnerable to smudge-attacks (using grease deposits on the touch screen to guess the password). Measures such as allowing repeated patterns should be introduced to foil smudge-attacks. (8)&lt;br /&gt;
*2.8 Check the entropy of all passwords, including visual ones (see 4.1 below).&lt;br /&gt;
*2.9 Ensure passwords and keys are not visible in cache or logs.&lt;br /&gt;
*2.10 Do not store any passwords or secrets in the application binary. Do not use a generic shared secret for integration with the backend (like password embedded in code). Mobile application binaries can be easily downloaded and reverse engineered.&lt;br /&gt;
&lt;br /&gt;
'''3. Ensure sensitive data is protected in transit'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Network spoofing attacks, surveillance. The majority of smartphones are capable of using multiple network mechanisms including Wi-Fi, provider network (3G, GSM, CDMA and others), Bluetooth etc. Sensitive data passing through insecure channels could be intercepted. (9) (10)&lt;br /&gt;
&lt;br /&gt;
*3.1 Assume that the provider network layer is not secure. Modern network layer attacks can decrypt provider network encryption, and there is no guarantee that the Wi-Fi network will be appropriately encrypted.&lt;br /&gt;
*3.2 Applications should enforce the use of an end-to-end secure channel (such as SSL/TLS) when sending sensitive information over the wire/air (e.g. using Strict Transport Security - STS (11)).This includes passing user credentials, or other authentication equivalents. This provides confidentiality and integrity protection.&lt;br /&gt;
*3.3 Use strong and well-known encryption algorithms (e.g. AES) and appropriate key lengths (check current recommendations for the algorithm you use e.g. (12) page 53).&lt;br /&gt;
*3.4 Use certificates signed by trusted CA providers. Be very cautious in allowing self- signed certificates. Do not disable or ignore SSL chain validation.&lt;br /&gt;
*3.5 For sensitive data, to reduce the risk of man-in-middle attacks (like SSL proxy, SSL strip), a secure connection should only be established after verifying the identity of the remote end-point (server). This can be achieved by ensuring that SSL is only established with end-points having the trusted certificates in the key chain.&lt;br /&gt;
*3.6 The user interface should make it as easy as possible for the user to find out if a certificate is valid.&lt;br /&gt;
*3.7 SMS, MMS or notifications should not be used to send sensitive data to or from mobile end-points.&lt;br /&gt;
&lt;br /&gt;
'''Reference:''' Google vulnerability of Client Login account credentials on unprotected wifi - [http://www.google.com/url?q=http%3A%2F%2Fwww.uni-ulm.de%2Fin%2Fmi%2Fmitarbeiter%2Fkoenings%2Fcatching-authtokens.html&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNGO-Yp1KHqO8USuL0zxL1Lpwq1Usw]&lt;br /&gt;
&lt;br /&gt;
'''4. Implement user authentication,authorization and session management correctly'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Unauthorized individuals may obtain access to sensitive data or systems by circumventing authentication systems (logins) or by reusing valid tokens or cookies. (13)&lt;br /&gt;
&lt;br /&gt;
*4.1 Require appropriate strength user authentication to the application. It may be useful to provide feedback on the strength of the password when it is being entered for the first time. The strength of the authentication mechanism used depends on the sensitivity of the data being processed by the application and its access to valuable resources (e.g. costing money).&lt;br /&gt;
*4.2 It is important to ensure that the session management is handled correctly after the initial authentication, using appropriate secure protocols. For example, require authentication credentials or tokens to be passed with any subsequent request (especially those granting privileged access or modification).&lt;br /&gt;
*4.3 Use unpredictable session identifiers with high entropy. Note that random number generators generally produce random but predictable output for a given seed (i.e. the same sequence of random numbers is produced for each seed). Therefore it is important to provide an unpredictable seed for the random number generator. The standard method of using the date and time is not secure. It can be improved, for example using a combination of the date and time, the phone temperature sensor and the current x,y and z magnetic fields. In using and combining these values, well-tested algorithms which maximise entropy should be chosen (e.g. repeated application of SHA1 may be used to combine random variables while maintaining maximum entropy – assuming a constant maximum seed length).&lt;br /&gt;
*4.4 Use context to add security to authentication - e.g. IP location, etc...&lt;br /&gt;
*4.5 Where possible, consider using additional authentication factors for applications giving access to sensitive data or interfaces where possible - e.g. voice, fingerprint (if available), who-you-know, behavioural etc.&lt;br /&gt;
*4.6 Use authentication that ties back to the end user identity (rather than the device identity).&lt;br /&gt;
&lt;br /&gt;
'''5. Keep the backend APIs (services) and the platform (server) secure''' &lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Attacks on backend systems and loss of data via cloud storage. The majority of mobile applications interact with the backend APIs using REST/Web Services or proprietary protocols. Insecure implementation of backend APIs or services, and not keeping the back-end platform hardened/patched will allow attackers to compromise data on the mobile device when transferred to the backend, or to attack the backend through the mobile application. (14)&lt;br /&gt;
&lt;br /&gt;
*5.1 Carry out a specific check of your code for sensitive data unintentionally transferred, any data transferred between the mobile device and web-server back- ends and other external interfaces - (e.g. is location or other information included within file metadata).&lt;br /&gt;
*5.2 All backend services (Web Services/REST) for mobile apps should be tested for vulnerabilities periodically, e.g. using static code analyser tools and fuzzing tools for testing and finding security flaws.&lt;br /&gt;
*5.3 Ensure that the backend platform (server) is running with a hardened configuration with the latest security patches applied to the OS, Web Server and other application components.&lt;br /&gt;
*5.4 Ensure adequate logs are retained on the backend in order to detect and respond to incidents and perform forensics (within the limits of data protection law).&lt;br /&gt;
*5.5 Employ rate limiting and throttling on a per-user/IP basis (if user identification is available) to reduce the risk from DDoS attack.&lt;br /&gt;
*5.6 Test for DoS vulnerabilities where the server may become overwhelmed by certain resource intensive application calls.&lt;br /&gt;
*5.7 Web Services, REST and APIs can have similar vulnerabilities to web applications:&lt;br /&gt;
**Perform abuse case testing, in addition to use case testing&lt;br /&gt;
**Perform testing of the backend Web Service, REST or API to determine vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''6. Secure data integration with third party services and applications'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Data leakage. Users may install applications that may be malicious and can transmit personal data (or other sensitive stored data) for malicious purposes.&lt;br /&gt;
&lt;br /&gt;
*6.1 Vet the security/authenticity of any third party code/libraries used in your mobile application (e.g. making sure they come from a reliable source, with maintenance supported, no backend Trojans)&lt;br /&gt;
*6.2 Track all third party frameworks/APIs used in the mobile application for security patches. A corresponding security update must be done for the mobile applications using these third party APIs/frameworks.&lt;br /&gt;
*6.3 Pay particular attention to validating all data received from and sent to non-trusted third party apps (e.g. ad network software) before processing within the application.&lt;br /&gt;
&lt;br /&gt;
'''7. Pay specific attention to the collection and storage of consent for the collection and use of the user’s data'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Unintentional disclosure of personal or private information, illegal data processing. In the European Union, it is mandatory to obtain user consent for the collection of personally identifiable information (PII). (15) (16)&lt;br /&gt;
&lt;br /&gt;
*7.1 Create a privacy policy covering the usage of personal data and make it available to the user especially when making consent choices.&lt;br /&gt;
*7.2 Consent may be collected in three main ways:&lt;br /&gt;
**At install time&lt;br /&gt;
**At run-time when data is sent&lt;br /&gt;
**Via “opt-out” mechanisms where a default setting is implemented and the user has to turn it off.&lt;br /&gt;
*7.3 Check whether your application is collecting PII - it may not always be obvious - for example do you use persistent unique identifiers linked to central data stores containing personal information?&lt;br /&gt;
*7.4 Audit communication mechanisms to check for unintended leaks (e.g. image metadata).&lt;br /&gt;
*7.5 Keep a record of consent to the transfer of PII. This record should be available to the user (consider also the value of keeping server-side records attached to any user data stored). Such records themselves should minimise the amount of personal data they store (e.g. using hashing).&lt;br /&gt;
*7.6 Check whether your consent collection mechanism overlaps or conflicts (e.g. in the data handling practices stated) with any other consent collection within the same stack (e.g. APP-native + webkit HTML) and resolve any conflicts.&lt;br /&gt;
&lt;br /&gt;
'''8. Implement controls to prevent unauthorized access to paid-for resources (wallet, SMS, phone calls etc.)'''&lt;br /&gt;
'''Risks:''' Smartphone apps give programmatic (automatic) access to premium rate phone calls, SMS, roaming data, NFC payments, etc. Apps with privileged access to such API’s should take particular care to prevent abuse, considering the financial impact of vulnerabilities that giveattackers access to the user’s financial resources.&lt;br /&gt;
&lt;br /&gt;
*8.1 Maintain logs of access to paid-for resources in a non-repudiable format (e.g. a signed receipt sent to a trusted server backend – with user consent) and make them available to the end-user for monitoring. Logs should be protected from unauthorised access.&lt;br /&gt;
*8.2 Check for anomalous usage patterns in paid-for resource usage and trigger re- authentication. E.g. when significant change in location occurs, user-language changes etc.&lt;br /&gt;
*8.3 Consider using a white-list model by default for paid-for resource addressing - e.g. address book only unless specifically authorised for phone calls.&lt;br /&gt;
*8.4 Authenticate all API calls to paid-for resources (e.g. using an app developer certificate).&lt;br /&gt;
*8.5 Ensure that wallet API callbacks do not pass cleartext account/pricing/ billing/item information.&lt;br /&gt;
*8.6 Warn user and obtain consent for any cost implications for app behaviour.&lt;br /&gt;
*8.7 Implement best practices such as fast dormancy (a 3GPP specification), caching, etc. to minimize signalling load on base stations.&lt;br /&gt;
&lt;br /&gt;
'''9. Ensure secure distribution/provisioning of mobile applications'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Use of secure distribution practices is important in mitigating all risks described in the OWASP Mobile Top 10 Risks and ENISA top 10 risks.&lt;br /&gt;
*9.1 Applications must be designed and provisioned to allow updates for security patches, taking into account the requirements for approval by app-stores and the extra delay this may imply.&lt;br /&gt;
*9.2 Most app-stores monitor apps for insecure code and are able to remotely remove apps at short notice in case of an incident. Distributing apps through official app- stores therefore provides a safety-net in case of serious vulnerabilities in your app.&lt;br /&gt;
*9.3Provide feedback channels for users to report security problems with apps – e.g. a security@ email address.&lt;br /&gt;
&lt;br /&gt;
'''10. Carefully check any runtime interpretation of code for errors '''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Runtime interpretation of code may give an opportunity for untrusted parties to provide unverified input which is interpreted as code. For example, extra levels in a game, scripts, interpreted SMS headers. This gives an opportunity for malware to circumvent walled garden controls provided by app-stores. It can lead to injection attacks leading to Data leakage, surveillance, spyware, and diallerware.&lt;br /&gt;
&lt;br /&gt;
Note that it is not always obvious that your code contains an interpreter. Look for any capabilities accessible via user-input data and use of third party API’s which may interpret user-input - e.g. JavaScript interpreters.&lt;br /&gt;
&lt;br /&gt;
*10.1 Minimize runtime interpretation and capabilities offered to runtime interpreters: run interpreters at minimal privilege levels.&lt;br /&gt;
*10.2 Define comprehensive escape syntax as appropriate.&lt;br /&gt;
*10.3 Fuzz test interpreters.&lt;br /&gt;
*10.4 Sandbox interpreters.&lt;br /&gt;
&lt;br /&gt;
''Appendix A- Relevant General Coding Best Practices'''&lt;br /&gt;
&lt;br /&gt;
Some general coding best practices are particularly relevant to mobile coding. We have listed some of the most important tips here:&lt;br /&gt;
**Perform abuse case testing, in addition to use case testing.&lt;br /&gt;
**Validate all input.&lt;br /&gt;
**Minimise lines and complexity of code. A useful metric is cyclomatic complexity (17).&lt;br /&gt;
**Use safe languages (e.g. from buffer-overflow).&lt;br /&gt;
**Implement a security report handling point (address) security@example.com&lt;br /&gt;
**Use static and binary code analysers and fuzz-testers to find security flaws.&lt;br /&gt;
**Use safe string functions, avoid buffer and integer overflow.&lt;br /&gt;
**Run apps with the minimum privilege required for the application on the operating&lt;br /&gt;
system. Be aware of privileges granted by default by APIs and disable them.&lt;br /&gt;
**Don't authorize code/app to execute with root/system administrator privilege&lt;br /&gt;
**Always perform testing as a standard as well as a privileged user&lt;br /&gt;
**Avoid opening application-specific server sockets (listener ports) on the client device.&lt;br /&gt;
Use the communication mechanisms provided by the OS.&lt;br /&gt;
**Remove all test code before releasing the application&lt;br /&gt;
**Ensure logging is done appropriately but do not record excessive logs, especially those&lt;br /&gt;
including sensitive user information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Appendix B- Enterprise Guidelines''&lt;br /&gt;
**If a business-sensitive application needs to be provisioned on a device, applications should enforce of a higher security posture on the device (such as PIN, remote management/wipe, app monitoring)&lt;br /&gt;
**Device certificates can be used for stronger device authentication.'&lt;br /&gt;
&lt;br /&gt;
''References&amp;quot;&lt;br /&gt;
*1.ENISA. Top Ten Smartphone Risks . [Online] http://www.enisa.europa.eu/act/application-security/smartphone-security-1/top-ten-risks.&lt;br /&gt;
*2. OWASP. Top 10 mobile risks. [Online] https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks.&lt;br /&gt;
*3. Cloud Computing: Benefits, Risks and Recommendations for information security. [Online] 2009. http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment.&lt;br /&gt;
*4. OWASP Cloud Top 10. [Online] https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project.&lt;br /&gt;
*5. Blackberry developers documents. [Online] http://www.blackberry.com/developers/docs/7.0.0api/net/rim/device/api/io/nfc/se/SecureElement.h tml,.&lt;br /&gt;
*6. Google Seek For Android. [Online] http://code.google.com/p/seek-for-android/.&lt;br /&gt;
*7. Visualizing Keyboard Pattern Passwords. [Online] cs.wheatoncollege.edu/~mgousie/comp401/amos.pdf.&lt;br /&gt;
*8. Smudge Attacks on Smartphone Touch Screens. Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. s.l. : Department of Computer and Information Science – University of Pennsylvania.&lt;br /&gt;
*9. Google vulnerability of Client Login account credentials on unprotected . [Online] http://www.uni- ulm.de/in/mi/mitarbeiter/koenings/catching-authtokens.html.&lt;br /&gt;
*10. SSLSNIFF. [Online] http://blog.thoughtcrime.org/sslsniff-anniversary-edition. 11. [Online] http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-02.&lt;br /&gt;
￼￼￼￼Smartphones secure development guidelines for app developers&lt;br /&gt;
*11. [Online] http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-02.&lt;br /&gt;
￼*12. NIST Computer Security. [Online] http://csrc.nist.gov/publications/nistpubs/800-57/sp800- 57_PART3_key-management_Dec2009.pdf.&lt;br /&gt;
*13. Google's ClientLogin implementation . [Online] http://www.uni- ulm.de/in/mi/mitarbeiter/koenings/catching-authtokens.html.&lt;br /&gt;
*14. [Online] https://www.owasp.org/index.php/Web_Services.&lt;br /&gt;
*15. EU Data Protection Directive 95/46/EC. [Online] http://eur- lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML.&lt;br /&gt;
*16. [Online] http://democrats.energycommerce.house.gov/sites/default/files/image_uploads/Testimony_05.04.11 _Spafford.pdf.&lt;br /&gt;
*17. [Online] http://www.aivosto.com/project/help/pm-complexity.html.&lt;br /&gt;
*18. [Online] http://code.google.com/apis/accounts/docs/AuthForInstalledApps.html.&lt;br /&gt;
**19. Google Wallet Security. [Online] http://www.google.com/wallet/how-it-works-security.htm.&lt;br /&gt;
&lt;br /&gt;
= OWASP Mobile Threat Model Project =&lt;br /&gt;
==Mobile Application Threat Model - Beta Release==&lt;br /&gt;
&lt;br /&gt;
This is the first release (February 2013) of the Mobile Application Threat Model developed by the initial project team (listed at the end of this release).  Development began mid-2011 and is being released in beta form for public comment and input.  It is by no means complete and some sections will need more contributions, details and also real world case studies.  It's the hope of the project team that others in the community can help contribute to this project to further enhance and improve this threat model.&lt;br /&gt;
&lt;br /&gt;
===Mobile Threat Model Introduction Statement===&lt;br /&gt;
Threat modeling is a systematic process that begins with a clear understanding of the system. It is necessary to define the following areas to understand possible threats to the application:&lt;br /&gt;
* '''Mobile Application Architecture''' - This area describes how the application is designed from device specific features used by the application, wireless transmission protocols, data transmission mediums, interaction with hardware components and other applications.&lt;br /&gt;
* '''Mobile Data''' - What data does the application store and process? What is the business purpose of this data and what are the data workflows?&lt;br /&gt;
* '''Threat Agent Identification''' - What are the threats to the mobile application and who are the threat agents.  This area also outlines the process for defining what threats apply to the mobile application.&lt;br /&gt;
* '''Methods of Attack''' - What are the most common attacks utilized by threat agents.  This area defines these attacks so that controls can be developed to mitigate attacks.&lt;br /&gt;
* '''Controls''' - What are the controls to prevent attacks.  This is the last area to be defined only after previous areas have been completed by the development team.&lt;br /&gt;
&lt;br /&gt;
===Target Audience for the Mobile Threat Model===&lt;br /&gt;
This model is to be used by mobile application developers and software architects as part of the “threat modeling” phase of a typical SDLC process.  The model can also be used by Information Security Professionals that need to determine what typical mobile application threats are and provide a methodology for conducting basic threat modeling.&lt;br /&gt;
&lt;br /&gt;
===How to Use the Mobile Threat Model===&lt;br /&gt;
This threat model is designed as an outline or checklist of items that need to be documented, reviewed and discussed when developing a mobile application.  Every organization that develops mobile applications will have different requirements as well as threats.  This model was designed to be as organizational and industry agnostic as possible so that any mobile application development team can use this as a guide for conducting threat modeling for their specific application. Real world case studies as examples will be integrated to this threat model in the near future.&lt;br /&gt;
&lt;br /&gt;
==Mobile Application Architecture==&lt;br /&gt;
&lt;br /&gt;
The mobile application architecture should, at the very least, describe device specific features used by the application, wireless transmission protocols, data transmission medium, interaction with hardware components and other applications. Applications can be mapped to this architecture as a preliminary attack surface assessment.&lt;br /&gt;
&lt;br /&gt;
===Architecture Considerations===&lt;br /&gt;
&lt;br /&gt;
Although mobile applications vary in function, they can be described using a generalized model as follows:&lt;br /&gt;
&lt;br /&gt;
Wireless interfaces&lt;br /&gt;
&lt;br /&gt;
Transmission Type&lt;br /&gt;
&lt;br /&gt;
Hardware Interaction&lt;br /&gt;
&lt;br /&gt;
Interaction with on device applications/services&lt;br /&gt;
&lt;br /&gt;
Interaction with off device applications/services&lt;br /&gt;
&lt;br /&gt;
Encryption Protocols&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* What is the design of the architecture (network infrastructure, web services, trust boundaries, third-party APIs, etc)&lt;br /&gt;
** Carrier&lt;br /&gt;
*** Data&lt;br /&gt;
*** SMS&lt;br /&gt;
*** Voice&lt;br /&gt;
** Endpoints&lt;br /&gt;
*** Web Services&lt;br /&gt;
**** RESTful or SOAP based&lt;br /&gt;
**** Third Party (Example: Amazon)&lt;br /&gt;
*** Websites&lt;br /&gt;
**** Does the app utilize or integrate the “mobile web” version of an existing web site?&lt;br /&gt;
*** App Stores&lt;br /&gt;
**** Google Play&lt;br /&gt;
**** Apple App Store&lt;br /&gt;
**** Windows Mobile&lt;br /&gt;
**** BlackBerry App Store&lt;br /&gt;
*** Cloud Storage&lt;br /&gt;
**** Amazon/Azure&lt;br /&gt;
*** Corporate Networks (via VPN, ssh, etc.)&lt;br /&gt;
** Wireless interfaces&lt;br /&gt;
*** 802.11&lt;br /&gt;
*** NFC&lt;br /&gt;
*** Bluetooth&lt;br /&gt;
*** RFID&lt;br /&gt;
** Device&lt;br /&gt;
*** App Layer&lt;br /&gt;
*** Runtime Environment (VM, framework dependencies, etc)&lt;br /&gt;
*** OS Platform&lt;br /&gt;
** Apple iOS&lt;br /&gt;
** Android&lt;br /&gt;
** Windows Mobile&lt;br /&gt;
** BlackBerry&lt;br /&gt;
*** Baseband&lt;br /&gt;
* Common hardware components&lt;br /&gt;
** GPS&lt;br /&gt;
** Sensors (accelerometer)&lt;br /&gt;
** Cellular Radios (GSM/CDMA/LTE)&lt;br /&gt;
** Flash Memory&lt;br /&gt;
** Removable Storage (i.e.- SD)&lt;br /&gt;
** USB ports&lt;br /&gt;
** Wireless Interfaces&lt;br /&gt;
*** 802.11&lt;br /&gt;
*** Bluetooth&lt;br /&gt;
*** NFC&lt;br /&gt;
*** RFID&lt;br /&gt;
** Touch Screen&lt;br /&gt;
** Hardware Keyboard&lt;br /&gt;
** Microphone&lt;br /&gt;
** Camera&lt;br /&gt;
* Authentication&lt;br /&gt;
** Method&lt;br /&gt;
*** Knowledge based&lt;br /&gt;
*** Token based&lt;br /&gt;
*** Biometrics&lt;br /&gt;
** Input Type&lt;br /&gt;
*** Keyboard&lt;br /&gt;
*** Touch screen&lt;br /&gt;
*** Hardware peripheral&lt;br /&gt;
** Decision Process&lt;br /&gt;
*** Local (on device)&lt;br /&gt;
*** Remote (off device)&lt;br /&gt;
* Define app architecture relative to OS stack + security model&lt;br /&gt;
** What should or shouldn't the app do?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mobile Data==&lt;br /&gt;
This section defines what purpose does the app serve from a business perspective and what data the app store, transmit and receive.  It’s also important to review data flow diagrams to determine exactly how data is handled and managed by the application.&lt;br /&gt;
&lt;br /&gt;
* What is the business function of the app?&lt;br /&gt;
* What data does the application store/process (provide data flow diagram)&lt;br /&gt;
** This diagram should outline network, device file system and application data flows&lt;br /&gt;
** How is data transmitted between third party API’s and app(s)&lt;br /&gt;
** Are there different data handling requirements between different mobile platforms? (iOS/Android/Blackberry/Windows/J2ME) &lt;br /&gt;
** Does the app use cloud storage APIs (Dropbox, Google Drive, iCloud, Lookout) for device data backups&lt;br /&gt;
** Does personal data intermingle with corporate data?&lt;br /&gt;
** Is there specific business logic built into the app to process data?&lt;br /&gt;
* What does the data give you (or an attacker) access to&lt;br /&gt;
** Data at Rest&lt;br /&gt;
** Example: Do stored credentials provide authentication?&lt;br /&gt;
** Data in Transit&lt;br /&gt;
** Example: Do stored keys allow you to break crypto functions (data integrity)?&lt;br /&gt;
* Third party data, is it being stored/transmitted?&lt;br /&gt;
** What is the privacy requirements of user data&lt;br /&gt;
** Example: UDID or Geolocation on iOS transmitted to 3rd party&lt;br /&gt;
** Are there regulatory requirements to meet specific to user privacy?&lt;br /&gt;
* How does other data on the device affect the app (sandboxing restrictions enforced?)&lt;br /&gt;
** Example: Authentication credentials shared between apps&lt;br /&gt;
* What is the impact of Jailbroken/Rooted vs Non Jailbroken/Rooted device and how this affects app data (can also relate to threat agent identification)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Threat Agent Identification==&lt;br /&gt;
What are the threats to the mobile application and who are the threat agents.  This area also outlines the process for defining what threats apply to the mobile application.&lt;br /&gt;
&lt;br /&gt;
===Identifying Threat Agents===&lt;br /&gt;
&lt;br /&gt;
The process of identifying a threat agent is very simple and have been mentioned in the below steps:&lt;br /&gt;
&lt;br /&gt;
'''S1''': Take the list of all sensitive data (or information to protect) listed down from Section 2 – Mobile Data&lt;br /&gt;
&lt;br /&gt;
'''S2:''' Make a list of all the ways to access this data&lt;br /&gt;
&lt;br /&gt;
'''S3:''' The medium used to access the same listed in S3 is the Threat Agent to be identified&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Threat Agent Identification Example===&lt;br /&gt;
&lt;br /&gt;
Let us understand it in a better way using an example of a Financial Application (specifically a Banking Application). Following the process as mentioned above:&lt;br /&gt;
&lt;br /&gt;
'''S1:''' Sensitive data present in the application has been listed as: Beneficiary Details stored in some form in the Phone Application Memory and User Credentials used for authentication transmitted to the server.&lt;br /&gt;
'''S2:''' List the various ways of accessing information:&lt;br /&gt;
&lt;br /&gt;
# Beneficiary Details:&lt;br /&gt;
## A device user aiming to browse through the memory card / phone memory&lt;br /&gt;
## An adversary using a jail broken phone; starts reading the content through putty/WinSCP via SSH&lt;br /&gt;
## An adversary while sniffing the WiFi, traffic sniffs the content travelling through the network&lt;br /&gt;
## Another malicious application while reading the phone memory contents, stumbles upon this data as the device is Jailbroken&lt;br /&gt;
## Another application which is sending data through SMS sends this data.&lt;br /&gt;
## A Web Application executing a script on the browser tries to get steal the phone memory and send it to its server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''S3:''' From the above points, we list down the medium used:&lt;br /&gt;
&lt;br /&gt;
# Any user who has the device (Stolen device/ friend / etc)&lt;br /&gt;
## Any malicious application (installed / Web based script)&lt;br /&gt;
## An adversary sniffing the Wifi.&lt;br /&gt;
## etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
From the above example you should have a clear picture on how to identify Threat Agents. Below is list of threat agents, which were identified while analyzing various commonly used applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Listing of Threat Agents - By Category===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Human Interaction====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Stolen Device User:''' A user who obtained unauthorized access to the device aiming to get hold of the memory related sensitive information belonging to the owner of the device.&lt;br /&gt;
&lt;br /&gt;
* '''Owner of the Device:''' A user who unwillingly has installed a malicious application on his phone which gains access to the device application memory.&lt;br /&gt;
&lt;br /&gt;
* '''Common WiFi Network User­:''' This agent is aimed at any adversary intentionally or unintentionally sniffing the WiFi network used by a victim. This agent stumbles upon all the data transmitted by the victim device and may re-use it to launch further attacks.&lt;br /&gt;
&lt;br /&gt;
* '''Malicious Developer:''' A human user who has the intent of writing an application which not only provides a commonly known function like gaming / calculator / utility in the foreground but steal as much information from your device as possible in real-time and transmits it to the malicious user. This agent can also be looked at an angle from which he codes an app to perform DOS by using up all the device resources.&lt;br /&gt;
&lt;br /&gt;
* '''Organization Internal Employees:''' Any user who is part of the organization (may be a programmer / admin / user / etc). Anyone who has privileges to perform an action on the application.&lt;br /&gt;
&lt;br /&gt;
* '''App Store Approvers/Reviewers:''' Any app store which fails to review potentially dangerous code or malicious application which executes on a user’s device and performs suspicious/ malicious activities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Automated Programs====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Malware on the device''': Any program / mobile application which performs suspicious activity. It can be an application, which is copying real time data from the user’s device and transmitting it to any server. This type of program executes parallel to all the processes running in the background and stays alive performing malicious activity all the time. E.g. Olympics App which stole text messages and browsing history:[http://venturebeat.com/2012/08/06/olympics-android-app/  ][http://venturebeat.com/2012/08/06/olympics-android-app/ http://venturebeat.com/2012/08/06/olympics-android-app/]&lt;br /&gt;
&lt;br /&gt;
* '''Scripts executing at the browser with HTML5''': Any script code written in a language similar to JavaScript having capability of accessing the device level content falls under this type of agent section. A script executing at the browser reading and transmitting browser memory data / complete device level data.&lt;br /&gt;
&lt;br /&gt;
* '''Malicious SMS''': An incoming SMS redirected to trigger any kind of suspicious activity on the mobile device. There are multiple services which keep running in the background. Each of these services have listeners which might be active to listen for the content of an incoming SMS. An SMS message may be a sort of trigger for the service to perform some suspicious activity.&lt;br /&gt;
&lt;br /&gt;
* '''Malicious App:''' Failure to detect malicious or vulnerable code and the likelihood of a compromise or attack against the app store itself, potentially turning legitimate code into hostile things including updates and new downloaded apps.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below is a diagram illustrated to understand the Threat Agents and Threats in a visual manner:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[image:Mobile-app-threat-agents.png|582x527px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Figure 1 : Pictorial Representation of Threats and Agents'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Methods of Attack==&lt;br /&gt;
In this section, we will observe different methods an attacker can use to reach the data. This data can be sensitive information to the device or something sensitive to the app itself.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attack’s Flowchart===&lt;br /&gt;
&lt;br /&gt;
Destruction of the asset is normally classified as attack. Attack can be further categorized as a planned attack or an unplanned one. Unintended attacks are normally caused due to some form of accidental actions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[image:Mobile-app-attack-workflow.png]]&lt;br /&gt;
&lt;br /&gt;
'''Figure 2: Attack Workflow'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attack Scenario===&lt;br /&gt;
&lt;br /&gt;
'''“Method aimed to read the local application memory”'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The above mentioned attack methodology is the one in which the data which is targeted is application specific memory and the method used is memory based analysis. The attacker steals any sensitive data like passwords, userid, user account information which is stored in the application memory by reading the device memory.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We have listed down other methods below which can be mapped with the second section in a similar fashion:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The classification of attacks based on the way data is handled:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Carrier Based Methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Man in the middle (MiTM) attacks which can steal data packets including SMS or voice packets&lt;br /&gt;
# Hijack wireless transmission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Endpoints based methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Inject code to tamper with web application or web services&lt;br /&gt;
# Many of the OWASP Mobile Top 10/OWASP Web Application Top 10&lt;br /&gt;
# Publishing Malwares in the app store&lt;br /&gt;
# Stealing user sensitive phone contents using Malwares&lt;br /&gt;
# Cloud storage&lt;br /&gt;
# Targeting malicious corporate network. (e.g. VPN Keys, etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Wireless interfaces based methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Stealing data when its in-transit using wireless channel like 802.11, NFC based data exchange or Bluetooth based data exchange. Application Level Attacks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* OS and application level methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Exploit the Input validation on client-side by by-passing the checks&lt;br /&gt;
# An adversary steals sensitive data by reading SD Card based stored content&lt;br /&gt;
# Exploiting vulnerabilities within an app or runtime environment. (VM, framework dependencies, etc)&lt;br /&gt;
# An adversary exploits OS level functionalities steal data from device or server&lt;br /&gt;
# Rooting or Jailbreaking the phone to access sensitive data from memory&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Miscellaneous Methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Method used to exploit and steal GPS based signals which falls in users personal information&lt;br /&gt;
# Method used to exploit the flash memory&lt;br /&gt;
# Method used to perform “tap jacking” based attacks.&lt;br /&gt;
# Method used to steal keyboard cache or logs.&lt;br /&gt;
# Method used to steal microphone recordings of a user&lt;br /&gt;
# Method used to exploit and misuse the camera functionality.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Controls==&lt;br /&gt;
What are the controls to prevent attacks.  This is the last area to be defined only after previous areas have been completed by the development team.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* What are the controls to prevent an attack?&lt;br /&gt;
** Defined by platform&lt;br /&gt;
*** Apple iOS&lt;br /&gt;
*** Android&lt;br /&gt;
*** Windows Mobile&lt;br /&gt;
*** BlackBerry&lt;br /&gt;
* What are the controls to detect an attack?&lt;br /&gt;
** Defined by platform&lt;br /&gt;
*** Apple iOS&lt;br /&gt;
*** Android&lt;br /&gt;
*** Windows Mobile&lt;br /&gt;
*** BlackBerry&lt;br /&gt;
* What are the controls to mitigate/minimize impact of an attack?&lt;br /&gt;
** Defined by platform&lt;br /&gt;
*** Apple iOS&lt;br /&gt;
*** Android&lt;br /&gt;
*** Windows Mobile&lt;br /&gt;
*** BlackBerry&lt;br /&gt;
* What are the controls to protect users private information (privacy controls)&lt;br /&gt;
** Example: prompts for access to address book/geolocation&lt;br /&gt;
* Create a mapping of controls to each specific method of attack (defined in Section 4 – Methods of Attack)&lt;br /&gt;
** Create level of assurance framework based on controls implemented. This would be subjective to a certain point, but it would be useful in guiding organizations who want to achieve a certain level of risk management based on the threats and vulnerabilities&lt;br /&gt;
* Case studies, control examples&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Contributors==&lt;br /&gt;
Special thanks to the following team members who contributed to the initial release of the threat model:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tom Eston (Project Lead)&lt;br /&gt;
&lt;br /&gt;
Jack Mannino&lt;br /&gt;
&lt;br /&gt;
Sreenarayan Ashokkumar&lt;br /&gt;
&lt;br /&gt;
Swapnil Deshmukh&lt;br /&gt;
&lt;br /&gt;
Brandon Knight&lt;br /&gt;
&lt;br /&gt;
Steve Jensen&lt;br /&gt;
&lt;br /&gt;
Shimon Modi&lt;br /&gt;
&lt;br /&gt;
Rodrigo Marcos&lt;br /&gt;
&lt;br /&gt;
Brandon Clark&lt;br /&gt;
&lt;br /&gt;
Yvesmarie Quemener&lt;br /&gt;
&lt;br /&gt;
Yashraj Paralikar&lt;br /&gt;
&lt;br /&gt;
Ritesh Taank&lt;br /&gt;
&lt;br /&gt;
= Mobile Device Management(MDM) =&lt;br /&gt;
==What is MDM Technology?==&lt;br /&gt;
MDM is a way to ensure employees stay productive and do not breach corporate policies. Many organizations control activities of their employees using MDM products/services. &lt;br /&gt;
MDM primarily deals with corporate data segregation, securing emails, securing corporate documents on device, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories.&lt;br /&gt;
There are two major types of MDM implementations:&lt;br /&gt;
     1.	On-premise Solution&lt;br /&gt;
     2.	Cloud-based Solution&lt;br /&gt;
For the organizations where security is highest concern, it preferred to have On-premise solution. This is always suggested for mission critical secure applications.&lt;br /&gt;
Cloud-based solution provides ease of access for the administrator.&lt;br /&gt;
&lt;br /&gt;
==How does it provide Security?==&lt;br /&gt;
All MDM products are built with an idea of Containerization. The MDM Container is secured using latest crypto techniques (AES-256 or more preferred). All the corporate data like email, documents, enterprise application are encrypted and processed inside the container. This ensures that corporate data is separated from user’s personal data on the device.&lt;br /&gt;
Additionally, encryption for entire device and/or SD Card can also be enforced depending on MDM product capability.&lt;br /&gt;
&lt;br /&gt;
'''Secure Email:'''&lt;br /&gt;
MDM products allow organization to integrate their existing email setup to be easily integrated with MDM environment. Almost all MDM products support easy integration with Exchange Server (2003/2007/2010), Office365, Lotus Notes, Blackberry Enterprise Server (BES) and others. This provided flexibility of configuring Email-over-air.&lt;br /&gt;
&lt;br /&gt;
'''Secure Docs:'''&lt;br /&gt;
It is frequently seen that, employees copy attachments downloaded from corporate email to their personal devices and then misuse it. MDM can easily restrict/disable clipboard usage in/out of Secure Container; forwarding attachments to external domains can be restricted, downloading/saving attachments on SD Card. This ensures corporate data is not left insecure.&lt;br /&gt;
&lt;br /&gt;
'''Secure Browser:'''&lt;br /&gt;
Using secure browser can avoid many potential security risks. Every MDM solution comes with built-in custom browser. Administrator can disable native browsers to force user to use Secure Browser, which is also inside the MDM container. URL filtering can be enforced to add additional productivity measure.&lt;br /&gt;
&lt;br /&gt;
'''Secure App Catalogue:'''&lt;br /&gt;
Organization can distribute, manage, and upgrade applications on employee’s device using App Catalogue. It allows applications to be pushed on user device directly from the App Store or push an enterprise developed private application through the App Catalogue. This provides an option for the organization to deploy devices in Kiosk Mode or Lock-Down Mode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Additional MDM Features:==&lt;br /&gt;
There are plenty of other features depending on which MDM product being chosen. Below is the list for it:&lt;br /&gt;
&lt;br /&gt;
•	'''Policy Enforcing''': There are multiple types of policies which can be enforced on MDM users.&lt;br /&gt;
     1.	Persona Policy: According to corporate environment, highly customizable&lt;br /&gt;
     2.	Device Platform specific: policies for advanced management of Android, IOS, Windows and Blackberry devices.&lt;br /&gt;
     3.	Compliance Policies/Rules&lt;br /&gt;
•	VPN configuration&lt;br /&gt;
•	Application Catalogue&lt;br /&gt;
&lt;br /&gt;
•	Pre-defined Wi-Fi and Hotspot settings&lt;br /&gt;
&lt;br /&gt;
•	Jail-break/Root detection&lt;br /&gt;
&lt;br /&gt;
•	Remote Wipe of corporate data&lt;br /&gt;
&lt;br /&gt;
•	Remote Wipe of entire device&lt;br /&gt;
&lt;br /&gt;
•	Device remote locking&lt;br /&gt;
&lt;br /&gt;
•	Remote messaging/buzz&lt;br /&gt;
&lt;br /&gt;
•	Disabling native apps on device&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==More light on MDM-MAM-MEM:==&lt;br /&gt;
'''Mobile Device Management (MDM)''' is like adding an extra layer of security and ensuring a way to monitor device related activities. MDM provides device platform specific features like device encryption, platform specific policies, SD Card encryption. Geo-location tracking, connectivity profiles (VPN, Wi-Fi, Bluetooth) and plenty other features are part of MDM Suite.&lt;br /&gt;
&lt;br /&gt;
'''Mobile Application Management (MAM)''' is done by application wrapping i.e. injection arbitrary encryption code in the mobile application source. This is necessary for commercial applications or applications being developed in-house for Enterprise use. Additionally, white-listing/black-listing of application can be done. Features like Application Catalogue allow admin to push applications remotely to the devices for instant install, push remote updates and also remote removal of apps.&lt;br /&gt;
&lt;br /&gt;
'''Mobile Email Management (MEM)''' ensures your corporate emails are containerized using advanced proprietary/free encryption algorithms. MEM ensures all emails remain inside the secure container, so that attackers get encrypted data even if they try to compromise the device data using USB cable on a system. Heavy restrictions on clipboard, attachments and trusted domains can be enforced. Nothing can move in-out of the secure container as clipboard is disabled. Even the attachments are downloaded and saved inside the secure container. To view the attachments there is secure document reader as well as secure document editor available in MDM solutions. Adding trusted domains will ensure that data from corporate email is not leaked to malicious/suspicious domains.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Top MDM Vendors in Market:'''&lt;br /&gt;
&lt;br /&gt;
•	AirWatch by VMware&lt;br /&gt;
&lt;br /&gt;
•	Amtel MDM&lt;br /&gt;
&lt;br /&gt;
•	BlackBerry BES10&lt;br /&gt;
&lt;br /&gt;
•	CA Technologies MDM&lt;br /&gt;
&lt;br /&gt;
•	Citrix XenMobile&lt;br /&gt;
&lt;br /&gt;
•	Dell EMM&lt;br /&gt;
&lt;br /&gt;
•	Good Technology MDM&lt;br /&gt;
&lt;br /&gt;
•	IBM MaaS360 MDM&lt;br /&gt;
&lt;br /&gt;
•	McAfee EMM&lt;br /&gt;
&lt;br /&gt;
•	Microsoft Enterprise Mobility Suite (EMS)&lt;br /&gt;
&lt;br /&gt;
•	MobileIron EMM&lt;br /&gt;
&lt;br /&gt;
•	SAP Afaria MDM&lt;br /&gt;
&lt;br /&gt;
•	SOTI MobiControl MDM&lt;br /&gt;
&lt;br /&gt;
•	Symantec Mobile Management&lt;br /&gt;
&lt;br /&gt;
==For More Technical Details and Queries==&lt;br /&gt;
&lt;br /&gt;
'''Author: Milan Singh Thakur'''&lt;br /&gt;
&lt;br /&gt;
Contact: ''milanthakur2010@gmail.com''&lt;br /&gt;
&lt;br /&gt;
Linkedin: Connect Professionally[https://in.linkedin.com/in/milansinghthakur]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=196625</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=196625"/>
				<updated>2015-06-27T21:04:17Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* About this list */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
== About this list  ==&lt;br /&gt;
In 2013, we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Mobile_Top_10_2014.png|right|630px]]&lt;br /&gt;
Our goals for the 2014 list included the following:&lt;br /&gt;
* Updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc;&lt;br /&gt;
* Generation of more data; and&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
This list has been finalized after a 90-day feedback period from the community. Based on feedback, we intend on releasing a Mobile Top Ten 2015 list following a similar approach of collecting data, grouping the data in logical and consistent ways.&lt;br /&gt;
&lt;br /&gt;
Feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well!&lt;br /&gt;
&lt;br /&gt;
== 2015 Mobile Top Ten Analysis Results ==&lt;br /&gt;
Are you interested in what the data collection for the 2015 list looks like?  Check out the final synthesis... [[Media:2015 Data Synthesis Results.pptx]]&lt;br /&gt;
&lt;br /&gt;
Here is the original raw data: [[https://www.dropbox.com/sh/d143o6tbkdx4w4l/AAAQlpmnCpHCgiBqZkgXPSTKa?dl=0 Dropbox Data]]&lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Final List 2014 ==&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mobile_Top_10_2014.png&amp;diff=196624</id>
		<title>File:Mobile Top 10 2014.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mobile_Top_10_2014.png&amp;diff=196624"/>
				<updated>2015-06-27T21:03:21Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: Abhinav uploaded a new version of &amp;amp;quot;File:Mobile Top 10 2014.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Mindmap Mobile top ten&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mobile_Top_10_2014.png&amp;diff=196623</id>
		<title>File:Mobile Top 10 2014.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mobile_Top_10_2014.png&amp;diff=196623"/>
				<updated>2015-06-27T20:50:37Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: Mindmap Mobile top ten&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Mindmap Mobile top ten&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Top_Ten_Project&amp;diff=196622</id>
		<title>OWASP Internet of Things Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Top_Ten_Project&amp;diff=196622"/>
				<updated>2015-06-27T20:42:53Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Manufacturer IoT Security Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things Top 10==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things (IoT) Top 10 is a project designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project defines the top ten security surface areas presented by IoT systems, and provides information on threat agents, attack vectors, vulnerabilities, and impacts associated with each. In addition, the project aims to provide practical security recommendations for builders, breakers, and users of IoT systems.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the 10 Most Significant IoT Security Surface Areas&lt;br /&gt;
* A list of basic recommendations for manufacturers, developers, and consumers&lt;br /&gt;
&lt;br /&gt;
For each attack surface areas, the following sections are included:&lt;br /&gt;
&lt;br /&gt;
* A description of the attack surface&lt;br /&gt;
* Threat agents&lt;br /&gt;
* Attack vectors&lt;br /&gt;
* Security weaknesses&lt;br /&gt;
* Technical impacts&lt;br /&gt;
* Business impacts&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid the issue&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
For each role in Manufacturers, Developers, and Consumer, the following recommendations are included:&lt;br /&gt;
&lt;br /&gt;
* For each I''N'' category, list the top few considerations that should be observed in that context&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_internet_of_things_top_ten_project Subcribe here]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6ON2VzZVFkNGF6aVE/view?usp=sharing OWASP Internet of Things Top Ten 2014 PDF]&lt;br /&gt;
&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OYVoweHNBeVFDdGs/view?usp=sharing OWASP Internet of Things Top Ten 2014 Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OUGVWeGZGdnhleFU/view?usp=sharing OWASP Internet of Things Top Ten 2014 PPT]&lt;br /&gt;
&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OdW1HMjRpM3VVUVE/view?usp=sharing OWASP IoT Top Ten RSA 2015 Presentation]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [April 2015] Added the IoT Top 10 talk from RSA&lt;br /&gt;
* [April 2015] Added an IoT Top 10 Infographic&lt;br /&gt;
* IoT day is April 9th!&lt;br /&gt;
* [February 2015] Added a PDF containing a walk through of the project and the Top Ten.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Internet of Things Top 10 for 2014 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Top 10 - 2014 is as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | I1 Insecure Web Interface]]&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | I2 Insufficient Authentication/Authorization]]&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | I3 Insecure Network Services]]&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | I4 Lack of Transport Encryption]]&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | I5 Privacy Concerns]]&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | I6 Insecure Cloud Interface]]&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | I7 Insecure Mobile Interface]]&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | I8 Insufficient Security Configurability]]&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | I9 Insecure Software/Firmware]]&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | I10 Poor Physical Security]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” &lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things (IoT) Top 10 is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them.&lt;br /&gt;
&lt;br /&gt;
Examples of IoT Devices: Cars, lighting systems, refrigerators, telephones, SCADA systems, traffic control systems, home security systems, TVs, DVRs, etc…&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Internet of Things Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Internet of Things Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to Daniel.Miessler@owasp.org, Craig.Smith@owasp.org, or Jason.Haddix@owasp.org, Thanks!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/ HP Fortify on Demand]&lt;br /&gt;
* Contribute and add your name here!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OdW1HMjRpM3VVUVE/view?usp=sharing Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
IoT Security &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
= In the News =&lt;br /&gt;
 &lt;br /&gt;
* [http://thehackernews.com/2015/05/Brillo-os-internet-of-things.html &amp;quot;Google Brillo OS - New Android-based OS for Internet of Things&amp;quot;] ''The Hacker News.'' The Hacker News 22 May 2015&lt;br /&gt;
* [http://www.businesswire.com/news/home/20150505005199/en/IEEE-Standards-Association-IEEE-SA-Releases-Internet-IoT#.VXB2h0bIBJK &amp;quot;IEEE Standards Association (IEEE-SA) Releases Internet of Things (IoT) Ecosystem Study in Advance of Key IoT Industry Events&amp;quot;] ''Business Wire.'' Business Wire 05 May 2015&lt;br /&gt;
* [http://www.techradar.com/us/news/computing-components/processors/internet-of-things-gets-massive-boost-with-intel-altera-deal-1295481?src=rss&amp;amp;attr=all &amp;quot;Internet of things gets massive boost with Intel-Altera deal&amp;quot;] ''Techradar.'' Techradar 01 June 2015&lt;br /&gt;
* [http://techcrunch.com/2015/05/12/samsung-artik/?ncid=rss &amp;quot;Samsung Launches ARTIK, Its New Platform For Connected Devices&amp;quot;] ''Techcrunch.'' Techcrunch 12 May 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Conferences - June 2015=&lt;br /&gt;
&lt;br /&gt;
* [http://icc2015.ieee-icc.org/ IEEE International Conference on Communications (ICC) 2015] London, UK June 8-12&lt;br /&gt;
* [http://www.iotx.ae/about-dwtc/ IoT Expo - Dubai 2015] Dubai, United Arab Emirates June 9-10&lt;br /&gt;
* [http://iottelecomsummit.com/ M2M and IoT Strategies Summit] Barcelona, Spain June 9-11&lt;br /&gt;
* [http://iot-week.eu/ IoT Week Lisbon] Lisbon, Portugal June 15-18&lt;br /&gt;
* [http://iot-nexus.com/usa/#About IoT Nexus: Interoperability] San Francisco, US June 17-18&lt;br /&gt;
* [http://www.truste.com/events/iot/ IoT Privacy Summit 2015] Mountain View, US June 18&lt;br /&gt;
* [http://connectedcarsworld.com/ Connected Cars 15] Amsterdam, Netherlands June 24-25&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[https://ifttt.com/ If This Then That (IFTTT)]&lt;br /&gt;
&lt;br /&gt;
A service that lets you create powerful connections with one simple statement.&lt;br /&gt;
&lt;br /&gt;
Channels are the basic building blocks of IFTTT. Channels include:&lt;br /&gt;
* Triggers - The ''this'' part of a Recipe&lt;br /&gt;
* Actions - The ''that'' part of a Recipe&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
= Manufacturers =&lt;br /&gt;
&lt;br /&gt;
== Manufacturer IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT) &lt;br /&gt;
&lt;br /&gt;
[[File:Internet_of_Things_Top_10_2014.png]]&lt;br /&gt;
&lt;br /&gt;
The goal of this page is help manufacturers build more secure products in the Internet of Things space. The guidance below is at a basic level, giving builders of products a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface in the product disallows weak passwords&lt;br /&gt;
* Ensure that any web interface in the product has an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface in the product has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Include web application firewalls to protect any web interfaces&lt;br /&gt;
* Ensure that any web interface allows the owner to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any access requiring authentication requires strong passwords&lt;br /&gt;
* Ensure that user roles can be properly segregated in multi-user environments&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are secure&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all devices operate with a minimal number of network ports active&lt;br /&gt;
* Ensure all devices do not make network ports and/or services available to the internet via UPnP for example&lt;br /&gt;
* Review all required network services for vulnerabilities such as buffer overflows or denial of service&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all communication between system components is encrypted as well as encrypting traffic between the system or device and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Ensure SSL/TLS implementations are up to date and properly configured&lt;br /&gt;
* Consider making a firewall option available for the product&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensure only authorized individuals have access to collected personal information&lt;br /&gt;
* Ensure only less sensitive data is collected&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring a data retention policy is in place&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that any cloud-based web interface has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure password security options are made available (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure encryption options are made available (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure secure logging is available for security events&lt;br /&gt;
* Ensure alerts and notifications are available to the user for security events&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all system devices have update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure update files are encrypted and that the files are also transmitted using encryption&lt;br /&gt;
* Ensure that update files are signed and then validated by the device before installing&lt;br /&gt;
* Ensure update servers are secure&lt;br /&gt;
* Ensure the product has the ability to implement scheduled updates&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure the device is produced with a minimal number of physical external ports (e.g. USB ports)&lt;br /&gt;
* Ensure the firmware of Operating System can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure the product is tamper resistant&lt;br /&gt;
* Ensure the product has the ability to limit administrative capabilities in some fashion, possibly by only connecting locally for admin functions&lt;br /&gt;
* Ensure the product has the ability to disable external ports such as USB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendation for all Internet of Things products:&lt;br /&gt;
* Avoid the potential for persistent vulnerabilities in devices that have no update capability by ensuring that all devices and systems are built with the ability to be updated when vulnerabilities are discovered&lt;br /&gt;
* Rebranded devices used as part of a system should be properly configured so that unnecessary or unintended services do not remain active after the rebranding&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&lt;br /&gt;
== Developer IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is help developers build more secure applications in the Internet of Things space. The guidance below is at a basic level, giving developers of applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface coding is written to prevent the use of weak passwords&lt;br /&gt;
* Ensure that any web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Ensure that any web interface coding is written to allow the owner to change the username and password&lt;br /&gt;
* Consider the use of web application firewalls to protect any web interfaces&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that applications are written to require strong passwords where authentication is needed&lt;br /&gt;
* Ensure the application takes into account multi-user environments and includes functionality for role separation&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are written to function in a secure manner&lt;br /&gt;
* Ensure that applications are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that applications are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that applications are written to include the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications that use network services don't respond poorly to buffer overflow, fuzzing or denial of service attacks&lt;br /&gt;
* Ensure applications test ports are taken out of service before going to production&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to make use of encrypted communication between devices and between devices and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Consider making a firewall option available for the application&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that any cloud interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to change the default username and password&lt;br /&gt;
* Ensure that mobile interfaces only collect the minimum amount of personal information needed&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to include password security options (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure applications are written to include encryption options (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure all applications are written to produce logs for security events&lt;br /&gt;
* Ensure all applications are written to produce alerts and notifications to the user for security events&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to include update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure all applications are written to process encrypted update files and that the files are transmitted using encryption&lt;br /&gt;
* Ensure all applications are written to process signed files and then validate that file before installation&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to utilize a minimal number of physical external ports (e.g. USB ports) on the device&lt;br /&gt;
* Ensure all applications can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure all applications are written to allow for disabling of unused physical ports such as USB&lt;br /&gt;
* Consider writing applications to limit administrative capabilities to a local interface only&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):&lt;br /&gt;
* Avoid potential Account Harvesting issues by:&lt;br /&gt;
** Ensuring valid user accounts can't be identified by interface error messages&lt;br /&gt;
** Ensuring strong passwords are required by users&lt;br /&gt;
** Implementing account lockout after 3 - 5 failed login attempts&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Testers =&lt;br /&gt;
&lt;br /&gt;
== Tester IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is to help testers assess IoT devices and applications in the Internet of Things space. The guidance below is at a basic level, giving testers of devices and applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess any web interface to determine if weak passwords are allowed&lt;br /&gt;
* Assess the account lockout mechanism&lt;br /&gt;
* Assess the web interface for XSS, SQLi and CSRF vulnerabilities and other web application vulnerabilities&lt;br /&gt;
* Assess the use of HTTPS to protect transmitted information&lt;br /&gt;
* Assess the ability to change the username and password&lt;br /&gt;
* Determine if web application firewalls are used to protect web interfaces&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution for the use of strong passwords where authentication is needed&lt;br /&gt;
* Assess the solution for multi-user environments and ensure it includes functionality for role separation&lt;br /&gt;
* Assess the solution for Implementation two-factor authentication where possible&lt;br /&gt;
* Assess password recovery mechanisms&lt;br /&gt;
* Assess the solution for the option to require strong passwords&lt;br /&gt;
* Assess the solution for the option to force password expiration after a specific period&lt;br /&gt;
* Assess the solution for the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to ensure network services don't respond poorly to buffer overflow, fuzzing or denial of service attacks&lt;br /&gt;
* Assess the solution to ensure test ports are are not present&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine the use of encrypted communication between devices and between devices and the internet&lt;br /&gt;
* Assess the solution to determine if accepted encryption practices are used and if proprietary protocols are avoided&lt;br /&gt;
* Assess the solution to determine if a firewall option available is available&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine the amount of personal information collected&lt;br /&gt;
* Assess the solution to determine if collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Assess the solution to determine if Ensuring data is de-identified or anonymized&lt;br /&gt;
* Assess the solution to ensure end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the cloud interfaces for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Assess the cloud-based web interface to ensure it disallows weak passwords&lt;br /&gt;
* Assess the cloud-based web interface to ensure it includes an account lockout mechanism&lt;br /&gt;
* Assess the cloud-based web interface to determine if two-factor authentication is used&lt;br /&gt;
* Assess any cloud interfaces for XSS, SQLi and CSRF vulnerabilities and other vulnerabilities&lt;br /&gt;
* Assess all cloud interfaces to ensure transport encryption is used&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to require strong passwords is available&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to force password expiration after a specific period is available&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to change the default username and password is available&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the mobile interface to ensure it disallows weak passwords&lt;br /&gt;
* Assess the mobile interface to ensure it includes an account lockout mechanism&lt;br /&gt;
* Assess the mobile interface to determine if it Implements two-factor authentication (e.g Apple's Touch ID)&lt;br /&gt;
* Assess the mobile interface to determine if it uses transport encryption&lt;br /&gt;
* Assess the mobile interface to determine if the option to require strong passwords is available&lt;br /&gt;
* Assess the mobile interface to determine if the option to force password expiration after a specific period is available&lt;br /&gt;
* Assess the mobile interface to determine if the option to change the default username and password is available&lt;br /&gt;
* Assess the mobile interface to determine the amount of personal information collected&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine if password security options (e.g. Enabling 20 character passwords or enabling two-factor authentication) are available&lt;br /&gt;
* Assess the solution to determine if encryption options (e.g. Enabling AES-256 where AES-128 is the default setting) are available&lt;br /&gt;
* Assess the solution to determine if logging for security events is available&lt;br /&gt;
* Assess the solution to determine if alerts and notifications to the user for security events are available&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the device to ensure it includes update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Assess the device to ensure it uses encrypted update files and that the files are transmitted using encryption&lt;br /&gt;
* Assess the device to ensure is uses signed files and then validates that file before installation&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the device to ensure it utilizes a minimal number of physical external ports (e.g. USB ports) on the device&lt;br /&gt;
* Assess the device to determine if it can be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Assess the device to determine if it allows for disabling of unused physical ports such as USB&lt;br /&gt;
* Assess the device to determine if it includes the ability to limit administrative capabilities to a local interface only&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):&lt;br /&gt;
* Avoid potential Account Harvesting issues by:&lt;br /&gt;
** Ensuring valid user accounts can't be identified by interface error messages&lt;br /&gt;
** Ensuring strong passwords are required by users&lt;br /&gt;
** Implementing account lockout after 3 - 5 failed login attempts&lt;br /&gt;
&lt;br /&gt;
= Consumers =&lt;br /&gt;
&lt;br /&gt;
== Consumer IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is help consumers purchase secure products in the Internet of Things space. The guidance below is at a basic level, giving consumers a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly aid the consumer in purchasing a secure IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has the option to set user privileges, consider setting user privileges to the minimal needed for operation&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a firewall option available, enable it and ensure that it can only be accessed from your client systems&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Do not enter sensitive information into the system that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
* Deny data collection if it appears to be beyond what is needed for proper operation of the device (If provided the choice)&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If the mobile application has the option to require a PIN or password, consider using it for extra security (on client and server)&lt;br /&gt;
* If the mobile application has the option to use two factory authentication such as Apple's Touch ID, ensure it is enabled&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* Do not enter sensitive information into the mobile application that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option, enable any logging functionality for security-related events&lt;br /&gt;
* If your system has the option, enable any alert and notification functionality for security-related events&lt;br /&gt;
* If your system has security options for passwords, ensure they are enabled for strong passwords&lt;br /&gt;
* If your system has security options for encryption, ensure they are set for an accepted standard such as AES-256&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to verify updates, ensure it is enabled&lt;br /&gt;
* If your system has the option to download updates securely, ensure it is enabled&lt;br /&gt;
* If your system has the ability to schedule updates on a regular cadence, consider enabling it&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the ability to limit administrative capabilities possible by connecting locally, consider enabling that feature&lt;br /&gt;
* Disable any unused physical ports through the administrative interface&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
If you are looking to purchase a device or system, consider the following recommendations:&lt;br /&gt;
* Include security in feature considerations when evaluating a product&lt;br /&gt;
* Place Internet of Things devices on a separate network if possible using a firewall&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Internet_of_Things_Top_Ten_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Top_Ten_Project&amp;diff=196621</id>
		<title>OWASP Internet of Things Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Top_Ten_Project&amp;diff=196621"/>
				<updated>2015-06-27T20:42:31Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Manufacturer IoT Security Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things Top 10==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things (IoT) Top 10 is a project designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project defines the top ten security surface areas presented by IoT systems, and provides information on threat agents, attack vectors, vulnerabilities, and impacts associated with each. In addition, the project aims to provide practical security recommendations for builders, breakers, and users of IoT systems.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the 10 Most Significant IoT Security Surface Areas&lt;br /&gt;
* A list of basic recommendations for manufacturers, developers, and consumers&lt;br /&gt;
&lt;br /&gt;
For each attack surface areas, the following sections are included:&lt;br /&gt;
&lt;br /&gt;
* A description of the attack surface&lt;br /&gt;
* Threat agents&lt;br /&gt;
* Attack vectors&lt;br /&gt;
* Security weaknesses&lt;br /&gt;
* Technical impacts&lt;br /&gt;
* Business impacts&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid the issue&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
For each role in Manufacturers, Developers, and Consumer, the following recommendations are included:&lt;br /&gt;
&lt;br /&gt;
* For each I''N'' category, list the top few considerations that should be observed in that context&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
* Jason Haddix&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_internet_of_things_top_ten_project Subcribe here]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6ON2VzZVFkNGF6aVE/view?usp=sharing OWASP Internet of Things Top Ten 2014 PDF]&lt;br /&gt;
&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OYVoweHNBeVFDdGs/view?usp=sharing OWASP Internet of Things Top Ten 2014 Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OUGVWeGZGdnhleFU/view?usp=sharing OWASP Internet of Things Top Ten 2014 PPT]&lt;br /&gt;
&lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OdW1HMjRpM3VVUVE/view?usp=sharing OWASP IoT Top Ten RSA 2015 Presentation]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [April 2015] Added the IoT Top 10 talk from RSA&lt;br /&gt;
* [April 2015] Added an IoT Top 10 Infographic&lt;br /&gt;
* IoT day is April 9th!&lt;br /&gt;
* [February 2015] Added a PDF containing a walk through of the project and the Top Ten.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Internet of Things Top 10 for 2014 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Top 10 - 2014 is as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2014-I1 Insecure Web Interface | I1 Insecure Web Interface]]&lt;br /&gt;
* [[Top_10_2014-I2 Insufficient Authentication/Authorization | I2 Insufficient Authentication/Authorization]]&lt;br /&gt;
* [[Top_10_2014-I3 Insecure Network Services | I3 Insecure Network Services]]&lt;br /&gt;
* [[Top_10_2014-I4 Lack of Transport Encryption | I4 Lack of Transport Encryption]]&lt;br /&gt;
* [[Top_10_2014-I5 Privacy Concerns | I5 Privacy Concerns]]&lt;br /&gt;
* [[Top_10_2014-I6 Insecure Cloud Interface | I6 Insecure Cloud Interface]]&lt;br /&gt;
* [[Top_10_2014-I7 Insecure Mobile Interface | I7 Insecure Mobile Interface]]&lt;br /&gt;
* [[Top_10_2014-I8 Insufficient Security Configurability | I8 Insufficient Security Configurability]]&lt;br /&gt;
* [[Top_10_2014-I9 Insecure Software/Firmware | I9 Insecure Software/Firmware]]&lt;br /&gt;
* [[Top_10_2014-I10 Poor Physical Security | I10 Poor Physical Security]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.” &lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things (IoT) Top 10 is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them.&lt;br /&gt;
&lt;br /&gt;
Examples of IoT Devices: Cars, lighting systems, refrigerators, telephones, SCADA systems, traffic control systems, home security systems, TVs, DVRs, etc…&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Internet of Things Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Internet of Things Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to Daniel.Miessler@owasp.org, Craig.Smith@owasp.org, or Jason.Haddix@owasp.org, Thanks!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/ HP Fortify on Demand]&lt;br /&gt;
* Contribute and add your name here!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://drive.google.com/file/d/0B52IUvO0LP6OdW1HMjRpM3VVUVE/view?usp=sharing Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
IoT Security &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
= In the News =&lt;br /&gt;
 &lt;br /&gt;
* [http://thehackernews.com/2015/05/Brillo-os-internet-of-things.html &amp;quot;Google Brillo OS - New Android-based OS for Internet of Things&amp;quot;] ''The Hacker News.'' The Hacker News 22 May 2015&lt;br /&gt;
* [http://www.businesswire.com/news/home/20150505005199/en/IEEE-Standards-Association-IEEE-SA-Releases-Internet-IoT#.VXB2h0bIBJK &amp;quot;IEEE Standards Association (IEEE-SA) Releases Internet of Things (IoT) Ecosystem Study in Advance of Key IoT Industry Events&amp;quot;] ''Business Wire.'' Business Wire 05 May 2015&lt;br /&gt;
* [http://www.techradar.com/us/news/computing-components/processors/internet-of-things-gets-massive-boost-with-intel-altera-deal-1295481?src=rss&amp;amp;attr=all &amp;quot;Internet of things gets massive boost with Intel-Altera deal&amp;quot;] ''Techradar.'' Techradar 01 June 2015&lt;br /&gt;
* [http://techcrunch.com/2015/05/12/samsung-artik/?ncid=rss &amp;quot;Samsung Launches ARTIK, Its New Platform For Connected Devices&amp;quot;] ''Techcrunch.'' Techcrunch 12 May 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= IoT Conferences - June 2015=&lt;br /&gt;
&lt;br /&gt;
* [http://icc2015.ieee-icc.org/ IEEE International Conference on Communications (ICC) 2015] London, UK June 8-12&lt;br /&gt;
* [http://www.iotx.ae/about-dwtc/ IoT Expo - Dubai 2015] Dubai, United Arab Emirates June 9-10&lt;br /&gt;
* [http://iottelecomsummit.com/ M2M and IoT Strategies Summit] Barcelona, Spain June 9-11&lt;br /&gt;
* [http://iot-week.eu/ IoT Week Lisbon] Lisbon, Portugal June 15-18&lt;br /&gt;
* [http://iot-nexus.com/usa/#About IoT Nexus: Interoperability] San Francisco, US June 17-18&lt;br /&gt;
* [http://www.truste.com/events/iot/ IoT Privacy Summit 2015] Mountain View, US June 18&lt;br /&gt;
* [http://connectedcarsworld.com/ Connected Cars 15] Amsterdam, Netherlands June 24-25&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
== ==&lt;br /&gt;
[https://ifttt.com/ If This Then That (IFTTT)]&lt;br /&gt;
&lt;br /&gt;
A service that lets you create powerful connections with one simple statement.&lt;br /&gt;
&lt;br /&gt;
Channels are the basic building blocks of IFTTT. Channels include:&lt;br /&gt;
* Triggers - The ''this'' part of a Recipe&lt;br /&gt;
* Actions - The ''that'' part of a Recipe&lt;br /&gt;
== ==&lt;br /&gt;
[http://builditsecure.ly BuildItSecure.ly]&lt;br /&gt;
&lt;br /&gt;
A project focused on helping small business connect with security researchers to aid in securing their IoT-based products before going market.&lt;br /&gt;
&lt;br /&gt;
Their goals include:&lt;br /&gt;
* Focus effort towards small business&lt;br /&gt;
* Build partnerships&lt;br /&gt;
* Coordinate efforts&lt;br /&gt;
* Curate informational resources&lt;br /&gt;
* Present research&lt;br /&gt;
&lt;br /&gt;
= Manufacturers =&lt;br /&gt;
&lt;br /&gt;
== Manufacturer IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT) &lt;br /&gt;
&lt;br /&gt;
  [[File:Internet_of_Things_Top_10_2014.png]]&lt;br /&gt;
&lt;br /&gt;
The goal of this page is help manufacturers build more secure products in the Internet of Things space. The guidance below is at a basic level, giving builders of products a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface in the product disallows weak passwords&lt;br /&gt;
* Ensure that any web interface in the product has an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface in the product has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Include web application firewalls to protect any web interfaces&lt;br /&gt;
* Ensure that any web interface allows the owner to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any access requiring authentication requires strong passwords&lt;br /&gt;
* Ensure that user roles can be properly segregated in multi-user environments&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are secure&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all devices operate with a minimal number of network ports active&lt;br /&gt;
* Ensure all devices do not make network ports and/or services available to the internet via UPnP for example&lt;br /&gt;
* Review all required network services for vulnerabilities such as buffer overflows or denial of service&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all communication between system components is encrypted as well as encrypting traffic between the system or device and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Ensure SSL/TLS implementations are up to date and properly configured&lt;br /&gt;
* Consider making a firewall option available for the product&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensure only authorized individuals have access to collected personal information&lt;br /&gt;
* Ensure only less sensitive data is collected&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring a data retention policy is in place&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that any cloud-based web interface has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application has an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that users have the option to require strong passwords&lt;br /&gt;
* Ensure that users have the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that users have the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure password security options are made available (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure encryption options are made available (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure secure logging is available for security events&lt;br /&gt;
* Ensure alerts and notifications are available to the user for security events&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all system devices have update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure update files are encrypted and that the files are also transmitted using encryption&lt;br /&gt;
* Ensure that update files are signed and then validated by the device before installing&lt;br /&gt;
* Ensure update servers are secure&lt;br /&gt;
* Ensure the product has the ability to implement scheduled updates&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure the device is produced with a minimal number of physical external ports (e.g. USB ports)&lt;br /&gt;
* Ensure the firmware of Operating System can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure the product is tamper resistant&lt;br /&gt;
* Ensure the product has the ability to limit administrative capabilities in some fashion, possibly by only connecting locally for admin functions&lt;br /&gt;
* Ensure the product has the ability to disable external ports such as USB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendation for all Internet of Things products:&lt;br /&gt;
* Avoid the potential for persistent vulnerabilities in devices that have no update capability by ensuring that all devices and systems are built with the ability to be updated when vulnerabilities are discovered&lt;br /&gt;
* Rebranded devices used as part of a system should be properly configured so that unnecessary or unintended services do not remain active after the rebranding&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&lt;br /&gt;
== Developer IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is help developers build more secure applications in the Internet of Things space. The guidance below is at a basic level, giving developers of applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any web interface coding is written to prevent the use of weak passwords&lt;br /&gt;
* Ensure that any web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Ensure that any web interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that any web interface has the ability to use HTTPS to protect transmitted information&lt;br /&gt;
* Ensure that any web interface coding is written to allow the owner to change the username and password&lt;br /&gt;
* Consider the use of web application firewalls to protect any web interfaces&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that applications are written to require strong passwords where authentication is needed&lt;br /&gt;
* Ensure the application takes into account multi-user environments and includes functionality for role separation&lt;br /&gt;
* Implement two-factor authentication where possible&lt;br /&gt;
* Ensure password recovery mechanisms are written to function in a secure manner&lt;br /&gt;
* Ensure that applications are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that applications are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that applications are written to include the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications that use network services don't respond poorly to buffer overflow, fuzzing or denial of service attacks&lt;br /&gt;
* Ensure applications test ports are taken out of service before going to production&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to make use of encrypted communication between devices and between devices and the internet&lt;br /&gt;
* Use recommended and accepted encryption practices and avoid proprietary protocols&lt;br /&gt;
* Consider making a firewall option available for the application&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure only the minimal amount of personal information is collected from consumers&lt;br /&gt;
* Ensure all collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Ensuring data is de-identified or anonymized&lt;br /&gt;
* Ensuring end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all cloud interfaces are reviewed for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any cloud-based web interface coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for cloud-based web interfaces&lt;br /&gt;
* Ensure that any cloud interface coding has been tested for XSS, SQLi and CSRF vulnerabilities&lt;br /&gt;
* Ensure that all cloud interfaces use transport encryption&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that cloud interfaces are written to include the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure that any mobile application coding is written to disallows weak passwords&lt;br /&gt;
* Ensure that any mobile application coding is written to include an account lockout mechanism&lt;br /&gt;
* Implement two-factor authentication for mobile applications (e.g Apple's Touch ID)&lt;br /&gt;
* Ensure that any mobile application uses transport encryption&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to require strong passwords&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to force password expiration after a specific period&lt;br /&gt;
* Ensure that mobile interfaces are written to include the option to change the default username and password&lt;br /&gt;
* Ensure that mobile interfaces only collect the minimum amount of personal information needed&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to include password security options (e.g. Enabling 20 character passwords or enabling two-factor authentication)&lt;br /&gt;
* Ensure applications are written to include encryption options (e.g. Enabling AES-256 where AES-128 is the default setting)&lt;br /&gt;
* Ensure all applications are written to produce logs for security events&lt;br /&gt;
* Ensure all applications are written to produce alerts and notifications to the user for security events&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure all applications are written to include update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Ensure all applications are written to process encrypted update files and that the files are transmitted using encryption&lt;br /&gt;
* Ensure all applications are written to process signed files and then validate that file before installation&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Ensure applications are written to utilize a minimal number of physical external ports (e.g. USB ports) on the device&lt;br /&gt;
* Ensure all applications can not be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Ensure all applications are written to allow for disabling of unused physical ports such as USB&lt;br /&gt;
* Consider writing applications to limit administrative capabilities to a local interface only&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):&lt;br /&gt;
* Avoid potential Account Harvesting issues by:&lt;br /&gt;
** Ensuring valid user accounts can't be identified by interface error messages&lt;br /&gt;
** Ensuring strong passwords are required by users&lt;br /&gt;
** Implementing account lockout after 3 - 5 failed login attempts&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Testers =&lt;br /&gt;
&lt;br /&gt;
== Tester IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is to help testers assess IoT devices and applications in the Internet of Things space. The guidance below is at a basic level, giving testers of devices and applications a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly improve the security of any IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess any web interface to determine if weak passwords are allowed&lt;br /&gt;
* Assess the account lockout mechanism&lt;br /&gt;
* Assess the web interface for XSS, SQLi and CSRF vulnerabilities and other web application vulnerabilities&lt;br /&gt;
* Assess the use of HTTPS to protect transmitted information&lt;br /&gt;
* Assess the ability to change the username and password&lt;br /&gt;
* Determine if web application firewalls are used to protect web interfaces&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution for the use of strong passwords where authentication is needed&lt;br /&gt;
* Assess the solution for multi-user environments and ensure it includes functionality for role separation&lt;br /&gt;
* Assess the solution for Implementation two-factor authentication where possible&lt;br /&gt;
* Assess password recovery mechanisms&lt;br /&gt;
* Assess the solution for the option to require strong passwords&lt;br /&gt;
* Assess the solution for the option to force password expiration after a specific period&lt;br /&gt;
* Assess the solution for the option to change the default username and password&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to ensure network services don't respond poorly to buffer overflow, fuzzing or denial of service attacks&lt;br /&gt;
* Assess the solution to ensure test ports are are not present&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine the use of encrypted communication between devices and between devices and the internet&lt;br /&gt;
* Assess the solution to determine if accepted encryption practices are used and if proprietary protocols are avoided&lt;br /&gt;
* Assess the solution to determine if a firewall option available is available&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine the amount of personal information collected&lt;br /&gt;
* Assess the solution to determine if collected personal data is properly protected using encryption at rest and in transit&lt;br /&gt;
* Assess the solution to determine if Ensuring data is de-identified or anonymized&lt;br /&gt;
* Assess the solution to ensure end-users are given a choice for data collected beyond what is needed for proper operation of the device&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the cloud interfaces for security vulnerabilities (e.g. API interfaces and cloud-based web interfaces)&lt;br /&gt;
* Assess the cloud-based web interface to ensure it disallows weak passwords&lt;br /&gt;
* Assess the cloud-based web interface to ensure it includes an account lockout mechanism&lt;br /&gt;
* Assess the cloud-based web interface to determine if two-factor authentication is used&lt;br /&gt;
* Assess any cloud interfaces for XSS, SQLi and CSRF vulnerabilities and other vulnerabilities&lt;br /&gt;
* Assess all cloud interfaces to ensure transport encryption is used&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to require strong passwords is available&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to force password expiration after a specific period is available&lt;br /&gt;
* Assess the cloud interfaces to determine if the option to change the default username and password is available&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the mobile interface to ensure it disallows weak passwords&lt;br /&gt;
* Assess the mobile interface to ensure it includes an account lockout mechanism&lt;br /&gt;
* Assess the mobile interface to determine if it Implements two-factor authentication (e.g Apple's Touch ID)&lt;br /&gt;
* Assess the mobile interface to determine if it uses transport encryption&lt;br /&gt;
* Assess the mobile interface to determine if the option to require strong passwords is available&lt;br /&gt;
* Assess the mobile interface to determine if the option to force password expiration after a specific period is available&lt;br /&gt;
* Assess the mobile interface to determine if the option to change the default username and password is available&lt;br /&gt;
* Assess the mobile interface to determine the amount of personal information collected&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the solution to determine if password security options (e.g. Enabling 20 character passwords or enabling two-factor authentication) are available&lt;br /&gt;
* Assess the solution to determine if encryption options (e.g. Enabling AES-256 where AES-128 is the default setting) are available&lt;br /&gt;
* Assess the solution to determine if logging for security events is available&lt;br /&gt;
* Assess the solution to determine if alerts and notifications to the user for security events are available&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the device to ensure it includes update capability and can be updated quickly when vulnerabilities are discovered&lt;br /&gt;
* Assess the device to ensure it uses encrypted update files and that the files are transmitted using encryption&lt;br /&gt;
* Assess the device to ensure is uses signed files and then validates that file before installation&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* Assess the device to ensure it utilizes a minimal number of physical external ports (e.g. USB ports) on the device&lt;br /&gt;
* Assess the device to determine if it can be accessed via unintended methods such as through an unnecessary USB port&lt;br /&gt;
* Assess the device to determine if it allows for disabling of unused physical ports such as USB&lt;br /&gt;
* Assess the device to determine if it includes the ability to limit administrative capabilities to a local interface only&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
Consider the following recommendations for all user interfaces (local device, cloud-based and mobile):&lt;br /&gt;
* Avoid potential Account Harvesting issues by:&lt;br /&gt;
** Ensuring valid user accounts can't be identified by interface error messages&lt;br /&gt;
** Ensuring strong passwords are required by users&lt;br /&gt;
** Implementing account lockout after 3 - 5 failed login attempts&lt;br /&gt;
&lt;br /&gt;
= Consumers =&lt;br /&gt;
&lt;br /&gt;
== Consumer IoT Security Guidance ==&lt;br /&gt;
&lt;br /&gt;
(DRAFT)&lt;br /&gt;
&lt;br /&gt;
The goal of this page is help consumers purchase secure products in the Internet of Things space. The guidance below is at a basic level, giving consumers a basic set of guidelines to consider from their perspective. This is not a comprehensive list of considerations, and should not be treated as such, but ensuring that these fundamentals are covered will greatly aid the consumer in purchasing a secure IoT product.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Category&lt;br /&gt;
! IoT Security Consideration&lt;br /&gt;
|- &lt;br /&gt;
| '''I1: Insecure Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I2: Insufficient Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has the option to set user privileges, consider setting user privileges to the minimal needed for operation&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I3: Insecure Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has a firewall option available, enable it and ensure that it can only be accessed from your client systems&lt;br /&gt;
* Consider employing network segmentation technologies such as firewalls to isolate IoT systems from critical IT systems&lt;br /&gt;
|- &lt;br /&gt;
| '''I4: Lack of Transport Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I5: Privacy Concerns'''&lt;br /&gt;
|&lt;br /&gt;
* Do not enter sensitive information into the system that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
* Deny data collection if it appears to be beyond what is needed for proper operation of the device (If provided the choice)&lt;br /&gt;
|- &lt;br /&gt;
| '''I6: Insecure Cloud Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to use HTTPS, ensure it is enabled&lt;br /&gt;
* If your system has a two factor authentication option, ensure that it is enabled&lt;br /&gt;
* If your system has web application firewall option, ensure that it is enabled&lt;br /&gt;
* If your system has a local or cloud-based web application, ensure that you change the default password to a strong one and if possible change the default username as well&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
|- &lt;br /&gt;
| '''I7: Insecure Mobile Interface'''&lt;br /&gt;
|&lt;br /&gt;
* If the mobile application has the option to require a PIN or password, consider using it for extra security (on client and server)&lt;br /&gt;
* If the mobile application has the option to use two factory authentication such as Apple's Touch ID, ensure it is enabled&lt;br /&gt;
* If the system has account lockout functionality, ensure that it is enabled&lt;br /&gt;
* If the system has the option to require strong passwords, ensure that is enabled&lt;br /&gt;
* If the system has the option to require new passwords after 90 days for example, ensure that is enabled&lt;br /&gt;
* Do not enter sensitive information into the mobile application that is not absolutely required, e.g. address, DOB, CC, etc.&lt;br /&gt;
|- &lt;br /&gt;
| '''I8: Insufficient Security Configurability'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option, enable any logging functionality for security-related events&lt;br /&gt;
* If your system has the option, enable any alert and notification functionality for security-related events&lt;br /&gt;
* If your system has security options for passwords, ensure they are enabled for strong passwords&lt;br /&gt;
* If your system has security options for encryption, ensure they are set for an accepted standard such as AES-256&lt;br /&gt;
|- &lt;br /&gt;
| '''I9: Insecure Software/Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the option to verify updates, ensure it is enabled&lt;br /&gt;
* If your system has the option to download updates securely, ensure it is enabled&lt;br /&gt;
* If your system has the ability to schedule updates on a regular cadence, consider enabling it&lt;br /&gt;
|- &lt;br /&gt;
| '''I10: Poor Physical Security'''&lt;br /&gt;
|&lt;br /&gt;
* If your system has the ability to limit administrative capabilities possible by connecting locally, consider enabling that feature&lt;br /&gt;
* Disable any unused physical ports through the administrative interface&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===General Recommendations===&lt;br /&gt;
&lt;br /&gt;
If you are looking to purchase a device or system, consider the following recommendations:&lt;br /&gt;
* Include security in feature considerations when evaluating a product&lt;br /&gt;
* Place Internet of Things devices on a separate network if possible using a firewall&lt;br /&gt;
&lt;br /&gt;
[ NOTE: Given the fact that each deployment and every environment is different, it is important to weigh the pros and cons of implementing the advice above before taking each step. ]&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Internet_of_Things_Top_Ten_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Internet_of_Things_Top_10_2014.png&amp;diff=196620</id>
		<title>File:Internet of Things Top 10 2014.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Internet_of_Things_Top_10_2014.png&amp;diff=196620"/>
				<updated>2015-06-27T20:41:38Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: IOT&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IOT&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Dangers_of_Jailbreaking_and_Rooting_Mobile_Devices&amp;diff=196619</id>
		<title>Projects/OWASP Mobile Security Project - Dangers of Jailbreaking and Rooting Mobile Devices</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Dangers_of_Jailbreaking_and_Rooting_Mobile_Devices&amp;diff=196619"/>
				<updated>2015-06-27T20:29:36Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* What are the common tools used? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
==What is &amp;quot;jailbreaking&amp;quot;, &amp;quot;rooting&amp;quot; and &amp;quot;unlocking&amp;quot;?==&lt;br /&gt;
&lt;br /&gt;
Jailbreaking, rooting and unlocking are the processes of gaining unauthorized access or elevated privileges on a system. The terms are different between operating systems, and the differences in terminology reflect the differences in security models used by the operating systems vendors.&lt;br /&gt;
&lt;br /&gt;
For iOS, '''Jailbreaking''' is the process of modifying iOS system kernels to allow file system read and write access. Most jailbreaking tools (and exploits) remove the limitations and security features built by the manufacturer Apple (the &amp;quot;jail&amp;quot;) through the use of custom kernels, which make unauthorized modifications to the operating system.  Almost all jailbreaking tools allow users to run code not approved and signed by Apple. This allows users to install additional applications, extensions and patches outside the control of Apple’s App Store.&lt;br /&gt;
&lt;br /&gt;
On Android, '''Rooting''' is the process of gaining administrative or privileged access for the Android OS. As the Android OS is based on the Linux Kernel, rooting a device is analogous to gaining access to administrative, root user-equivalent, permissions on Linux. Unlike iOS, rooting is (usually) not required to run applications outside from the Google Play. Some carriers control this through operating system settings or device firmware. Rooting also enables the user to completely remove and replace the device's operating system.&lt;br /&gt;
&lt;br /&gt;
On Windows Phone OS, '''Unlocking''' is the process of editing specific keys of the Windows Phone OS registry or modifying the underlying platform to allow the execution of applications that are not certified by Microsoft or that use reserved capabilities. Different levels of unlocking exist depending on the OS and device version:&lt;br /&gt;
&lt;br /&gt;
*'''Developer-unlock''': Microsoft allows Independent Software Vendors (ISV) to unlock their systems to sideload and test homebrew apps onto physical devices, before their submission to the Store. Developer-unlock only allows to sideload applications that are not signed by the Windows Phone Store approval process and it is often a pre-condition to achieve a higher level of unlock (e.g., interop-unlock). A developer-unlocked device does not allow an app to escape its sandbox or tweak the system via registry editing. Windows Phone devices can be officially developer-unlocked for free using utilities provided by Microsoft;&lt;br /&gt;
&lt;br /&gt;
*'''Interop-unlock''': with the release of Windows Phone 7.5 Mango (7.10.7720.68), Microsoft introduced a new platform security feature, called Interop Lock, which restricted the access to drivers only to apps with the Interop Services capability ('''ID_CAP_INTEROPSERVICES'''). Moreover, Mango denies the sideloading of unsigned apps with that capability, thus limiting drivers’ access to Windows Phone Store ''certified'' apps only. Heathcliff74, the mind behind the WP7 Root Tools suite, researched the topic and found that by manipulating the value of the '''MaxUnsignedApp''' registry key ('''HKLM\Software\Microsoft\DeviceReg\Install\MaxUnsignedApp''') it is possible to control the unlocking level of a Windows Phone device. A value between 1 and 299 means that the device is developer-unlocked, while a value equal or greater than 300 removes the restriction to sideload apps with the ID_CAP_INTEROPSERVICES capability, allowing apps to access restricted file system areas and registry editing, thanks to the use of high-privileged app capabilities. It has been hypothesized that the &amp;quot;magic number&amp;quot; involved in the MaxUnsignedApp register key is a feature introduced by Microsoft for OEMs and so at times referred to as '''OEM developer-unlock'''. It should be noted that typically the interop-unlock by itself does not enable all of the system’s available capabilities – condition that is also knows as '''Capabilities-unlock''';&lt;br /&gt;
&lt;br /&gt;
*'''Full-unlock''': full-unlock aims at disabling a subset or all of the security mechanisms implemented by the OS to allow full access and the customization of the system (e.g., file system and registry unlimited access). Full-unlocking is usually achieved with custom ROMs flashing, where the OS bnaries are patched to disable the OS security features, such as policy-checks. In a full-unlocked environment, apps are likely to be able to escape their sandbox because they can be run with elevated privileges.&lt;br /&gt;
&lt;br /&gt;
==Why do they occur?==&lt;br /&gt;
'''iOS''': many users are lured into jailbreaking to take advantage of apps made available through third party app sources, such as Cydia, which are otherwise banned or not approved by Apple. There is an inherent risk in installing such applications as they are not quality controlled nor have they gone through the Apple approval and application approval process. Hence, they may contain vulnerable or malicious code that could allow the device to be compromised. Alternately, jailbreaking can allow users to enhance some built in functions on their device. For example, a jailbroken phone can be used with a different carrier than the one it was configured with, FaceTime can be used over a 3G connection, or the phone can be unlocked to be used internationally. More technically savvy users also perform jailbreaking to enable user interface customizations, preferences and features not available through the normal software interface. Typically, these functionalities are achieved by patching specific binaries in the operating system. A debated purpose for jailbreaking in the iOS community is for installing pirated iOS applications. Jailbreaking proponents discourage this use, such as Cydia warning users of pirated software when they add a pirated software repository. However, repositories such as Hackulous promote pirated applications and the tools to pirate and distribute applications.&lt;br /&gt;
&lt;br /&gt;
'''Android''': rooting Android devices allows users to gain access to additional hardware rights, backup utilities and direct hardware access. Additionally, rooting allows users to remove the pre-installed &amp;quot;bloatware&amp;quot;, additional features that many carriers or manufacturers put onto devices, which can use considerable amounts of disk space and memory. Most users root their device to leverage a custom Read Only Memory (ROM) developed by the Android Community, which brings distinctive capabilities that are not available through the official ROMs installed by the carriers. Custom ROMs also provide users an option to 'upgrade' the operating system and optimize the phone experience by giving users access to features, such as tethering, that are normally blocked or limited by carriers.&lt;br /&gt;
&lt;br /&gt;
'''Windows Phone OS''': Windows Phone users generally unlock their devices to tweak their systems and to be able to sideload homebrew apps. Depending on the level of unlocking, the OS can be customized in term of store OEM settings, native code execution, themes, ringtones or the ability to sideload apps that are not signed or that use capabilities normally reserved to Microsoft or OEMs. Developers unlock their devices to test their products on real systems, before the submission to the Store. An interop-unlocked device allows users to access file system areas where Store apps are installed, thus allowing DLL extraction, reverse engineering and app cracking.&lt;br /&gt;
&lt;br /&gt;
==What are the common tools used?==&lt;br /&gt;
&lt;br /&gt;
'''iOS''': Jailbreaking software can be categorized into two main groups:&lt;br /&gt;
#'''Tethered''': requires the device to be connected to a system to bypass the iBoot signature check for iOS devices. The iOS device needs to be connected or tethered to a computer system every time it has to reboot in order to access the jailbreak application, such as redsn0w, and boot correctly;&lt;br /&gt;
#'''Un-tethered''': requires connection for the initial jailbreak process and then all the software, such as sn0wbreeze, is on the device for future un-tethered reboots, without losing the jailbreak or the functionality of the phone.&lt;br /&gt;
&lt;br /&gt;
Some common, but not all of the iOS jailbreaking tools are listed below:&lt;br /&gt;
*Absinthe &lt;br /&gt;
*blackra1n &lt;br /&gt;
*Corona &lt;br /&gt;
*greenpois0n &lt;br /&gt;
*JailbreakMe &lt;br /&gt;
*limera1n &lt;br /&gt;
*PwnageTool &lt;br /&gt;
*redsn0w&lt;br /&gt;
*evasi0n &lt;br /&gt;
*sn0wbreeze &lt;br /&gt;
*Spirit&lt;br /&gt;
*Pangu&lt;br /&gt;
 &lt;br /&gt;
A more comprehensive list of jailbreaking tools for iOS, exploits and kernel patches can be found on the ''[http://theiphonewiki.com/wiki/Main_Page iPhoneWiki] website. &lt;br /&gt;
&lt;br /&gt;
How to Jailbreak iOS Latest firmware using TaiG 2.1.0, Guide is available - ''[http://bugwrangler.in/2015/06/jail-break-your-ios-8-3-gadget/ Here]. &lt;br /&gt;
&lt;br /&gt;
'''Android''': there are various rooting software available for Android. Tools and processes vary depending on the user’s device. The process is usually to:&lt;br /&gt;
#Unlock the boot loader;&lt;br /&gt;
#Install a rooting application and / or flash a custom ROM through the recovery mode. &lt;br /&gt;
&lt;br /&gt;
Not all of the above tasks are necessary and different toolkits are available for device specific rooting process. Custom ROMs are based on the hardware being used; examples of some are as follows:&lt;br /&gt;
&lt;br /&gt;
*'''CyanogenMod ROMs''' are one of the most popular aftermarket replacement firmware in the Android world. More comprehensive device specific firmwares, flashing guides, rooting tools and patch details can be referenced from the homepage;&lt;br /&gt;
*'''ClockWorkMod''' is a custom recovery option for Android phones and tablets that allows you to perform several advanced recovery, restoration, installation and maintenance operations etc. Please refer to XDA-developers for more details.&lt;br /&gt;
&lt;br /&gt;
'''Windows Phone OS''': several tools and techniques exist to unlock Windows Phone devices, depending on the OS version, the specific device vendor and the desired unlocking level:&lt;br /&gt;
&lt;br /&gt;
*'''Microsoft Official Developer Unlock''': the Windows Phone SDK includes the &amp;quot;Windows Phone Developer Registration&amp;quot; utility that is used to freely developer-unlock any Windows Phone OS device. In the past, free developer unlocking was limited to recognized students from the DreamSpark program;&lt;br /&gt;
*'''The ChevronWP7 Unlocker and Tokens''': in the early days of Windows Phone hacking, ChevronWP7 Labs released an unlocker utility (ChevronWP7.exe) that was used to unofficially developer-unlock Windows Phone 7 devices. The unlocker changed the local PC hosts file in order to reroute all the “developerservices.windowsphone.com” traffic to a local web server served with the HTTPS protocol. A crafted digital certificate (ChevronWP7.cer) was also required to be imported on the target Windows Phone device: the so configured environment allowed the unlocker to perform a Man-in-The-Middle (MiTM) attack against the USB attached device, simulating of a legitimate uncloking process. Basically, the utility exploited a certificate validation issue that affected the early version of Windows Phone platform. Lately, ChevronWP7 Labs established a collaboration with Microsoft, allowing users to officially developer-unlock their devices by acquiring special low-price unlocking tokens;&lt;br /&gt;
*'''Heathcliff74’s Interop-unlock Exploit''': Heathcliff74 from XDA-developers developed a method to load and run custom provisioning XML files (provxml) to interop-unlocked Windows Phone 7 devices. The idea behind the method was to craft a XAP file (which is a simple compressed archive) containing a directory named &amp;quot;'''../../../../provxml'''&amp;quot;, and then extract the content of the folder (a custom provxml file) within the \'''provxml'''\ system folder: abusing vulnerable OEM apps (e.g., Samsung Diagnosis app) the provxml file could then have been run, thus allowing changing registry settings (e.g., the MaxUnsingedApp key) and achieving the desired unlock. The method requires the target device to be developer-unlocked in order to sideload the unsigned XAP-exploit;&lt;br /&gt;
*'''The WindowsBreak Project''': Jonathan Warner (Jaxbot) from windowsphonehacker.com developed a method to achieve both the developer and the interop unlock, while using the technique ideated by Heathcliff74, but without the need to sideload any unsigned apps. The exploit consisted of a ZIP file containing a custom provxml file within a folder named &amp;quot;'''../../../../provxml'''&amp;quot;: the extraction of the custom provxml file in the \provxml\ system folder was possible thanks to the use of the ZipView application. The original online exploit is no longer available because the vulnerability exploited by WindowsBreak has been patched by Samsung;&lt;br /&gt;
*'''WP7 Root Tools''': the WP7 Root Tools is a collection of utilities developed by Heathcliff74 to obtain root access within a interop-unlocked or full-unlocked platform. The suite provides a series of tools including the Policy Editor, which is used to select trusted apps that are allowed to get root access and escape their sandbox. The suite targets Windows Phone 7 devices only;&lt;br /&gt;
*'''Custom ROMs''': custom ROMs are usually flashed to achieve interop or full unlock conditions. A numbers of custom ROMs are available for the Windows Phone 7 platforms (e.g., RainbowMod ROM, DeepShining, Nextgen+, DFT’s MAGLDR, etc.). The first custom ROM targeting Samsung Ativ S devices was developed by -W_O_L_F- from XDA-developers, providing interop-unlock and relock-prevention features among other system tweaks;&lt;br /&gt;
*'''OEMs App and Driver Exploits''': unlocked access is often achieved exploiting security flaws in the implementation or abusing hidden functionalities of OEM drivers and apps, which are shipped with the OS. Notable examples are the Samsung Diagnosis app – abused in the Samsung Ativ S hack - that included a hidden registry editor, and the LG MFG app: both have been used to achieve the interop-unlock by modifying the value of the MaxUnsignedApp registry value.&lt;br /&gt;
&lt;br /&gt;
==Why can it be dangerous?==&lt;br /&gt;
&lt;br /&gt;
The tools above can be broadly categorized in the following categories:&lt;br /&gt;
&lt;br /&gt;
*'''Userland Exploits''': jailbroken access is only obtained within the user layer. For instance, a user may have root access, but is not able to change the boot process. These exploits can be patched with a firmware update;&lt;br /&gt;
*'''iBoot Exploit''': jailbroken access to user level and boot process. iBoot exploits can be patched with a firmware update;&lt;br /&gt;
*'''Bootrom Exploits''': jailbroken access to user level and boot process. Bootrom exploits cannot be patched with a firmware update. Hardware update of bootrom required to patch in such cases;&lt;br /&gt;
&lt;br /&gt;
Some high level risks for jailbreaking, rooting or unlocking devices are as follows.&lt;br /&gt;
&lt;br /&gt;
===Technical Risks===&lt;br /&gt;
*'''General Mobile'''&lt;br /&gt;
#Some jailbreaking methods leave SSH enabled with a well-known default password (e.g., alpine) that attackers can use for Command &amp;amp; Control;&lt;br /&gt;
#The entire file system of a jailbroken device is vulnerable to a malicious user inserting or extracting files. This vulnerability is exploited by many malware programs, including Droid Kung Fu, Droid Dream and Ikee. These attacks may also affect unlocked Windows Phone devices, depending on the achieved unlocking level;&lt;br /&gt;
#Credentials to sensitive applications, such as banking or corporate applications, can be stolen using key logging, sniffing or other malicious software and then transmitted via the internet connection.&lt;br /&gt;
*'''iOS'''&lt;br /&gt;
#Applications on a jailbroken device run as root outside of the iOS sandbox. This can allow applications to access sensitive data contained in other apps or install malicious software negating sandboxing functionality;&lt;br /&gt;
#Jailbroken devices can allow a user to install and run self-signed applications. Since the apps do not go through the App Store, Apple does not review them. These apps may contain vulnerable or malicious code that can be used to exploit a device.&lt;br /&gt;
*'''Android'''&lt;br /&gt;
#Android users that change the permissions on their device to grant root access to applications increase security exposure to malicious applications and potential application flaws;&lt;br /&gt;
#3rd party Android application markets have been identified as hosting malicious applications with remote administrative (RAT) capabilities.&lt;br /&gt;
*'''Windows Phone OS'''&lt;br /&gt;
#Similarly to what is happening with other mobile platforms, an unlocked Windows Phone system allows the installation of apps that are not certified by Microsoft and that are more likely to contain vulnerabilities or malicious codes;&lt;br /&gt;
#Unlocked devices generally expose a wider attack surface, because users can sideload apps that not only could be unsigned, but that could also abuse capabilities usually not allowed to certified Windows Phone Store applications;&lt;br /&gt;
#Application sandbox escaping is normally not allowed, even in case of a higher level of unlocking (e.g., interop-unlock), but it is possible in full-unlocked systems.&lt;br /&gt;
&lt;br /&gt;
===Non-technical Risks===&lt;br /&gt;
*According to the Unted States Librarian of Congress (who issues Digital Millennium Copyright Act (DMCA) excemptions), jailbreaking or rooting of a smartphone is '''not''' deemed illegal in the US for persons who engage in noninfringing uses. The approval can provide some users with a false sense safety and jailbreaking or rooting as being harmless. Its noteworthy the Librarian does not apporve jailbreaking of tablets, however. Please see ''[http://www.theinquirer.net/inquirer/news/2220251/us-rules-jailbreaking-tablets-is-illegal US rules jailbreaking tablets is illegal]'' for a layman's analysis.&lt;br /&gt;
&lt;br /&gt;
*Software updates cannot be immediately applied because doing so would remove the jailbreak.  This leaves the device vulnerable to known, unpatched software vulnerabilities;&lt;br /&gt;
*Users can be tricked into downloading malicious software. For example, malware commonly uses the following tactics to trick users into downloading software;&lt;br /&gt;
#Apps will often advertise that they provide additional functionality or remove ads from popular apps but also contain malicious code;&lt;br /&gt;
#Some apps will not have any malicious code as part of the initial version of the app but subsequent &amp;quot;Updates&amp;quot; will insert malicious code.&lt;br /&gt;
*Manufacturers have determined that jailbreaking, rooting or unlocking are breach of the terms of use for the device and therefore voids the warranty. This can be an issue for the user if the device needs hardware repair or technical support (Note: a device can be restored and therefore it is not a major issue, unless hardware damage otherwise covered by the warranty prevents restoration). &lt;br /&gt;
&lt;br /&gt;
What controls can be used to protect against it? Before an organization chooses to implement a mobile solution in their environment, they should conduct a thorough risk assessment. This risk assessment should include an evaluation of the dangers posed by jailbroken devices, which are inherently more vulnerable to malicious applications or vulnerabilities such as those listed in the OWASP Mobile Security Top Ten Risks. Once this assessment has been completed, management can determine which risks to accept and which risks will require additional controls to mitigate.&lt;br /&gt;
&lt;br /&gt;
Below are a few examples of both technical and non-technical controls that an organization may use.&lt;br /&gt;
&lt;br /&gt;
===Technical Controls===&lt;br /&gt;
 &lt;br /&gt;
Some of the detective controls to monitor for jailbroken devices include: &lt;br /&gt;
*Identify 3rd party app stores (e.g., Cydia);&lt;br /&gt;
*Attempt to identify modified kernels by comparing certain system files that the application would have access to on a non-jailbroken device to known good file hashes. This technique can serve as a good starting point for detection;&lt;br /&gt;
*Attempt to write a file outside of the application’s root directory. The attempt should fail for non-jailbroken devices;&lt;br /&gt;
*Generalizing, attempt to identify anomalies in the underlying system or verify the ability to execute privileged functions or methods.&lt;br /&gt;
&lt;br /&gt;
Despite being popular solutions, technical controls that aims to identify the existence of a jailbroken system must relay and draw conclusions based on information that are provided by the underlying platform and that could be faked by a compromised environment, thus nullifying the effectiveness of the mechanisms themselves. Moreover, most of these technical controls can be easily bypassed introducing simple modifications to the application binaries; even in the best circumstances, they can just delay, but not block, apps installation onto a jailbroken device.&lt;br /&gt;
&lt;br /&gt;
Most Mobile Device Management (MDM) solutions can perform these checks but require a specific application to be installed on the device.&lt;br /&gt;
&lt;br /&gt;
In the Windows Phone universe, anti-jailbreaking mechanisms would require the use of privileged APIs that normally are not granted to Independent Software Vendors (ISV). OEM apps could instead be allowed to use higher privileged capabilities, and so they can theoretically implement these kind of security checks.&lt;br /&gt;
&lt;br /&gt;
===Non-Technical Controls===&lt;br /&gt;
&lt;br /&gt;
Organizations must understand the following key points when thinking about mobile security:&lt;br /&gt;
 &lt;br /&gt;
*Perform a risk assessment to determine risks associated with mobile device use are appropriately identified, prioritized and mitigated to reduce or manage risk at levels acceptable to management;&lt;br /&gt;
*Review application inventory listing on frequent basis to identify applications posing significant risk to the mobility environment;&lt;br /&gt;
*Technology solutions such as Mobile Device Management (MDM) or Mobile Application Management (MAM) should be only one part of the overall security strategy. High level considerations include:&lt;br /&gt;
#Policies and procedures;&lt;br /&gt;
#User awareness and user buy-in;&lt;br /&gt;
#Technical controls and platforms; &lt;br /&gt;
#Auditing, logging, and monitoring. &lt;br /&gt;
*While many organizations choose a Bring Your Own Device (BYOD) strategy, the risks and benefits need to be considered and addressed before such a strategy is put in place. For example, the organization may consider developing a support plan for the various devices and operating systems that could be introduced to the environment. Many organizations struggle with this since there are such a wide variety of devices, particularly Android devices;&lt;br /&gt;
*There is not a ‘one size fits all’ solution to mobile security. Different levels of security controls should be employed based on the sensitivity of data that is collected, stored, or processed on a mobile device or through a mobile application;&lt;br /&gt;
*User awareness and user buy-in are key. For consumers or customers, this could be a focus on privacy and how Personally Identifiable Information (PII) is handled. For employees, this could be a focus on Acceptable Use Agreements (AUA) as well as privacy for personal devices.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
Jailbreaking and rooting and unlocking tools, resources and processes are constantly updated and have made the process easier than ever for end-users. Many users are lured to jailbreak their device in order to gain more control over the device, upgrade their operating systems or install packages normally unavailable through standard channels. While having these options may allow the user to utilize the device more effectively, many users do not understand that jailbreaking can potentially allow malware to bypass many of the device's built in security features. The balance of user experience versus corporate security needs to be carefully considered, since all mobile platforms have seen an increase in malware attacks over the past year. Mobile devices now hold more personal and corporate data than ever before, and have become a very appealing target for attackers. Overall, the best defense for an enterprise is to build an overarching mobile strategy that accounts for technical controls, non-technical controls and the people in the environment. Considerations need to not only focus on solutions such as MDM, but also policies and procedures around common issues of BYOD and user security awareness.&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Suktika Mukhopadhyay&amp;lt;br/&amp;gt;&lt;br /&gt;
Brandon Clark&amp;lt;br/&amp;gt;&lt;br /&gt;
Talha Tariq&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.owasp.org/index.php/User:Daath Luca De Fulgentis]'''&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=196548</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=196548"/>
				<updated>2015-06-24T11:51:08Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* OWASP Top 10 for 2013 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the 10 Most Critical Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
And for each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Wichers | Dave Wichers]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] Draft OWASP Top 10 - 2013 - Released for Public Comment&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx OWASP Top 10 2013 Presentation - Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 is as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. Translation efforts for the 2013 version are underway and they will be posted as they become available. &lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== 2013 Versions ==&lt;br /&gt;
&lt;br /&gt;
2013 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
*[https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
*[[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]]&lt;br /&gt;
*[[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF direct download)] &lt;br /&gt;
*[https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
*[https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Top Ten. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top Ten mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks for 2010 are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[http://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are underway in numerous languages to translate the OWASP Top 10 for 2013. If you are interested in helping, please contact the other members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language too!!&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://www.owasp.org/images/4/4d/OWASP_Top_10_-_2013_Final_-_English.pptx OWASP Top 10 - 2013 which is in PowerPoint]. Please use this document as the basis for your translation efforts.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
Volunteer Translation Efforts Underway: &lt;br /&gt;
&lt;br /&gt;
*Portuguese: carlos.j.serrao@gmail.com; taquiles@gmail.com; wagner.elias@owasp.org; victoreufrasio@gmail.com; leo.cavallari@owasp.org; victoreufrasio@gmail.com; &lt;br /&gt;
*Greek: Konstantinos Papapanagiotou (conpap@di.uoa.gr) &lt;br /&gt;
*Turkish: bora@abi.com.tr &lt;br /&gt;
*Malay: cecil.su@owasp.org &lt;br /&gt;
*Dutch: marinus@kuivenhoven.com&lt;br /&gt;
*Swedish: ake.bengtsson@owasp.org&lt;br /&gt;
*Hungarian: tibor.fekete@owasp.org&lt;br /&gt;
*Persian (Farsi): Shahab Namazikhah (namazikhah@hotmail.com)&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[http://blogs.msdn.com/b/sdl/archive/2008/05/01/sdl-and-the-owasp-top-ten.aspx Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[http://www.nsa.gov/applications/search/index.cfm?q=owasp NSA] &lt;br /&gt;
:in their developer guidance on web application security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Web_Top_10_for_2013.png&amp;diff=196547</id>
		<title>File:OWASP Web Top 10 for 2013.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Web_Top_10_for_2013.png&amp;diff=196547"/>
				<updated>2015-06-24T11:48:45Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: Mindmap OWASP Web top 10 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Mindmap OWASP Web top 10 2013&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Application_Security_Verification_Standard_.png&amp;diff=196456</id>
		<title>File:Application Security Verification Standard .png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Application_Security_Verification_Standard_.png&amp;diff=196456"/>
				<updated>2015-06-22T09:57:05Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: Abhinav uploaded a new version of &amp;amp;quot;File:Application Security Verification Standard .png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ASVS Image&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Verification_Standard_Project&amp;diff=196455</id>
		<title>Category:OWASP Application Security Verification Standard Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Application_Security_Verification_Standard_Project&amp;diff=196455"/>
				<updated>2015-06-22T09:56:00Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: /* Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Home =&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is ASVS? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Verification Standard (ASVS) Project provides a basis for testing web application technical security controls.&lt;br /&gt;
&lt;br /&gt;
The primary aim of the '''OWASP Application Security Verification Standard (ASVS) Project''' is to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard. The standard provides a basis for testing application technical security controls, as well as any technical security controls in the environment, that are relied on to protect against vulnerabilities such as Cross-Site Scripting (XSS) and SQL injection. This standard can be used to establish a level of confidence in the security of Web applications. The requirements were developed with the following objectives in mind: &lt;br /&gt;
&lt;br /&gt;
*'''Use as a metric''' - Provide application developers and application owners with a yardstick with which to assess the degree of trust that can be placed in their Web applications, &lt;br /&gt;
*'''Use as guidance''' - Provide guidance to security control developers as to what to build into security controls in order to satisfy application security requirements, and &lt;br /&gt;
*'''Use during procurement''' - Provide a basis for specifying application security verification requirements in contracts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;ASVS&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]] [https://lists.owasp.org/mailman/listinfo/owasp-application-security-verification-standard Project Email List]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Daniel Cuthbert [mailto:Daniel.Cuthbert@owasp.org @]&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrew van der Stock [mailto:vanderaj@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Resources''' &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top Ten] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Guide_Project OWASP Development Guide] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf Download] ASVS 2.0 in English.&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://github.com/OWASP/ASVS/blob/master/OWASP%20Application%20Security%20Verification%20Standard%203.0.docx?raw=true Download] ASVS 3.0 early preview release in English.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 May 2015] &amp;quot;First Cut&amp;quot; Version 3.0 released!&lt;br /&gt;
* [11 Aug 2014] Version 2.0 released!&lt;br /&gt;
* [28 Mar 2014] List of contributors added&lt;br /&gt;
* [27 Mar 2014] New wiki template!&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Downloads =&lt;br /&gt;
&lt;br /&gt;
'''Application Security Verification Standard 2.0 (final)'''&lt;br /&gt;
&lt;br /&gt;
* ASVS 2.0  in English ([[Media:OWASP_ASVS_Version_2.pdf|download PDF - 1.6 MB]])&lt;br /&gt;
* ASVS 2.0 in English ([[Media:OWASP_ASVS_Version_2.docx|download Word - 1.0MB]])&lt;br /&gt;
&lt;br /&gt;
We are looking for translators for this version. If you can help us, please contact the project mail list!&lt;br /&gt;
&lt;br /&gt;
'''Contributed'''&lt;br /&gt;
* Simple English Excel Reporting ([[Media:Asvs_v2_items.xlsx|download Excel - 50KB]])&lt;br /&gt;
* Simple French Excel Reporting ([[Media:Asvs_v2_items_fr.xlsx|download Excel - 35KB]])&lt;br /&gt;
&lt;br /&gt;
[[File:Application_Security_Verification_Standard_.png]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Volunteers ==&lt;br /&gt;
&lt;br /&gt;
=== Version 2 (2014) ===&lt;br /&gt;
&lt;br /&gt;
Project leaders&lt;br /&gt;
*Sahba Kazerooni&lt;br /&gt;
*Daniel Cuthbert&lt;br /&gt;
&lt;br /&gt;
Lead authors&lt;br /&gt;
*Andrew van der Stock&lt;br /&gt;
*Sahba Kazerooni&lt;br /&gt;
*Daniel Cuthbert&lt;br /&gt;
*Krishna Raja&lt;br /&gt;
&lt;br /&gt;
Other reviewers and contributors&lt;br /&gt;
*Jerome Athias&lt;br /&gt;
*Boy Baukema&lt;br /&gt;
*Archangel Cuison&lt;br /&gt;
*Sebastien.Deleersnyder&lt;br /&gt;
*Antonio Fontes&lt;br /&gt;
*Evan Gaustad&lt;br /&gt;
*Safuat Hamdy&lt;br /&gt;
*Ari Kesäniemi&lt;br /&gt;
*Scott Luc&lt;br /&gt;
*Jim Manico&lt;br /&gt;
*Mait Peekma&lt;br /&gt;
*Pekka Sillanpää&lt;br /&gt;
*Jeff Sergeant&lt;br /&gt;
*Etienne Stalmans&lt;br /&gt;
*Colin Watson&lt;br /&gt;
*Dr. Emin İslam Tatlı&lt;br /&gt;
&lt;br /&gt;
=== Version 2009 ===&lt;br /&gt;
&lt;br /&gt;
Project leader&lt;br /&gt;
*Mike Boberski&lt;br /&gt;
&lt;br /&gt;
Lead authors&lt;br /&gt;
*Mike Boberski&lt;br /&gt;
*Jeff Williams&lt;br /&gt;
*Dave Wichers&lt;br /&gt;
&lt;br /&gt;
Other reviewers and contributors&lt;br /&gt;
&lt;br /&gt;
Pierre Parrend (OWASP Summer of Code), Andrew van der Stock, Nam Nguyen, John Martin, Gaurang Shah, Theodore Winograd, Stan Wisseman, Barry Boyd, Steve Coyle, Paul Douthit, Ken Huang, Dave Hausladen, Mandeep Khera Scott Matsumoto, John Steven, Stephen de Vries, Dan Cornell, Shouvik Bardhan, Dr. Sarbari Gupta, Eoin Keary, Richard Campbell, Matt Presson, Jeff LoSapio, Liz Fong, George Lawless, Dave van Stein, Terrie Diaz, Ketan Dilipkumar Vyas, Bedirhan Urgun, Dr. Thomas Braun, Colin Watson, Jeremiah Grossman.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Summer of Code 2008 ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation sponsored the OWASP Application Security Verification Standard Project during the OWASP Summer of Code 2008.&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-letters.jpg]]'''ASVS Terminology''' &lt;br /&gt;
&lt;br /&gt;
*'''Access Control''' – A means of restricting access to files, referenced functions, URLs, and data based on the identity of users and/or groups to which they belong. &lt;br /&gt;
*'''Application Component''' – An individual or group of source files, libraries, and/or executables, as defined by the verifier for a particular application. &lt;br /&gt;
*'''Application Security''' – Application-level security focuses on the analysis of components that comprise the application layer of the Open Systems Interconnection Reference Model (OSI Model), rather than focusing on for example the underlying operating system or connected networks. &lt;br /&gt;
*'''Application Security Verification''' – The technical assessment of an application against the OWASP ASVS. &lt;br /&gt;
*'''Application Security Verification Report''' – A report that documents the overall results and supporting analysis produced by the verifier for a particular application. &lt;br /&gt;
*'''Application Security Verification Standard (ASVS)''' – An OWASP standard that defines four levels of application security verification for applications. &lt;br /&gt;
*'''Authentication''' – The verification of the claimed identity of an application user. &lt;br /&gt;
*'''Automated Verification''' – The use of automated tools (either dynamic analysis tools, static analysis tools, or both) that use vulnerability signatures to find problems. &lt;br /&gt;
*'''Back Doors''' – A type of malicious code that allows unauthorized access to an application. &lt;br /&gt;
*'''Blacklist''' – A list of data or operations that are not permitted, for example a list of characters that are not allowed as input. &lt;br /&gt;
*'''Common Criteria (CC)''' – A multipart standard that can be used as the basis for the verification of the design and implementation of security controls in IT products. &lt;br /&gt;
*'''Communication Security''' – The protection of application data when it is transmitted between application components, between clients and servers, and between external systems and the application. &lt;br /&gt;
*'''Design Verification''' – The technical assessment of the security architecture of an application. &lt;br /&gt;
*'''Internal Verification''' – The technical assessment of specific aspects of the security architecture of an application as defined in the OWASP ASVS. &lt;br /&gt;
*'''Cryptographic module''' – Hardware, software, and/or firmware that implements cryptographic algorithms and/or generates cryptographic keys. &lt;br /&gt;
*'''Denial of Service (DOS) Attacks''' – The flooding of an application with more requests than it can handle. &lt;br /&gt;
*'''Dynamic Verification''' – The use of automated tools that use vulnerability signatures to find problems during the execution of an application. &lt;br /&gt;
*'''Easter Eggs''' – A type of malicious code that does not run until a specific user input event occurs. &lt;br /&gt;
*'''External Systems''' – A server-side application or service that is not part of the application. &lt;br /&gt;
*'''FIPS 140-2''' – A standard that can be used as the basis for the verification of the design and implementation of cryptographic modules &lt;br /&gt;
*'''Input Validation''' – The canonicalization and validation of untrusted user input. &lt;br /&gt;
*'''Malicious Code''' – Code introduced into an application during its development unbeknownst to the application owner which circumvents the application’s intended security policy. Not the same as malware such as a virus or worm! &lt;br /&gt;
*'''Malware''' – Executable code that is introduced into an application during runtime without the knowledge of the application user or administrator. &lt;br /&gt;
*'''Open Web Application Security Project (OWASP)''' – The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. See: http://www.owasp.org/ &lt;br /&gt;
*'''Output Validation''' – The canonicalization and validation of application output to Web browsers and to external systems. &lt;br /&gt;
*'''OWASP Enterprise Security API (ESAPI)''' – A free and open collection of all the security methods that developers need to build secure Web applications. See: http://www.owasp.org/index.php/ESAPI &lt;br /&gt;
*'''OWASP Risk Rating Methodology''' – A risk rating methodology that has been customized for application security. See: http://www.owasp.org/index.php/How_to_value_the_real_risk &lt;br /&gt;
*'''OWASP Testing Guide''' – A document designed to help organizations understand what comprises a testing program, and to help them identify the steps needed to build and operate that testing program. See: http://www.owasp.org/index.php/Category:OWASP_Testing_Project &lt;br /&gt;
*'''OWASP Top Ten''' – A document that represents a broad consensus about what the most critical Web application security flaws are. See: http://www.owasp.org/index.php/Top10 &lt;br /&gt;
*'''Positive''' – See whitelist. &lt;br /&gt;
*'''Salami Attack''' – A type of malicious code that is used to redirect small amounts of money without detection in financial transactions. &lt;br /&gt;
*'''Security Architecture''' – An abstraction of an application’s design that identifies and describes where and how security controls are used, and also identifies and describes the location and sensitivity of both user and application data. &lt;br /&gt;
*'''Security Control''' – A function or component that performs a security check (e.g. an access control check) or when called results in a security effect (e.g. generating an audit record). &lt;br /&gt;
*'''Security Configuration''' – The runtime configuration of an application that affects how security controls are used. &lt;br /&gt;
*'''Static Verification''' – The use of automated tools that use vulnerability signatures to find problems in application source code. &lt;br /&gt;
*'''Target of Verification (TOV)''' – If you are performing an application security verification according to the OWASP ASVS requirements, the verification will be of a particular application. This application is called the &amp;quot;Target of Verification&amp;quot; or simply the TOV. &lt;br /&gt;
*'''Threat Modeling''' - A technique consisting of developing increasingly refined security architectures to identify threat agents, security zones, security controls, and important technical and business assets. &lt;br /&gt;
*'''Time Bomb''' – A type of malicious code that does not run until a preconfigured time or date elapses. &lt;br /&gt;
*'''Verifier''' - The person or team that is reviewing an application against the OWASP ASVS requirements. &lt;br /&gt;
*'''Whitelist''' – A list of permitted data or operations, for example a list of characters that are allowed to perform input validation.&lt;br /&gt;
&lt;br /&gt;
= ASVS Users  =&lt;br /&gt;
[[Image:Asvs-handshake.JPG]]&lt;br /&gt;
&lt;br /&gt;
A broad range of companies and agencies around the globe have added ASVS to their software assurance tool boxes, including [http://www.aspectsecurity.com Aspect Security], [http://www.astyran.com Astyran], [http://www.boozallen.com Booz Allen Hamilton], [http://casabasecurity.com Casaba Security], [http://www.cgi.com/web/en/industries/governments/us_federal/services_solutions.htm CGI Federal], [http://denimgroup.com Denim Group], [http://etebaran.com Etebaran Informatics], [http://www.mindedsecurity.com Minded Security], [http://www.nixu.com Nixu], [http://www.pstestware.com/ ps_testware], [http://www.proactiverisk.com Proactive Risk], [http://quince.co.uk Quince Associates Limited (SeeMyData)], [http://www.serpro.gov.br/ Serviço Federal de Processamento de Dados (SERPRO)], [http://www.udistrital.edu.co/ Universidad Distrital Francisco José de Caldas] Organizations listed are not accredited by OWASP. Neither their products or services have been endorsed by OWASP. Use of ASVS may include for example providing verification services using the standard. Use of ASVS may also include for example performing internal evaluation of products with the OWASP ASVS in mind, and NOT making any claims of meeting any given level in the standard. Please let us know how your organization is using OWASP ASVS. Include your name, organization's name, and brief description of how you use the standard. The project lead can be reached [mailto:sahba@securitycompass.com here].&lt;br /&gt;
&lt;br /&gt;
= Precedents-Interpretations =&lt;br /&gt;
&lt;br /&gt;
'''PI-0001: Are there levels between the levels?''' &lt;br /&gt;
&lt;br /&gt;
*Issue: Are there levels between the levels for the cases where &amp;quot;The specification for an application may require OWASP ASVS Level N, but it could also include other additional detailed requirements such as from a higher ASVS level&amp;quot;? &lt;br /&gt;
*Resolution: No. Use of alternate level definitions or notations such as &amp;quot;ASVS Level 1B+&amp;quot; is discouraged. &lt;br /&gt;
*References: ASVS section &amp;quot;Application Security Verification Levels&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''PI-0002: Is use of a master key simply another level of indirection?''' &lt;br /&gt;
&lt;br /&gt;
*Issue: If a master key is stored as plaintext, isn't using a master key simply another level of indirection? &lt;br /&gt;
*Resolution: No. There is a strong rationale for having a &amp;quot;master key&amp;quot; stored in a secure location that is used to encrypt all other secrets. In many applications, there are lots of secrets stored in many different locations. This greatly increases the likelihood that one of them will be compromised. Having a single master key makes managing the protection considerably simpler and is not simply a level of indirection. &lt;br /&gt;
*References: ASVS verification requirement V2.14&lt;br /&gt;
&lt;br /&gt;
'''PI-0003: What is a &amp;quot;TOV&amp;quot; or &amp;quot;Target of Verification&amp;quot;?''' &lt;br /&gt;
&lt;br /&gt;
*Issue: New terminology &lt;br /&gt;
*Resolution: If you are performing an application security verification according to ASVS, the verification will be of a particular application. This application is called the &amp;quot;Target of Verification&amp;quot; or simply the TOV. The TOV should be identified in verification documentation as follows: &lt;br /&gt;
**TOV Identification – &amp;amp;lt;name and version of the application&amp;amp;gt; or &amp;amp;lt;Application name&amp;amp;gt;, &amp;amp;lt;application version&amp;amp;gt;, dynamic testing was performed in a staging environment, not the production environment &lt;br /&gt;
**TOV Developer – &amp;amp;lt;insert name of the developer or verification customer&amp;amp;gt; &lt;br /&gt;
*References: ASVS section &amp;quot;Approach&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Internationalization =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-writing.JPG]]&lt;br /&gt;
&lt;br /&gt;
The ASVS project is always on the lookout for volunteers who are interested in translating ASVS into another language. &lt;br /&gt;
&lt;br /&gt;
[http://owasp-project-management.googlecode.com/svn/trunk/documentation/asvs-translating.pdf Translation Onboarding Instructions]&lt;br /&gt;
&lt;br /&gt;
= Archive - Previous Version =&lt;br /&gt;
&lt;br /&gt;
'''*Please note that ASVS is currently on version 2.0.  The information on this page is for archival purposes only.*'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step1.jpg]]'1. About ASVS 1.0' &lt;br /&gt;
&lt;br /&gt;
*Video presentation in English [https://www.youtube.com/watch?v=Ba6ncpIfaJA (YouTube)] &lt;br /&gt;
*ASVS vs. WASC et al [http://www.owasp.org/index.php/ASVS_vs_WASC_Et_Al (Wiki)]&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step2.jpg]]'2. Get ASVS 1.0' &lt;br /&gt;
&lt;br /&gt;
*ASVS in Bahasa Indonesia (Indonesian language) ([http://owasp-asvs.googlecode.com/files/asvs-webapp-release-2009-id.pdf PDF])&lt;br /&gt;
*ASVS in Bahasa Malaysia (Malay) (Currently under development!)&lt;br /&gt;
*ASVS in Chinese(Currently under development!) &lt;br /&gt;
*ASVS in English ([http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf PDF], [http://www.owasp.org/images/3/35/OWASP_ASVS_2009_Web_App_Std_Release.doc Word], [http://code.google.com/p/owasp-asvs/wiki/ASVS '''Online'''], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-xml.zip XML]) &lt;br /&gt;
*ASVS in French ([http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-fr.pdf PDF], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-fr.odt OpenOffice]) &lt;br /&gt;
*ASVS in German ([http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-de.pdf PDF], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-de.doc Word])&lt;br /&gt;
*ASVS in Hungarian (Currently under development!) &lt;br /&gt;
*ASVS in Japanese ([http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-jp.pdf PDF], [http://owasp-asvs.googlecode.com/svn/trunk/documentation/asvs-webapp-release-2009-jp.doc Word]) &lt;br /&gt;
*ASVS in Persian (Farsi) ([http://abiusx.com/archive/document/OWASP-ASVS-fa-20111115.pdf PDF]) beta 0.7&lt;br /&gt;
*ASVS in Polish ([http://owasp-asvs.googlecode.com/files/asvs-webapp-release-2009-pl.pdf PDF])&lt;br /&gt;
*ASVS in Portuguese-Brazil ([http://owasp-asvs.googlecode.com/files/asvs-webapp-release-2009-pt-br.pdf PDF])&lt;br /&gt;
*ASVS in Spanish (Currently under development!)&lt;br /&gt;
*ASVS in Thai (Currently under development!)&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step3.jpg]]'3. Learn ASVS 1.0' &lt;br /&gt;
&lt;br /&gt;
*ASVS Article: Getting Started Using ASVS ([http://www.owasp.org/images/f/f8/OWASP_ASVS_Article_-_Getting_Started_Using_ASVS.pdf PDF]) &lt;br /&gt;
*ASVS Article: Code Reviews and Other Verification Activities: USELESS Unless Acted Upon IMMEDIATELY [http://www.owasp.org/index.php/Code_Reviews_and_Other_Verification_Activities:_USELESS_Unless_Acted_Upon_IMMEDIATELY (Wiki)] &lt;br /&gt;
*ASVS Article: Agile Software Development: Don't Forget EVIL User Stories ([http://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories Wiki]) &lt;br /&gt;
*ASVS Article: Man vs. Code ([http://www.owasp.org/index.php/Man_vs._Code Wiki]) &lt;br /&gt;
*ASVS Article: Getting started designing for a level of assurance ([http://www.owasp.org/images/0/01/Getting_started_designing_for_a_level_of_assurance.pdf PDF]) &lt;br /&gt;
*ASVS Template: Sample verification fee schedule template ([http://www.owasp.org/index.php/Image:Sample_ASVS_Fee_Schedule_Template.xls Excel]) &lt;br /&gt;
*ASVS Template: Sample verification report template ([http://www.owasp.org/index.php/Image:Sample_ASVS_Report_Template.doc Word]) &lt;br /&gt;
*ASVS Training: An ASVS training presentation ([http://www.owasp.org/index.php/Image:OWASP_AU_Secure_Architecture_and_Coding.ppt PowerPoint]) &lt;br /&gt;
*ASVS Presentation: Executive-Level Presentation ([http://www.owasp.org/images/9/99/About_OWASP_ASVS_Executive_Presentation.ppt PowerPoint]) &lt;br /&gt;
*ASVS Presentation: Presentation Abstract ([http://www.owasp.org/images/1/10/OWASP_ASVS_Presentation_Abstract.doc Word]) &lt;br /&gt;
*Articles [http://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project#Articles_Below_-_More_About_ASVS_and_Using_It (More About ASVS and Using It)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Application Security Verification Standard Project]]&lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
[[Category:OWASP_Download]]&lt;br /&gt;
[[Category:OWASP_Release_Quality_Document|OWASP Stable Quality Document]]&lt;br /&gt;
[[Category:SAMM-CR-1]]&lt;br /&gt;
[[Category:SAMM-DR-2]]&lt;br /&gt;
[[Category:SAMM-ST-3]]&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Application_Security_Verification_Standard_.png&amp;diff=196454</id>
		<title>File:Application Security Verification Standard .png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Application_Security_Verification_Standard_.png&amp;diff=196454"/>
				<updated>2015-06-22T09:54:14Z</updated>
		
		<summary type="html">&lt;p&gt;Abhinav: ASVS Image&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ASVS Image&lt;/div&gt;</summary>
		<author><name>Abhinav</name></author>	</entry>

	</feed>